Share Email Print
cover

Proceedings of SPIE Volume 4675

Security and Watermarking of Multimedia Contents IV
Format Member Price Non-Member Price
Softcover $105.00 * $105.00 *

*Available as a photocopy reprint only. Allow two weeks reprinting time plus standard delivery time. No discounts or returns apply.


Volume Details

Volume Number: 4675
Date Published: 29 April 2002
Softcover: 71 papers (724) pages
ISBN: 9780819444158

Table of Contents
show all abstracts | hide all abstracts
Practical steganalysis of digital images: state of the art
Author(s): Jessica Fridrich; Miroslav Goljan
Show Abstract
Mathematical approach to steganalysis
Author(s): Rajarathnam Chandramouli
Show Abstract
Communications approach to image steganography
Author(s): Joachim J. Eggers; Robert Baeuml; Bernd Girod
Show Abstract
Applied public-key steganography
Author(s): Pierre Guillon; Teddy Furon; Pierre Duhamel
Show Abstract
Defining security in steganographic systems
Author(s): Stefan Katzenbeisser; Fabien A. P. Petitcolas
Show Abstract
StegoWall: blind statistical detection of hidden data
Author(s): Sviatoslav V. Voloshynovskiy; Alexander Herrigel; Yuri B. Rytsar; Thierry Pun
Show Abstract
Adaptive steganography
Author(s): Rajarathnam Chandramouli; Grace Li; Nasir D. Memon
Show Abstract
StirMark Benchmark: audio watermarking attacks based on lossy compression
Author(s): Martin Steinebach; Andreas Lang; Jana Dittmann
Show Abstract
Quality evaluation of watermarked audio tracks
Author(s): Michael Arnold; Kai Schilz
Show Abstract
Nth-order audio watermarking
Author(s): Neil J. Hurley; Guenole C.M. Silvestre
Show Abstract
Audio content authentication based on psycho-acoustic model
Author(s): Regunathan Radhakrishnan; Nasir D. Memon
Show Abstract
Digimarc MediaBridge: the birth of a consumer product from concept to commercial application
Author(s): Burt Perry; Brian MacIntosh; David Cushman
Show Abstract
Digital watermarking scheme for extremely high-resolution printing images
Author(s): Yuji Honjo; Kiyoshi Tanaka
Show Abstract
HIT: a new approach for hiding multimedia information in text
Author(s): Essam A. El-Kwae; Li Cheng
Show Abstract
Practical off-line authentication
Author(s): Heajoung Yoo; Seungchul Seo; Sangjin Lee; Jongin Lim
Show Abstract
Sensitivity labels and invisible identification markings in human-readable output
Author(s): Christoph Busch; Stephen D. Wolthusen
Show Abstract
Comparison of two speech content authentication approaches
Author(s): Chung-Ping Wu; C.-C. Jay Kuo
Show Abstract
Automatic music monitoring and boundary detection for broadcast using audio watermarking
Author(s): Taiga Nakamura; Ryuki Tachibana; Seiji Kobayashi
Show Abstract
Evolution of music score watermarking algorithm
Author(s): Christoph Busch; Paolo Nesi; Martin Schmucker; Marius B. Spinu
Show Abstract
Scheme of standard MIDI files steganography and its evaluation
Author(s): Daisuke Inoue; Tsutomu Matsumoto
Show Abstract
Capacity improvement for a blind symbolic music score watermarking technique
Author(s): Martin Schmucker
Show Abstract
Color image watermarking using channel-state knowledge
Author(s): Josep Vidal; Maribel Madueno; Elisa Sayrol
Show Abstract
Adaptive color watermarking
Author(s): Alastair M. Reed; Brett T. Hannigan
Show Abstract
Hiding-based compression for improved color image coding
Author(s): Patrizio Campisi; Deepa Kundur; Dimitrios Hatzinakos; Alessandro Neri
Show Abstract
Watermarking protocols for authentication and ownership protection based on timestamps and holograms
Author(s): Jana Dittmann; Martin Steinebach; Lucilla Croce Ferri
Show Abstract
Return of ambiguity attacks
Author(s): Scott A. Craver
Show Abstract
Securing symmetric watermarking schemes against protocol attacks
Author(s): Stefan Katzenbeisser; Helmut Veith
Show Abstract
Links between cryptography and information hiding
Author(s): Caroline Fontaine; Frederic Raynal
Show Abstract
Channel model for watermarks subject to desynchronization attacks
Author(s): Robert Baeuml; Joachim J. Eggers; Roman Tzschoppe; Johannes Huber
Show Abstract
Attacks, applications, and evaluation of known watermarking algorithms with Checkmark
Author(s): Peter Meerwald; Shelby Pereira
Show Abstract
Design of template in the autocorrelation domain
Author(s): Jin Soo Seo; Chang Dong Yoo
Show Abstract
Method for the estimation and recovering from general affine transforms in digital watermarking applications
Author(s): Frederic Deguillaume; Sviatoslav V. Voloshynovskiy; Thierry Pun
Show Abstract
Robust image watermarking scheme resilient to desynchronization attacks
Author(s): Changryoul Choi; Jechang Jeong
Show Abstract
Adaptive watermarking using successive subband quantization and perceptual model based on multiwavelet transform
Author(s): Ki Ryong Kwon; Ahmed H. Tewfik
Show Abstract
Digital watermarking in wavelet domain with predistortion for authenticity verification and localization
