default search action
IH&MMSec 2015: Portland, OR, USA
- Adnan M. Alattar, Jessica J. Fridrich, Ned M. Smith, Pedro Comesaña Alfaro:
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2015, Portland, OR, USA, June 17 - 19, 2015. ACM 2015, ISBN 978-1-4503-3587-4
Keynote Address
- David Aucsmith:
Implications of Cyber Warfare. 1 - Richard Chow:
IoT Privacy: Can We Regain Control? 3
Media Steganography and Steganalysis
- Tomás Denemark, Jessica J. Fridrich:
Improving Steganographic Security by Synchronizing the Selection Channel. 5-14 - Xiaofeng Song, Fenlin Liu, Chunfang Yang, Xiangyang Luo, Yi Zhang:
Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters. 15-23 - Yun Cao, Hong Zhang, Xianfeng Zhao, Haibo Yu:
Video Steganography Based on Optimized Motion Estimation Perturbation. 25-31 - Vahid Sedighi, Jessica J. Fridrich:
Effect of Imprecise Knowledge of the Selection Channel on Steganalysis. 33-42
Covert Channels
- Brent C. Carrara, Carlisle M. Adams:
On Characterizing and Measuring Out-of-Band Covert Channels. 43-54 - Yao Shen, Liusheng Huang, Fei Wang, Xiaorong Lu, Wei Yang, Lu Li:
LiHB: Lost in HTTP Behaviors - A Behavior-Based Covert Channel in HTTP. 55-64 - Ji Won Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee, Kwangsu Lee:
Visual Honey Encryption: Application to Steganography. 65-74
Media Forensics
- Adi Hajj-Ahmad, Séverine Baudry, Bertrand Chupeau, Gwenaël J. Doërr:
Flicker Forensics for Pirate Device Identification. 75-84 - Bei-Bei Liu, Xingjie Wei, Jeff Yan:
Enhancing Sensor Pattern Noise for Source Camera Identification: An Empirical Evaluation. 85-90 - Christian Arndt, Stefan Kiltz, Jana Dittmann, Robert Fischer:
ForeMan, a Versatile and Extensible Database System for Digitized Forensics Based on Benchmarking Properties. 91-96
Watermarking and Fingerprinting
- Thijs Laarhoven:
Optimal Sequential Fingerprinting: Wald vs. Tardos. 97-107 - Marcel Schäfer, Sebastian Mair, Waldemar Berchtold, Martin Steinebach:
Universal Threshold Calculation for Fingerprinting Decoders using Mixture Models. 109-114 - Jong-Uk Hou, Do-Gon Kim, Sunghee Choi, Heung-Kyu Lee:
3D Print-Scan Resilient Watermarking Using a Histogram-Based Circular Shift Coding Structure. 115-121
Encryption and Computer Security
- Sebastian Matthias Burg, Dustin Peterson, Oliver Bringmann:
End-to-Display Encryption: A Pixel-Domain Encryption with Security Benefit. 123-128 - William F. Bond, Ahmed Awad E. A.:
Touch-based Static Authentication Using a Virtual Grid. 129-134 - Lakshmanan Nataraj, S. Karthikeyan, B. S. Manjunath:
SATTVA: SpArsiTy inspired classificaTion of malware VAriants. 135-140 - Charles V. Wright, Wu-chi Feng, Feng Liu:
Thumbnail-Preserving Encryption for JPEG. 141-146
Biometrics and Forensics
- Eun-Kyung Ryu, Dae-Soo Kim, Kee-Young Yoo:
On Elliptic Curve Based Untraceable RFID Authentication Protocols. 147-153 - Alireza Farrokh Baroughi, Scott Craver, Mohammed Faizan Mohsin:
A Negative Number Vulnerability for Histogram-based Face Recognition Systems. 155-160 - Robert Fischer, Claus Vielhauer:
Automated Firearm Identification: On using a novel Multiple-Slice-Shape (MSS) Approach for Comparison and Matching of Firing Pin Impression Topography. 161-171
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.