default search action
7. SSWMC 2005: San Jose, California, USA
- Edward J. Delp III, Ping Wah Wong:
Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, California, USA, January 17-20, 2005, Proceedings. Proceedings of SPIE 5681, SPIE 2005, ISBN 978-0-8194-5654-0 - Andrew D. Ker:
Resampling and the detection of LSB matching in color bitmaps. 1-15 - Mark T. Hogan, Neil J. Hurley, Guenole C. M. Silvestre, Félix Balado, Kevin M. Whelan:
ML detection of steganography. 16-27 - Andreas Westfeld:
Space filling curves in steganalysis. 28-37 - Kenneth Sullivan, Upamanyu Madhow, Shivkumar Chandrasekaran, B. S. Manjunath:
Steganalysis of spread spectrum data hiding exploiting cover memory. 38-46 - Paul Salama, Brian King:
Efficient secure image transmission: compression integrated with encryption. 47-58 - Elizabeth P. McCarthy, Félix Balado, Guenole C. M. Silvestre, Neil J. Hurley:
A model for improving the performance of feature-extraction-based robust hashing. 59-67 - Longjiang Yu, Martin Schmucker, Christoph Busch, Sheng-He Sun:
Cumulant-based image fingerprints. 68-75 - Elisa Sayrol, Miguel Soriano, Marcel Fernandez, Joan Casanellas, Joan Tomàs:
Development of a platform offering video copyright protection and security against illegal distribution. 76-83 - Wenjun Zeng, Junqiang Lan, Xinhua Zhuang:
Security architectures and analysis for content adaptation. 84-95 - Shan He, Min Wu:
Group-based joint coding and embedding technique for multimedia fingerprinting. 96-105 - Mauro Barni:
Shedding light on some possible remedies against watermark desynchronization: a case study. 106-113 - Roman Tzschoppe, Robert Bäuml, Robert F. H. Fischer, Johannes B. Huber, André Kaup:
Additive non-Gaussian noise attacks on the scalar Costa scheme (SCS). 114-123 - Abdellatif Zaidi, Rémy Boyer, Pierre Duhamel:
Time jitter versus additive noise in a game theory context. 124-135 - José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fernando Pérez-González, Thierry Pun:
Worst-case additive attack against quantization-based data-hiding methods. 136-146 - Chun-Shien Lu, Shih-Wei Sun, Pao-Chi Chang:
Robust hash-based image watermarking with resistance to geometric distortions and watermark-estimation attack. 147-163 - Roberto Caldelli, Alessia De Rosa, Rudy Becarelli, Mauro Barni:
Coping with local geometric attacks by means of optic-flow-based resynchronization for robust watermarking. 164-174 - Emir Ganic, Scott D. Dexter, Ahmet M. Eskicioglu:
Embedding multiple watermarks in the DFT domain using low- and high-frequency bands. 175-184 - Ning Liu, Koduvayur P. Subbalakshmi:
TCQ-based quantizer design for data hiding in images. 185-193 - Min Wu, Jessica J. Fridrich, Miroslav Goljan, Hongmei Gou:
Handling uneven embedding capacity in binary images: a revisit. 194-205 - Fernando Pérez-González, Carlos Mosquera, Mauro Barni, Andrea Abrardo:
Ensuring gain-invariance in high-rate data hiding. 206-217 - Bian Yang, Martin Schmucker, Xiamu Niu, Christoph Busch, Sheng-He Sun:
Integer-DCT-based reversible image watermarking by adaptive coefficient modification. 218-229 - Patrice Rondao-Alface, Mathieu De Craene, Benoît Macq:
Three-dimensional image quality measurement for the benchmarking of 3D watermarking schemes. 230-240 - Hyung Cook Kim, Eugene T. Lin, Oriol Guitart, Edward J. Delp:
Further progress in watermark evaluation testbed (WET). 241-251 - Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon:
Benchmarking steganographic and steganalysis techniques. 252-263 - Chad Heitzenrater:
Characterization of steganographic algorithms using software metrics. 264-274 - Andreas Lang, Jana Dittmann, Eugene T. Lin, Edward J. Delp:
Application-oriented audio watermark benchmark service. 275-286 - Wolfgang Funk, Daniel Kirchner:
A framework for data-driven algorithm testing. 287-297 - Pedro Comesaña, Fernando Pérez-González, Frans M. J. Willems:
Applying Erez and Ten Brink's dirty paper codes to data hiding. 298-307 - Pierre Moulin, Ying Wang:
On achievable error exponents for watermarking. 308-317 - Dahua Xie, C.-C. Jay Kuo:
Secure Lempel-Ziv compression with embedded encryption. 318-327 - Jessica J. Fridrich, Miroslav Goljan, Petr Lisonek, David Soukal:
Writing on wet paper. 328-340 - Luis Pérez-Freire, Fernando Pérez-González:
Spread-spectrum vs. quantization-based data hiding: misconceptions and implications. 341-352 - Stefan Thiemert, Hichem Sahbi, Martin Steinebach:
Applying interest operators in semi-fragile video watermarking. 353-362 - Mehmet Kucukgoz, Oztan Harmanci, Mehmet Kivanç Mihçak, Ramarathnam Venkatesan:
Robust video watermarking via optimization algorithm for quantization of pseudo-random semi-global statistics. 363-369 - Oztan Harmanci, Mehmet Kucukgoz, Mehmet Kivanç Mihçak:
Temporal synchronization of watermarked video using image hashing. 370-380 - Enrico Hauer, Martin Steinebach:
Robust digital watermark solution for intercoded frames of MPEG video data. 381-390 - Isao Echizen, Hiroshi Yoshiura, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka:
