Showing 1 - 8 results of 8 for search 'Pevny, T', query time: 0.02s
Refine Results
-
1
Exploring non-additive distortion in steganography by Pevny, T, Ker, A
Published 2018Conference item -
2
The non-zero-sum game of steganography in heterogeneous environments by Giboulot, Q, Pevný, T, Ker, AD
Published 2023Journal article -
3
-
4
From Blind to Quantitative Steganalysis. by Pevný, T, Fridrich, J, Ker, A
Published 2012Journal article -
5
Malicons: detecting payload in favicons by Ker, A, Pevny, T, Kopp, M, Kroustek, J
Published 2016Conference item -
6
The square root law of steganographic capacity. by Ker, A, Pevný, T, Kodovský, J, Fridrich, J
Published 2008Journal article -
7
Sox2 cooperates with Chd7 to regulate genes that are mutated in human syndromes by Engelen, E, Akinci, U, Bryne, J, Hou, J, Gontan, C, Moen, M, Szumska, D, Kockx, C, Van Ijcken, W, Dekkers, D, Demmers, J, Rijkers, E, Bhattacharya, S, Philipsen, S, Pevny, L, Grosveld, F, Rottier, R, Lenhard, B, Poot, R
Published 2011Journal article -
8
Sox2 cooperates with Chd7 to regulate genes that are mutated in human syndromes. by Engelen, E, Akinci, U, Bryne, J, Hou, J, Gontan, C, Moen, M, Szumska, D, Kockx, C, van Ijcken, W, Dekkers, D, Demmers, J, Rijkers, E, Bhattacharya, S, Philipsen, S, Pevny, L, Grosveld, F, Rottier, R, Lenhard, B, Poot, R
Published 2011Journal article