Follow
Karen Bailey
Karen Bailey
Letterkenny Institute of Technology
Verified email at lyit.ie
Title
Cited by
Cited by
Year
An evaluation of image based steganography methods
K Bailey, K Curran
Multimedia Tools and Applications 30, 55-88, 2006
4232006
An overview of steganography techniques applied to the protection of biometric data
M Douglas, K Bailey, M Leeney, K Curran
Multimedia Tools and Applications 77 (13), 17333-17373, 2018
1472018
A novel approach to digital watermarking, exploiting colour spaces
F Lusson, K Bailey, M Leeney, K Curran
Signal Processing 93 (5), 1268-1294, 2013
782013
Evaluation of pixel-based steganography and stegodetection methods
K Bailey, K Curran, J Condell
The Imaging Science Journal 52 (3), 131-150, 2004
252004
Steganography
K Bailey
BookSurge, 2005
172005
Using SVD and DWT based steganography to enhance the security of watermarked fingerprint images
M Douglas, K Bailey, M Leeney, K Curran
TELKOMNIKA (Telecommunication Computing Electronics and Control) 15 (3 …, 2017
92017
Blockchain in food traceability: a systematic literature review
A Ahmad, K Bailey
2021 32nd Irish signals and systems conference (ISSC), 1-6, 2021
62021
Steganography (paperback)
K Bailey, K Curran
Book Surge publishing, 2005
62005
An Evaluation of Automated Stegodetection Methods in Images.
K Bailey, K Curran, J Condell
Fourth Annual Conference on Information Technology and Telecommunications …, 2004
62004
Steganography
K Bailey, K Curran
Irish Scientist Yearbook 2003 11 (1), 70-70, 2003
12003
An Evaluation of Steganography Methods
K Curran, K Bailey
Multimedia Tools and Applications 2 (2), 22-32, 2003
12003
Steganography in Images: An Overview
K Bailey, J Condell, K Curran
Irish Machine Vision and Image Processing Conference (IMVIP2003), 2003
12003
ELITE: Edge Layer IoT Trustless Environment
TA Mayfield, G Cullen, K Bailey, P Greaney, K Curran
2023 34th Irish Signals and Systems Conference (ISSC), 1-7, 2023
2023
A Novel Approach to Digital Watermarking, Exploiting Colour Spaces
M Leeney, K Bailey
LyIT, 2011
2011
Software and methods for steganography
K Bailey, J Condeli, K Curran
Image Processing & Communications 10 (2), 103-130, 2005
2005
The system can't perform the operation now. Try again later.
Articles 1–15