Use of inferential statistics to estimate error probability of video watermarks. 391-399 - Patrice Rondao-Alface, Benoît Macq:
Feature-based watermarking of 3D objects: toward robustness against remeshing and desynchronization. 400-408 - Michael Voigt, Bian Yang, Christoph Busch:
High-capacity reversible watermarking for 2D vector data. 409-417 - Kaushal Solanki, Upamanyu Madhow, B. S. Manjunath, Shivkumar Chandrasekaran:
Modeling the print-scan process for resilient data hiding. 418-429 - Aravind K. Mikkilineni, Pei-Ju Chiang, Gazi N. Ali, George T.-C. Chiu, Jan P. Allebach, Edward J. Delp:
Printer identification based on graylevel co-occurrence features for security and forensic applications.. 430-440 - Mercan Topkara, Cüneyt M. Taskiran, Edward J. Delp:
Natural language watermarking. 441-452 - Renato Villán, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun:
Multilevel 2D bar codes: toward high-capacity storage modules for multimedia security and management. 453-464 - Pablo Hennings, Marios Savvides, B. V. K. Vijaya Kumar:
Hiding phase-quantized biometrics: a case of steganography for reduced-complexity correlation filter classifiers. 465-473 - Sascha Schimke, Stefan Kiltz, Claus Vielhauer, Ton Kalker:
Security analysis for biometric data in ID documents. 474-485 - Chunyan Xie, B. V. K. Vijaya Kumar:
Quaternion correlation filters for color face recognition. 486-494 - Mark A. Masry:
A watermarking algorithm for map and chart images. 495-503 - Claus Vielhauer, T. K. Basu, Jana Dittmann, Pranab K. Dutta:
Finding meta data in speech and handwriting biometrics. 504-515 - Ivo D. Shterev, Reginald L. Lagendijk:
Maximum likelihood amplitude scale estimation for quantization-based watermarking in the presence of dither. 516-527 - Chaw-Seng Woo, Jiang Du, Binh Pham:
Geometrically robust digital image watermarking using scale normalization and flowline curvature. 528-538 - Robert J. Berger II, Bijan G. Mobasseri:
Watermarking in JPEG bitstream. 539-548 - Kevin M. Whelan, Félix Balado, Guenole C. M. Silvestre, Neil J. Hurley:
Iterative estimation of amplitude scaling on distortion-compensated dither modulation. 549-560 - Dinu Coltuc, Alain Trémeau:
Simple reversible watermarking schemes. 561-568 - Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Frédéric Deguillaume, Fernando Pérez-González, Thierry Pun:
Robustness improvement of known-host-state watermarking using host statistics. 569-577 - Thomas Vogel, Jana Dittmann:
Illustration watermarking: an object-based approach for digital images. 578-589 - Rajarathnam Chandramouli:
On the choice of risk optimal data embedding strategy, safe embedding rate, and passive steganalysis. 590-594 - Jessica J. Fridrich, David Soukal, Miroslav Goljan:
Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain. 595-606 - Jana Dittmann, Danny Hesse, Reyk Hillert:
Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set. 607-618 - Clifford Bergman, Jennifer L. Davidson:
Unitary embedding for data hiding with the SVD. 619-630 - Jessica J. Fridrich, Miroslav Goljan, David Soukal, Taras Holotyak:
Forensic steganalysis: determining the stego key in spatial domain steganography. 631-642 - Ping Wah Wong, Hong Chen, Zhongjue Tang:
On steganalysis of plus-minus one embedding of continuous-tone images. 643-652 - Sos S. Agaian, Hong Cai:
New multilevel DCT, feature vectors, and universal blind steganalysis. 653-663 - Micah K. Johnson, Siwei Lyu, Hany Farid:
Steganalysis of recorded speech. 664-672 - Taras Holotyak, Jessica J. Fridrich, David Soukal:
Stochastic approach to secret message length estimation in ±k embedding steganography. 673-684 - Gwenaël J. Doërr, Jean-Luc Dugelay:
Collusion issue in video watermarking. 685-696 - Chuhong Fei, Deepa Kundur, Raymond H. Kwong:
Achieving computational and unconditional security in authentication watermarking: analysis, insights, and algorithms. 697-708 - Emre Topak, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Mehmet Kivanç Mihçak, Thierry Pun:
Security analysis of robust data-hiding with geometrically structured codebooks. 709-720 - Luis Pérez-Freire, Pedro Comesaña Alfaro, Fernando Pérez-González:
Detection in quantization-based watermarking: performance and security issues. 721-733 - Maha El Choubassi, Pierre Moulin:
New sensitivity analysis attack. 734-745 - François Cayre, Caroline Fontaine, Teddy Furon:
Watermarking security part one: Theory. 746-757 - François Cayre, Caroline Fontaine, Teddy Furon:
Watermarking security part two: Practice. 758-768 - Finbarr B. O'Donovan, Neil J. Hurley, Guenole C. M. Silvestre:
An investigation of robustness in nonlinear audio watermarking. 769-778 - Martin Steinebach, Sascha Zmudzinski, Torsten Bölke:
Audio watermarking and partial encryption. 779-788 - Brett A. Bradley, Adnan M. Alattar:
High-capacity invertible data-hiding algorithm for digital audio. 789-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.