Share Email Print
cover

PROCEEDINGS VOLUME 5306

Security, Steganography, and Watermarking of Multimedia Contents VI
Format Member Price Non-Member Price
Softcover $105.00 * $105.00 *

*Available as a photocopy reprint only. Allow two weeks reprinting time plus standard delivery time. No discounts or returns apply.


Volume Details

Volume Number: 5306
Date Published: 22 June 2004
Softcover: 82 papers (896) pages
ISBN: 9780819452092

Table of Contents
show all abstracts | hide all abstracts
Locally most-powerful detector for secret key estimation in spread spectrum image steganography
Author(s): Shalin P. Trivedi; Rajarathnam Chandramouli
Show Abstract
Kernel Fisher discriminant for steganalysis of JPEG hiding methods
Author(s): Jeremiah Joseph Harmsen; William A. Pearlman
Show Abstract
On estimation of secret message length in LSB steganography in spatial domain
Author(s): Jessica Fridrich; Miroslav Goljan
Show Abstract
Steganalysis using color wavelet statistics and one-class support vector machines
Author(s): Siwei Lyu; Hany Farid
Show Abstract
Steganalysis using modified pixel comparison and complexity measure
Author(s): Sos S. Agaian; Benjamin M. Rodriguez; Glenn B. Dietrich
Show Abstract
Performance evaluation of blind steganalysis classifiers
Author(s): Mark T. Hogan; Guenole C. M. Silvestre; Neil J. Hurley
Show Abstract
Searching for the stego-key
Author(s): Jessica Fridrich; Miroslav Goljan; David Soukal
Show Abstract
Quantitative evaluation of pairs and RS steganalysis
Author(s): Andrew David Ker
Show Abstract
Steganalysis with JPEG and GIF images
Author(s): Rui Du; Larry E. Guthrie; Doug Buchy
Show Abstract
Fast audio watermarking: concepts and realizations
Author(s): Michael Arnold; Zongwei Huang
Show Abstract
An informed synchronization scheme for audio data hiding
Author(s): Alejandro LoboGuerrero; Patrick Bas; Joel Lienard
Show Abstract
Digital watermarking based on process of speech production
Author(s): Toshiyuki Sakai; Naohisa Komatsu
Show Abstract
Two-dimensional audio watermark for MPEG AAC audio
Author(s): Ryuki Tachibana
Show Abstract
Cepstral domain modification of audio signals for data embedding: preliminary results
Author(s): Kaliappan Gopalan
Show Abstract
ICA-based robust logo image watermarking
Author(s): Thai Duy Hien; Zensho Nakao; Yen-Wei Chen
Show Abstract
Collocated Dataglyphs for large-message storage and retrieval
Author(s): Rakhi C. Motwani; Jeff A. Breidenbach; John R. Black
Show Abstract
Machine vision applications of digital watermarking
Author(s): John Stach
Show Abstract
Fingerprinting of music scores
Author(s): Jonathan Irons; Martin Schmucker
Show Abstract
Watermarking and fingerprinting for electronic music delivery
Author(s): Michiel van der Veen; Aweke N. Lemma; Ton Kalker
Show Abstract
Improvement to CDF grounded lattice codes
Author(s): Brett A. Bradley
Show Abstract
Advanced audio watermarking benchmarking
Author(s): Jana Dittman; Martin Steinebach; Andreas Lang; Sascha Zmudizinski
Show Abstract
The Watermark Evaluation Testbed (WET)
Author(s): Hyung Cook Kim; Hakeem Ogunleye; Oriol Guitart; Edward J. Delp
Show Abstract
Thread-based benchmarking deployment
Author(s): Sebastien Lugan; Benoit Macq
Show Abstract
Human perception of geometric distortions in images
Author(s): Iwan Setyawan; Reginald L. Lagendijk
Show Abstract
Rate-distortion analysis of steganography for conveying stereovision disparity maps
Author(s): Toshiyuki Umeda; Ana Barros Dias Torrão Batolomeu; Filipe Andre Liborio Francob; Damien Delannay; Benoit M. M. Macq
Show Abstract
Orthogonal dirty paper coding for informed data hiding
Author(s): Andrea Abrardo; Mauro Barni
Show Abstract
Capacity of data-hiding system subject to desynchronization
Author(s): Stephane Pateux; Gaetan Le Guelvouit; Jonathan Delhumeau
