An evaluation of image based steganography methods K Bailey, K Curran Multimedia Tools and Applications 30, 55-88, 2006 | 438 | 2006 |
An overview of steganography techniques applied to the protection of biometric data M Douglas, K Bailey, M Leeney, K Curran Multimedia Tools and Applications 77 (13), 17333-17373, 2018 | 157 | 2018 |
A novel approach to digital watermarking, exploiting colour spaces F Lusson, K Bailey, M Leeney, K Curran Signal Processing 93 (5), 1268-1294, 2013 | 83 | 2013 |
Evaluation of pixel-based steganography and stegodetection methods K Bailey, K Curran, J Condell The Imaging Science Journal 52 (3), 131-150, 2004 | 26 | 2004 |
Steganography K Bailey BookSurge, 2005 | 17 | 2005 |
Blockchain in food traceability: a systematic literature review A Ahmad, K Bailey 2021 32nd Irish signals and systems conference (ISSC), 1-6, 2021 | 10 | 2021 |
Using SVD and DWT based steganography to enhance the security of watermarked fingerprint images M Douglas, K Bailey, M Leeney, K Curran TELKOMNIKA (Telecommunication Computing Electronics and Control) 15 (3 …, 2017 | 9 | 2017 |
Steganography (paperback) K Bailey, K Curran Book Surge publishing, 2005 | 6 | 2005 |
An Evaluation of Automated Stegodetection Methods in Images. K Bailey, K Curran, J Condell Fourth Annual Conference on Information Technology and Telecommunications …, 2004 | 6 | 2004 |
An Evaluation of Steganography Methods K Curran, K Bailey Multimedia Tools and Applications 2 (2), 22-32, 2003 | 4 | 2003 |
Steganography K Bailey, K Curran Irish Scientist Yearbook 2003 11 (1), 70-70, 2003 | 1 | 2003 |
Steganography in Images: An Overview K Bailey, J Condell, K Curran Irish Machine Vision and Image Processing Conference (IMVIP2003), 2003 | 1 | 2003 |
ELITE: Edge Layer IoT Trustless Environment TA Mayfield, G Cullen, K Bailey, P Greaney, K Curran 2023 34th Irish Signals and Systems Conference (ISSC), 1-7, 2023 | | 2023 |
A Novel Approach to Digital Watermarking, Exploiting Colour Spaces M Leeney, K Bailey LyIT, 2011 | | 2011 |
Software and methods for steganography K Bailey, J Condeli, K Curran Image Processing & Communications 10 (2), 103-130, 2005 | | 2005 |