2007 |
7 | | George Hamer,
David Andrawis,
Stephen Krebsbach:
Application of the RS Method to Detect Steganographic Messages in Database Table.
CAINE 2007: 225-231 |
2006 |
6 | | Stephen Krebsbach,
George Hamer:
Achieving near-optimal distortion reduction with invisible watermarking RSSI algorithms.
CAINE 2006: 18-23 |
5 | | George Hamer,
Stephen Krebsbach:
Statistical steganography and steganalysis of database tables.
CAINE 2006: 95-101 |
2004 |
4 | | Stephen Krebsbach,
William Perrizo:
Invisible Digital Watermarking of Remotely Sensed Satellite Images - A New Approach.
CAINE 2004: 154-159 |
2003 |
3 | | Stephen Krebsbach,
George Hamer,
William Perrizo:
Watermarking Remotely Sensed Images (RSI) (Digital Image or Relational Data?).
CAINE 2003: 17-21 |
1997 |
2 | EE | William Perrizo,
Zhili Zhang,
Stephen Krebsbach:
Strategies for implementing distributed query algorithms over high-speed, bandwidth-on-demand, wide area networks.
COMPSAC 1997: 580- |
1 | EE | William Perrizo,
Zhili Zhang,
Stephen Krebsbach:
A query processing method for data warehouses which contain multimedia.
SAC 1997: 323-327 |