Show Abstract
Adaptive quantization watermarking
Author(s): Job C. Oostveen; Ton Kalker; Marius Staring
Show Abstract
Secure background watermarking based on video mosaicing
Author(s): Gwenael Doerr; Jean-Luc Dugelay
Show Abstract
Synchronization technique to detect MPEG video frames for watermark retrieval
Author(s): Enrico Hauer; Stefan Thiemert
Show Abstract
Feature-based watermarking scheme for MPEG-I/II video authentication
Author(s): Yuewei Dai; Stefan Thiemert; Martin Steinebach
Show Abstract
Impact of MPEG-4 3D mesh coding on watermarking algorithms for polygonal 3D meshes
Author(s): Wolfgang Funk
Show Abstract
Video steganography based on bit-plane decomposition of wavelet transformed video
Author(s): Hideki Noda; Tomofumi Furuta; Michiharu Niimi; Eiji Kawaguchi
Show Abstract
Lossless data embedding with file size preservation
Author(s): Jessica Fridrich; Miroslav Goljan; Qing Chen; Vivek Pathak
Show Abstract
Reversible compressed domain watermarking by exploiting code space inefficiency
Author(s): Bijan G. Mobasseri; Robert J. Berger
Show Abstract
Reversible watermarking for images
Author(s): Arno J. van Leest; Michiel van der Veen; Fons Bruekers
Show Abstract
A high-capacity invertible data-hiding algorithm using a generalized reversible integer transform
Author(s): John Stach; Adnan M. Alattar
Show Abstract
Reversible watermarking using two-way decodable codes
Author(s): Bijan G. Mobasseri; Domenick Cinalli
Show Abstract
Integer DCT-based reversible watermarking for images using companding technique
Author(s): Bian Yang; Martin Schmucker; Wolfgang Funk; Christoph Busch; Shenghe Sun
Show Abstract
Towards fraud-proof ID documents using multiple data hiding technologies and biometrics
Author(s): Justin Picard; Claus Vielhauer; Niels Thorwirth
Show Abstract
Visual communications with side information via distributed printing channels: extended multimedia and security perspectives
Author(s): Sviatoslav V. Voloshynovskiy; Oleksiy Koval; Frederic Deguillaume; Thierry Pun
Show Abstract
Print protection using high-frequency fractal noise
Author(s): Khaled Walid Mahmoud; Jonathon M. Blackledge; Sekharjit Datta; James A. Flint
Show Abstract
Signature-embedding in printed documents for security and forensic applications
Author(s): Aravind K Mikkilineni; Gazi N Ali; Pei-Ju Chiang; George T. C. Chiu; Jan P. Allebach; Edward J. Delp
Show Abstract
Universal image steganalysis using rate-distortion curves
Author(s): Mehmet U. Celik; Gaurav Sharma; A. Murat Tekalp
Show Abstract
Steganalysis of block-structured stegotext
Author(s): Ying Wang; Pierre Moulin
Show Abstract
Fast additive noise steganalysis
Author(s): Jeremiah Joseph Harmsen; Kevin D. Bowers; William A. Pearlman
Show Abstract
On the complexity and hardness of the steganography embedding problem
Author(s): Rajarathnam Chandramouli; Shalin P. Trivedi; R. N. Uma
Show Abstract
Hiding correlation-based watermark templates using secret modulation
Author(s): Jeroen Frederik Lichtenauer; Iwan Setyawan; Reginald L. Lagendijk
Show Abstract
LOT-based adaptive image watermarking
Author(s): Yuxin Liu; Bin Ni; Xiaojun Feng; Edward J. Delp
Show Abstract
Error correction coding of nonlinear side-informed watermarking schemes
Author(s): Kevin M. Whelan; Guenole C.M. Silvestre; Neil J. Hurley
Show Abstract
Spatial synchronization using watermark key structure
Author(s): Eugene T. Lin; Edward J. Delp
Show Abstract
Vector-quantization-based scheme for data embedding for images
Author(s): Ning Liu; Koduvayur P. Subbalakshmi
Show Abstract
Image watermarking based on scale-space representation
Author(s): Jin S. Seo; Chang D. Yoo
Show Abstract
A wavelet watermarking algorithm based on a tree structure
Author(s): Oriol Guitart Pla; Eugene T. Lin; Edward J. Delp III
Show Abstract
