2007 |
11 | | George Hamer,
David Andrawis,
Stephen Krebsbach:
Application of the RS Method to Detect Steganographic Messages in Database Table.
CAINE 2007: 225-231 |
2006 |
10 | | Stephen Krebsbach,
George Hamer:
Achieving near-optimal distortion reduction with invisible watermarking RSSI algorithms.
CAINE 2006: 18-23 |
9 | | George Hamer,
Stephen Krebsbach:
Statistical steganography and steganalysis of database tables.
CAINE 2006: 95-101 |
8 | | George Hamer,
William Perrizo:
Statistic Preserving Steganography using Database Tables.
Computers and Their Applications 2006: 441-445 |
7 | | George Hamer,
William Perrizo:
Chi-Squared Statistical Steganalysis of Database Tables.
SEDE 2006: 292-297 |
2005 |
6 | | Masum Serazi,
Amal Perera,
Taufik Abidin,
George Hamer,
William Perrizo:
An Api for Transparent Distributed Vertical Data Mining.
IASSE 2005: 151-156 |
5 | | George Hamer,
William Perrizo:
Secure Steganography using the Most Significant Bits.
IASSE 2005: 169-173 |
4 | | George Hamer,
William Perrizo:
Creating Short Length Masks using Vertical Processing.
IASSE 2005: 51-54 |
3 | | Amal Perera,
Taufik Abidin,
Masum Serazi,
George Hamer,
William Perrizo:
Vertical Set Square Distance Based Clustering without Prior Knowledge of K.
IASSE 2005: 72-77 |
2003 |
2 | | Stephen Krebsbach,
George Hamer,
William Perrizo:
Watermarking Remotely Sensed Images (RSI) (Digital Image or Relational Data?).
CAINE 2003: 17-21 |
1 | | George Hamer,
Daniel Steinwand:
Extending the Beowulf Cluster to the Desktop.
CAINE 2003: 329 |