default search action
8. MM&Sec 2006: Geneva, Switzerland
- Sviatoslav Voloshynovskiy, Jana Dittmann, Jessica J. Fridrich:
Proceedings of the 8th workshop on Multimedia & Security, MM&Sec 2006, Geneva, Switzerland, September 26-27, 2006. ACM 2006, ISBN 1-59593-493-6 - Mauro Barni:
Processing encrypted signals: a new frontier for multimedia security. 1
Steganography and steganalysis
- Jessica J. Fridrich:
Minimizing the embedding impact in steganography. 2-10 - Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Taras Holotyak, Thierry Pun:
Information-theoretic analysis of steganalysis in real images. 11-16 - Christian Krätzer, Jana Dittmann, Andreas Lang, Tobias Kühne:
WLAN steganography: a first practical review. 17-22 - Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu:
Digital invisible ink and its applications in steganography. 23-28
Authentication and forensics
- Hany Farid:
Exposing digital forgeries in scientific images. 29-36 - Weihong Wang, Hany Farid:
Exposing digital forgeries in video by detecting double MPEG compression. 37-47 - Micah K. Johnson, Hany Farid:
Exposing digital forgeries through chromatic aberration. 48-55 - Qiming Li, Ee-Chien Chang:
Robust, short and sensitive authentication tags using secure sketch. 56-61 - Mathias Schlauweg, Dima Pröfrock, Erika Müller:
JPEG2000-based secure image authentication. 62-67
Security analysis I
- Luis Pérez-Freire, Fernando Pérez-González, Teddy Furon:
On achievable security levels for lattice data hiding in the known message attack scenario. 68-79 - Patrick Bas, François Cayre:
Achieving subspace or key security for WOA using natural or circular watermarking. 80-88 - Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Emre Topak, José-Emilio Vila-Forcén, Thierry Pun:
On reversibility of random binning based data-hiding techniques: security perspectives. 89-96 - Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González:
Zero-knowledge watermark detector robust to sensitivity attacks. 97-107
Applications I
- Yuta Nakashima, Ryuki Tachibana, Masafumi Nishimura, Noboru Babaguchi:
Estimation of recording location using audio watermarking. 108-113 - P. Vinod, Gwenaël J. Doërr, Prabin Kumar Bora:
Assessing motion-coherency in video watermarking. 114-119 - Stefan Thiemert, Martin Steinebach, Patrick Wolf:
A digital watermark for vector-based fonts. 120-123 - In Koo Kang, Dong-Hyuck Im, Heung-Kyu Lee, Young-Ho Suh:
Implementation of real-time watermarking scheme for high-quality video. 124-129 - Tobias Scheidat, Andreas Engel, Claus Vielhauer:
Parameter optimization for biometric fingerprint recognition using genetic algorithms. 130-134 - Daniel Socek, Michal Sramka, Oge Marques, Dubravko Culibrk:
An improvement to a biometric.based multimedia content protection scheme. 135-139
Security analysis II
- Albert Meixner, Andreas Uhl:
Robustness and security of a wavelet-based CBIR hashing algorithm. 140-145 - Mauro Barni, Claudio Orlandi, Alessandro Piva:
A privacy-preserving protocol for neural-network-based computation. 146-151 - Rade Petrovic, Babak Tehranchi, Joseph M. Winograd:
Digital watermarking security considerations. 152-157 - Qiming Li, Ee-Chien Chang:
Zero-knowledge watermark detection resistant to ambiguity attacks. 158-163
Applications II
- Umut Topkara, Mercan Topkara, Mikhail J. Atallah:
The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions. 164-174 - William Zhu, Clark D. Thomborson:
Extraction in software watermarking. 175-181 - Claus Vielhauer, Maik Schott:
Image annotation watermarking: nested object embedding using hypergraph model. 182-189
Benchmarking and attacks
- Andreas Lang, Jana Dittmann:
Transparency and complexity benchmarking of audio watermarking algorithms issues. 190-201 - Dominik Engel, Rade Kutil, Andreas Uhl:
A symbolic transform attack on lightweight encryption based on wavelet filter parameterization. 202-207 - Andreas Westfeld:
Lessons from the BOWS contest. 208-213
Performance analysis and enhancement
- Teddy Furon:
Hermite polynomials as provably good functions to watermark white gaussian hosts. 224-229 - Parag Agarwal, Ketaki Adi, B. Prabhakaran:
Robust blind watermarking mechanism for motion data streams. 230-235
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.