Classification of watermarking schemes robust against loss of synchronization
Author(s): Damien Delannay; Benoit Macq
Show Abstract
Quantifying security leaks in spread spectrum data hiding: a game-theoretic approach
Author(s): Pedro Comesana; Fernando Perez-Gonzalez
Show Abstract
New attacks on SARI image authentication system
Author(s): Jinhai Wu; Bin Benjamin Zhu; Shipeng Li; Fuzong Lin
Show Abstract
Distortion compensated lookup-table embedding: joint security and robustness enhancement for quantization-based data hiding
Author(s): Min Wu
Show Abstract
Attacks on biometric systems: a case study in fingerprints
Author(s): Umut Uludag; Anil K. Jain
Show Abstract
Biometric verification based on grip-pattern recognition
Author(s): Raymond N.J. Veldhuis; Asker M. Bazen; Joost A. Kauffman; Pieter Hartel
Show Abstract
Security for biometric data
Author(s): Claus Vielhauer; Ton Kalker
Show Abstract
Multimedia document authentication using on-line signatures as watermarks
Author(s): Anoop M. Namboodiri; Anil K. Jain
Show Abstract
Application of invisible image watermarks to previously halftoned images
Author(s): Gordon W. Braudaway; Frederick C. Mintzer
Show Abstract
Show-through watermarking of duplex printed documents
Author(s): Gaurav Sharma; Shen-ge Wang
Show Abstract
Watermarking electronic text documents containing justified paragraphs and irregular line spacing
Author(s): Adnan M. Alattar; Osama Mohammed Alattar
Show Abstract
Efficient multimedia data encryption based on flexible QM coder
Author(s): Dahua Xie; C.-C. Jay Kuo
Show Abstract
Multilayer multicast key management with threshold cryptography
Author(s): Scott D. Dexter; Roman Belostotskiy; Ahmet M. Eskicioglu
Show Abstract
Securing display of grayscale and multicolored images by use of visual cryptography
Author(s): Hirotsugu Yamamoto; Yoshio Hayasaki; Nobuo Nishida
Show Abstract
A hybrid scheme for encryption and watermarking
Author(s): Xiaowei Xu; Scott D. Dexter; Ahmet M. Eskicioglu
Show Abstract
Near-lossless image authentication transparent to near-lossless coding
Author(s): Roberto Caldelli; Giovanni Macaluso; Franco Bartolini; Mauro Barni
Show Abstract
Collusion-resistant multimedia fingerprinting: a unified framework
Author(s): Min Wu; Wade Trappe; Z. Jane Wang; K.J. Ray Liu
Show Abstract
Analysis and design of authentication watermarking
Author(s): Chuhong Fei; Deepa Kundur; Raymond Kwong
Show Abstract
Analysis of a wavelet-based robust hash algorithm
Author(s): Albert Meixner; Andreas Uhl
Show Abstract
Geometric soft hash functions for 2D and 3D objects
Author(s): Emmanuel Fernandes; Jean-Francois Delaigle
Show Abstract
Statistical amplitude scale estimation for quantization-based watermarking
Author(s): Ivo D Shterev; Reginald L. Lagendijk; Richard Heusdens
Show Abstract
Blind iterative decoding of side-informed data hiding using the expectation-maximization algorithm
Author(s): Felix Balado; Fernando Perez-Gonzalez; Pedro Comesana
Show Abstract
Wavelet domain watermarking using maximum-likelihood detection
Author(s): Tek Ming Ng; Hari Krishna Garg
Show Abstract
Performance bounds on optimal watermark synchronizers
Author(s): Vinicius Licks; Fabricio Ourique; Ramiro Jordan
Show Abstract
Malicious attacks on media authentication schemes based on invertible watermarks
Author(s): Stefan Katzenbeisser; Jana Dittmann
Show Abstract
Attacking digital watermarks
Author(s): Radu Sion; Mikhail Atallah
Show Abstract
Evaluating the performance of ST-DM watermarking in nonadditive channels
Author(s): Mauro Barni; Attilio Borello; Franco Bartolini; Alessandro Piva
Show Abstract
Characterization of geometric distortions attacks in robust watermarking
Author(s): Xavier Desurmont; Jean-Francois Delaigle; Benoit Macq
Show Abstract

© SPIE. Terms of Use
Back to Top