default search action
6. SSWMC 2004: San Jose, California, USA
- Edward J. Delp III, Ping Wah Wong:
Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, California, USA, January 18-22, 2004, Proceedings. Proceedings of SPIE 5306, SPIE 2004, ISBN 978-0-8194-5209-2 - Shalin P. Trivedi, Rajarathnam Chandramouli:
Locally most-powerful detector for secret key estimation in spread spectrum image steganography. 1-12 - Jeremiah J. Harmsen, William A. Pearlman:
Kernel Fisher discriminant for steganalysis of JPEG hiding methods. 13-22 - Jessica J. Fridrich, Miroslav Goljan:
On estimation of secret message length in LSB steganography in spatial domain. 23-34 - Siwei Lyu, Hany Farid:
Steganalysis using color wavelet statistics and one-class support vector machines. 35-45 - Sos S. Agaian, Benjamin M. Rodriguez, Glenn B. Dietrich:
Steganalysis using modified pixel comparison and complexity measure. 46-57 - Mark T. Hogan, Guenole C. M. Silvestre, Neil J. Hurley:
Performance evaluation of blind steganalysis classifiers. 58-69 - Jessica J. Fridrich, Miroslav Goljan, David Soukal:
Searching for the stego-key. 70-82 - Andrew D. Ker:
Quantitative evaluation of pairs and RS steganalysis. 83-97 - Rui Du, Larry E. Guthrie, Doug Buchy:
Steganalysis with JPEG and GIF images. 98-104 - Michael Arnold, Zongwei Huang:
Fast audio watermarking: concepts and realizations. 105-115 - Alejandro LoboGuerrero, Patrick Bas, Joel Lienard:
An informed synchronization scheme for audio data hiding. 116-126 - Toshiyuki Sakai, Naohisa Komatsu:
Digital watermarking based on process of speech production. 127-138 - Ryuki Tachibana:
Two-dimensional audio watermark for MPEG AAC audio. 139-150 - Kaliappan Gopalan:
Cepstral domain modification of audio signals for data embedding: preliminary results. 151-161 - Thai Duy Hien, Zensho Nakao, Yen-Wei Chen:
ICA-based robust logo image watermarking. 162-172 - Rakhi C. Motwani, Jeff Breidenbach, John R. Black:
Collocated Dataglyphs for large-message storage and retrieval. 173-183 - John Stach:
Machine vision applications of digital watermarking. 184-191 - Jonathan Irons, Martin Schmucker:
Fingerprinting of music scores. 192-199 - Michiel van der Veen, Aweke N. Lemma, Ton Kalker:
Watermarking and fingerprinting for electronic music delivery. 200-211 - Brett A. Bradley:
Improvement to CDF grounded lattice codes. 212-223 - Jana Dittmann, Martin Steinebach, Andreas Lang, Sascha Zmudzinski:
Advanced audio watermarking benchmarking. 224-235 - Hyung Cook Kim, Hakeem Ogunleye, Oriol Guitart, Edward J. Delp:
The Watermark Evaluation Testbed (WET). 236-247 - Sébastien Lugan, Benoît Macq:
Thread-based benchmarking deployment. 248-255 - Iwan Setyawan, Reginald L. Lagendijk:
Human perception of geometric distortions in images. 256-267 - Toshiyuki Umeda, Ana B. Batolomeu, Filipe A. Francob, Damien Delannay, Benoît Macq:
Rate-distortion analysis of steganography for conveying stereovision disparity maps. 268-273 - Andrea Abrardo, Mauro Barni:
Orthogonal dirty paper coding for informed data hiding. 274-285 - Stéphane Pateux, Gaëtan Le Guelvouit, Jonathan Delhumeau:
Capacity of data-hiding system subject to desynchronization. 286-295 - Job Oostveen, Ton Kalker, Marius Staring:
Adaptive quantization watermarking. 296-303 - Gwenaël J. Doërr, Jean-Luc Dugelay:
Secure background watermarking based on video mosaicing. 304-314 - Enrico Hauer, Stefan Thiemert:
Synchronization technique to detect MPEG video frames for watermark retrieval. 315-324 - Yuewei Dai, Stefan Thiemert, Martin Steinebach:
Feature-based watermarking scheme for MPEG-I/II video authentication. 325-335 - Wolfgang Funk:
Impact of MPEG-4 3D mesh coding on watermarking algorithms for polygonal 3D meshes. 336-344 - Hideki Noda, Tomofumi Furuta, Michiharu Niimi, Eiji Kawaguchi:
Video steganography based on bit-plane decomposition of wavelet-transformed video. 345-353 - Jessica J. Fridrich, Miroslav Goljan, Qing Chen, Vivek Pathak:
Lossless data embedding with file size preservation. 354-365 - Bijan G. Mobasseri, Robert J. Berger II:
Reversible compressed domain watermarking by exploiting code space inefficiency. 366-373 - Arno J. van Leest, Michiel van der Veen, Fons Bruekers:
Reversible watermarking for images. 374-385 - John Stach, Adnan M. Alattar:
A high-capacity invertible data-hiding algorithm using a generalized reversible integer transform. 386-396 - Bijan G. Mobasseri, Domenick Cinalli:
Reversible watermarking using two-way decodable codes. 397-404 - Bian Yang, Martin Schmucker, Wolfgang Funk, Christoph Busch, Sheng-He Sun:
Integer DCT-based reversible watermarking for images using companding technique. 405-415 - Justin Picard, Claus Vielhauer, Niels J. Thorwirth:
Towards fraud-proof ID documents using multiple data hiding technologies and biometrics. 416-427 - Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Frédéric Deguillaume, Thierry Pun:
Visual communications with side information via distributed printing channels: extended multimedia and security perspectives. 428-445 - Khaled W. Mahmoud, Jonathan M. Blackledge, Sekharjit Datta, James A. Flint:
