default search action
10. MM&Sec 2008: Oxford, UK
- Andrew D. Ker, Jana Dittmann, Jessica J. Fridrich:
Proceedings of the 10th workshop on Multimedia & Security, MM&Sec 2008, Oxford, UK, September 22-23, 2008. ACM 2008, ISBN 978-1-60558-058-6
Keynote
- Ingemar J. Cox:
Watermarking, steganography and content forensics. 1-2
Forensics
- Eric Kee, Hany Farid:
Printer profiling for forensics and ballistics. 3-10 - Matthias Kirchner:
Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue. 11-20 - Rui Yang, Zhenhua Qu, Jiwu Huang:
Detecting digital audio forgeries by checking frame offsets. 21-26 - Andrew D. Ker:
Locating steganographic payload via ws residuals. 27-32
Watermarking
- Roland Kwitt, Peter Meerwald, Andreas Uhl:
A lightweight rao-cauchy detector for additive watermarking in the dwt-domain. 33-42 - Yang Liu, Balakrishnan Prabhakaran, Xiaohu Guo:
A robust spectral approach for blind watermarking of manifold surfaces. 43-52 - Mathias Schlauweg, Dima Pröfrock, Benedikt Zeibich, Erika Müller:
Self-synchronizing robust texel watermarking in gaussian scale-space. 53-62 - Jutta Hämmerle-Uhl, Andreas Uhl, Hartmut Wernisch:
Multiple re-watermarking using varying non-stationary mra with parameterized wavelet filters. 63-68 - Kyung-Su Kim, Min-Jeong Lee, Heung-Kyu Lee, Young-Ho Suh:
Histogram-based reversible data hiding technique using subsampling. 69-74
Coding & encryption
- Sascha Zmudzinski, Martin Steinebach:
Psycho-acoustic model-based message authentication coding for audio data. 75-84 - Tiziano Bianchi, Alessandro Piva, Mauro Barni:
Efficient pointwise and blockwise encrypted operations. 85-90
Fingerprinting & tamperproofing
- Parag Agarwal, Balakrishnan Prabhakaran:
Tamper proofing mechanisms for motion capture data. 91-100 - Fuchun Xie, Teddy Furon, Caroline Fontaine:
On-off keying modulation and tardos fingerprinting. 101-106
Steganography
- Andrew D. Ker, Tomás Pevný, Jan Kodovský, Jessica J. Fridrich:
The square root law of steganographic capacity. 107-116 - Malte Diehl:
Secure covert channels in multiplayer games. 117-122
Steganalysis
- Jan Kodovský, Jessica J. Fridrich:
On completeness of feature spaces in blind steganalysis. 123-132 - Xiaolong Li, Tieyong Zeng, Bin Yang:
Detecting LSB matching by applying calibration technique for difference image. 133-138 - Bin Li, Yun Q. Shi, Jiwu Huang:
Steganalysis of YASS. 139-148 - Hafiz Malik:
Steganalysis of QIM steganography using irregularity measure. 149-158 - Christian Krätzer, Jana Dittmann:
Impact of feature selection in classification for hidden channel detection on the example of audio data hiding. 159-166 - Tomás Pevný, Jessica J. Fridrich:
Novelty detection in blind steganalysis. 167-176
Biometrics & multi-modal methods
- Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Thierry Pun:
Privacy-preserving multimodal person and object identification. 177-184 - Michael Biermann, Tobias Hoppe, Jana Dittmann, Claus Vielhauer:
Vehicle systems: comfort & security enhancement of face/speech fusion with compensational biometric modalities. 185-194 - Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun:
Multimodal authentication based on random projections and source coding. 195-204
Watermarking attacks
- David M. Williams, Helen Treharne, Anthony T. S. Ho, Chris Culnane:
Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol. 205-214 - Andreas Westfeld:
A regression-based restoration technique for automated watermark removal. 215-220 - Hans Georg Schaathun:
A key-recovery attack on authentication watermarking by li and yuan. 221-226 - Patrick Bas, Gwenaël J. Doërr:
Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes. 227-232
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.