Author(s): Dominque Albert Winne; Henry D. Knowles; David R. Bull; Cedric Nishan Canagarajah
Show Abstract
Compression-compatible digital watermark algorithm for authenticity verification and localization
Author(s): Dominque Albert Winne; Henry D. Knowles; David R. Bull; Cedric Nishan Canagarajah
Show Abstract
Blockwise image watermarking system with selective data embedding in wavelet transform domain
Author(s): Pao-Chi Chang; Ta-Te Lu; Li-Lin Lee
Show Abstract
Image watermarking for copyright protection and data hiding via the Mojette transform
Author(s): Florent Autrusseau; Jeanpierre V. Guedon
Show Abstract
Estimation of amplitude modifications before SCS watermark detection
Author(s): Joachim J. Eggers; Robert Baeuml; Bernd Girod
Show Abstract
Turbo-coded trellis-based constructions for data hiding
Author(s): Jim C. Chou; Kannan Ramchandran; S. Sandeep Pradhan
Show Abstract
Optimum decoding and detection of a multiplicative amplitude-encoded watermark
Author(s): Mauro Barni; Franco Bartolini; Alessia De Rosa; Alessandro Piva
Show Abstract
Performance analysis of information hiding
Author(s): Shuichi Shimizu
Show Abstract
Theoretical framework for watermark capacity and energy estimation
Author(s): Ruizhen Liu; Tieniu Tan
Show Abstract
Watermark design for the Wiener attack and whitening filtered detection
Author(s): Youngha Hwang; Kyung Ae Moon; Myung Joon Kim
Show Abstract
Improved watermarking scheme by reference signal mingling
Author(s): Soo-Chang Pei; Jun-Horng Chen
Show Abstract
Watermarking for automatic quality monitoring
Author(s): Matthew J. Holliman; Minerva M. Yeung
Show Abstract
Computational analysis and system implications of video watermarking applications
Author(s): Eric Debes; Matthew J. Holliman; William W. Macy; Yen-Kuang Chen; Minerva M. Yeung
Show Abstract
Synchronization-insensitive video watermarking using structured noise pattern
Author(s): Iwan Setyawan; Geerd Kakes; Reginald L. Lagendijk
Show Abstract
Novel approach to collusion-resistant video watermarking
Author(s): Karen Su; Deepa Kundur; Dimitrios Hatzinakos
Show Abstract
Real-time video watermarking technique
Author(s): Han Ho Lee; Jong Jin Chae; Jong Uk Choi
Show Abstract
Video watermarking resistance to rotation, scaling, and translation
Author(s): Xiamu Niu; Martin Schmucker; Christoph Busch
Show Abstract
Temporal synchronization in video watermarking
Author(s): Eugene T. Lin; Edward J. Delp
Show Abstract
Video authentication with self-recovery
Author(s): Mehmet U. Celik; Gaurav Sharma; A. Murat Tekalp; Eli S. Saber
Show Abstract
Digital watermarking for secure and adaptive teleconferencing
Author(s): Jan Christop Vorbrueggen; Niels Thorwirth
Show Abstract
Method for hiding synchronization marks in scale- and rotation-resilient watermarking schemes
Author(s): Damien Delannay; Benoit M. M. Macq
Show Abstract
Application of composite invisible image watermarks to simplify detection of a distinct watermark from a large set
Author(s): Gordon W. Braudaway; Frederick C. Mintzer
Show Abstract
Rotation-, scaling-, and translation-robust image watermarking using Gabor kernels
Author(s): Hiuk Jae Shim; Byeungwoo Jeon
Show Abstract
Lossless data embedding for all image formats
Author(s): Jessica Fridrich; Miroslav Goljan; Rui Du
Show Abstract
Image-feature-based robust digital watermarking scheme
Author(s): Chih-Wei Tang; Hsueh-Ming Hang
Show Abstract
Image watermarking in the Fourier domain based on global features of concentric ring areas
Author(s): Wolfgang Funk
Show Abstract
Image compression and watermarking using lattice vector quantization
Author(s): Jean-Marie Moureaux; Ludovic Guillemot
Show Abstract
Use of web cameras for watermark detection
Author(s): John Stach; Trenton J. Brundage; Brett T. Hannigan; Brett A. Bradley; Tony Kirk; Hugh Brunk
Show Abstract
Watermarking 2D-vector data for geographical information systems
Author(s): Michael Voigt; Christoph Busch
Show Abstract
Biometric authentication for ID cards with hologram watermarks
Author(s): Lucilla Croce Ferri; Astrid Mayerhoefer; Marcus Frank; Claus Vielhauer; Ralf Steinmetz
Show Abstract
Biometric watermarking based on face recognition
Author(s): Takami Satonaka
Show Abstract
Improved key management for digital watermark monitoring
Author(s): Volker Roth; Michael Arnold
Show Abstract
New semifragile image authentication watermarking techniques using random bias and nonuniform quantization
Author(s): Kurato Maeno; Qibin Sun; Shih-Fu Chang; Masayuki Suto
Show Abstract
Multivalued semifragile watermarking
Author(s): Yuichi Nakai
Show Abstract
Wavelet-based reversible watermarking for authentication
Author(s): Jun Tian
Show Abstract
Security of fragile authentication watermarks with localization
Author(s): Jessica Fridrich
Show Abstract
Fragile and robust watermarking by histogram specification
Author(s): Dinu Coltuc; Philippe Bolon; Jean-Marc Chassery
Show Abstract

© SPIE. Terms of Use
Back to Top