| 2007 |
| 7 | | George Hamer,
David Andrawis,
Stephen Krebsbach:
Application of the RS Method to Detect Steganographic Messages in Database Table.
CAINE 2007: 225-231 |
| 2006 |
| 6 | | Stephen Krebsbach,
George Hamer:
Achieving near-optimal distortion reduction with invisible watermarking RSSI algorithms.
CAINE 2006: 18-23 |
| 5 | | George Hamer,
Stephen Krebsbach:
Statistical steganography and steganalysis of database tables.
CAINE 2006: 95-101 |
| 2004 |
| 4 | | Stephen Krebsbach,
William Perrizo:
Invisible Digital Watermarking of Remotely Sensed Satellite Images - A New Approach.
CAINE 2004: 154-159 |
| 2003 |
| 3 | | Stephen Krebsbach,
George Hamer,
William Perrizo:
Watermarking Remotely Sensed Images (RSI) (Digital Image or Relational Data?).
CAINE 2003: 17-21 |
| 1997 |
| 2 | EE | William Perrizo,
Zhili Zhang,
Stephen Krebsbach:
Strategies for implementing distributed query algorithms over high-speed, bandwidth-on-demand, wide area networks.
COMPSAC 1997: 580- |
| 1 | EE | William Perrizo,
Zhili Zhang,
Stephen Krebsbach:
A query processing method for data warehouses which contain multimedia.
SAC 1997: 323-327 |