Print protection using high-frequency fractal noise. 446-454 - Aravind K. Mikkilineni, Gazi N. Ali, Pei-Ju Chiang, George T.-C. Chiu, Jan P. Allebach, Edward J. Delp:
Signature-embedding in printed documents for security and forensic applications. 455-466 - Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp:
Universal image steganalysis using rate-distortion curves. 467-476 - Ying Wang, Pierre Moulin:
Steganalysis of block-structured stegotext. 477-488 - Jeremiah J. Harmsen, Kevin D. Bowers, William A. Pearlman:
Fast additive noise steganalysis. 489-495 - Rajarathnam Chandramouli, Shalin P. Trivedi, R. N. Uma:
On the complexity and hardness of the steganography embedding problem. 496-500 - Jeroen Lichtenauer, Iwan Setyawan, Reginald L. Lagendijk:
Hiding correlation-based watermark templates using secret modulation. 501-512 - Yuxin Liu, Bin Ni, Xiaojun Feng, Edward J. Delp:
LOT-based adaptive image watermarking. 513-523 - Kevin M. Whelan, Guenole C. M. Silvestre, Neil J. Hurley:
Error correction coding of nonlinear side-informed watermarking schemes. 524-535 - Eugene T. Lin, Edward J. Delp:
Spatial synchronization using watermark key structure. 536-547 - Ning Liu, Koduvayur P. Subbalakshmi:
Vector-quantization-based scheme for data embedding for images. 548-559 - Jin S. Seo, Chang Dong Yoo:
Image watermarking based on scale-space representation. 560-570 - Oriol Guitart Pla, Eugene T. Lin, Edward J. Delp:
A wavelet watermarking algorithm based on a tree structure. 571-580 - Damien Delannay, Benoît Macq:
Classification of watermarking schemes robust against loss of synchronization. 581-591 - Pedro Comesaña, Fernando Pérez-González:
Quantifying security leaks in spread spectrum data hiding: a game-theoretic approach. 592-601 - Jinhai Wu, Bin B. Zhu, Shipeng Li, Fuzong Lin:
New attacks on SARI image authentication system. 602-609 - Min Wu:
Distortion compensated lookup-table embedding: joint security and robustness enhancement for quantization-based data hiding. 610-621 - Umut Uludag, Anil K. Jain:
Attacks on biometric systems: a case study in fingerprints. 622-633 - Raymond N. J. Veldhuis, Asker M. Bazen, Joost A. Kauffman, Pieter H. Hartel:
Biometric verification based on grip-pattern recognition. 634-641 - Claus Vielhauer, Ton Kalker:
Security for biometric data. 642-652 - Anoop M. Namboodiri, Anil K. Jain:
Multimedia document authentication using on-line signatures as watermarks. 653-662 - Gordon W. Braudaway, Fred Mintzer:
Application of invisible image watermarks to previously half-toned images. 663-669 - Gaurav Sharma, Shen-Ge Wang:
Show-through watermarking of duplex printed documents. 670-684 - Adnan M. Alattar, Osama M. Alattar:
Watermarking electronic text documents containing justified paragraphs and irregular line spacing. 685-695 - Dahua Xie, C.-C. Jay Kuo:
Efficient multimedia data encryption based on flexible QM coder. 696-704 - Scott D. Dexter, Roman Belostotskiy, Ahmet M. Eskicioglu:
Multilayer multicast key management with threshold cryptography. 705-715 - Hirotsugu Yamamoto, Yoshio Hayasaki, Nobuo Nishida:
Securing display of grayscale and multicolored images by use of visual cryptography. 716-724 - Xiaowei Xu, Scott D. Dexter, Ahmet M. Eskicioglu:
A hybrid scheme for encryption and watermarking. 725-736 - Roberto Caldelli, Giovanni Macaluso, Franco Bartolini, Mauro Barni:
Near-lossless image authentication transparent to near-lossless coding. 737-747 - Min Wu, Wade Trappe, Z. Jane Wang, K. J. Ray Liu:
Collusion-resistant multimedia fingerprinting: a unified framework. 748-759 - Chuhong Fei, Deepa Kundur, Raymond H. Kwong:
Analysis and design of authentication watermarking. 760-771 - Albert Meixner, Andreas Uhl:
Analysis of a wavelet-based robust hash algorithm. 772-783 - Emmanuel Fernandes, Jean-François Delaigle:
Geometric soft hash functions for 2D and 3D objects. 784-795 - Ivo D. Shterev, Reginald L. Lagendijk, Richard Heusdens:
Statistical amplitude scale estimation for quantization-based watermarking. 796-804 - Félix Balado, Fernando Pérez-González, Pedro Comesaña:
Blind iterative decoding of side-informed data hiding using the expectation-maximization algorithm. 805-815 - Ng Tek Ming, Hari Krishna Garg:
Wavelet domain watermarking using maximum-likelihood detection. 816-826 - Vinicius Licks, Fabrício Ourique, Ramiro Jordan:
Performance bounds on optimal watermark synchronizers. 827-837 - Stefan Katzenbeisser, Jana Dittmann:
Malicious attacks on media authentication schemes based on invertible watermarks. 838-847 - Radu Sion, Mikhail J. Atallah:
Attacking digital watermarks. 848-858 - Mauro Barni, Attilio Borello, Franco Bartolini, Alessandro Piva:
Evaluating the performance of ST-DM watermarking in nonadditive channels. 859-869 - Xavier Desurmont, Jean-François Delaigle, Benoît Macq:
Characterization of geometric distortions attacks in robust watermarking. 870-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.