Share Email Print
cover

Proceedings of SPIE Volume 5681

Security, Steganography, and Watermarking of Multimedia Contents VII
Format Member Price Non-Member Price
Softcover $105.00 * $105.00 *

*Available as a photocopy reprint only. Allow two weeks reprinting time plus standard delivery time. No discounts or returns apply.


Volume Details

Volume Number: 5681
Date Published: 21 March 2005
Softcover: 74 papers (816) pages
ISBN: 9780819456540

Table of Contents
show all abstracts | hide all abstracts
Resampling and the detection of LSB matching in color bitmaps
Author(s): Andrew D. Ker
Show Abstract
ML detection of steganography
Author(s): Mark T. Hogan; Neil J. Hurley; Guenole C. M. Silvestre; Felix Balado; Kevin M. Whelan
Show Abstract
Space filling curves in steganalysis
Author(s): Andreas Westfeld
Show Abstract
Steganalysis of spread spectrum data hiding exploiting cover memory
Author(s): Kenneth Sullivan; Upamanyu Madhow; Shivkumar Chandrasekaran; Bangalore S. Manjunath
Show Abstract
Cumulant-based image fingerprints
Author(s): Longjiang Yu; Martin Schmucker; Christoph Busch; Shenghe Sun
Show Abstract
Development of a platform offering video copyright protection and security against illegal distribution
Author(s): Elisa Sayrol; Miquel Soriano; Marcel Fernandez; Joan Casanellas; Joan Tomas
Group-based joint coding and embedding technique for multimedia fingerprinting
Author(s): Shan He; Min Wu
Show Abstract
Shedding light on some possible remedies against watermark desynchronization: a case study
Author(s): Mauro Barni
Show Abstract
Additive non-Gaussian noise attacks on the scalar Costa scheme (SCS)
Author(s): Roman Tzschoppe; Robert Bauml; Robert Fischer; Johannes Huber; Andre Kaup
Show Abstract
Time jitter versus additive noise in a game theory context
Author(s): Abdellatif Zaidi; Remy Boyer; Pierre Duhamel
Show Abstract
Coping with local geometric attacks by means of optic-flow-based resynchronization for robust watermarking
Author(s): R. Caldelli; A. De Rosa; R. Becarelli; Mauro Barni
Show Abstract
Embedding multiple watermarks in the DFT domain using low- and high-frequency bands
Author(s): Emir Ganic; Scott D. Dexter; Ahmet M. Eskicioglu
Show Abstract
TCQ-based quantizer design for data hiding in images
Author(s): Ning Liu; Koduvayur P. Subbalakshmi
Show Abstract
Handling uneven embedding capacity in binary images: a revisit
Author(s): Min Wu; Jessica Fridrich; Miroslav Goljan; Hongmei Gou
Show Abstract
Integer-DCT-based reversible image watermarking by adaptive coefficient modification
Author(s): Bian Yang; Martin Schmucker; Xiamu Niu; Christoph Busch; Shenghe Sun
Show Abstract
Further progress in watermark evaluation testbed (WET)
Author(s): Hyung Cook Kim; Eugene T. Lin; Oriol Guitart; Edward J. Delp
Show Abstract
Benchmarking steganographic and steganalysis techniques
Author(s): Mehdi Kharrazi; Husrev T. Sencar; Nasir Memon
Show Abstract
Characterization of steganographic algorithms using software metrics
Author(s): Chad Heitzenrater
Show Abstract
Application-oriented audio watermark benchmark service
Author(s): Andreas Lang; Jana Dittmann; Eugene T. Lin; Edward J. Delp
Show Abstract
A framework for data-driven algorithm testing
Author(s): Wolfgang Funk; Daniel Kirchner
Show Abstract
Applying Erez and Ten Brink's dirty paper codes to data hiding
Author(s): Pedro Comesana; Fernando Perez-Gonzalez; Frans M. J. Willems
Show Abstract
On achievable error exponents for watermarking
Author(s): Pierre Moulin; Ying Wang
Show Abstract
Secure Lempel-Ziv compression with embedded encryption
Author(s): Dahua Xie; C.-C. Jay Kuo
Show Abstract
Writing on wet paper
Author(s): Jessica Fridrich; Miroslav Goljan; Petr Lisonek; David Soukal
Show Abstract
Spread-spectrum vs. quantization-based data hiding: misconceptions and implications
Author(s): Luis Perez-Freire; Fernando Perez-Gonzalez
Show Abstract
Robust video watermarking via optimization algorithm for quantization of pseudo-random semi-global statistics
Author(s): Mehmet Kucukgoz; Oztan Harmanci; Mehmet Kivanc Mihcak; Ramarathnam Venkatesan
Show Abstract
Temporal synchronization of watermarked video using image hashing
Author(s): Oztan Harmanci; Mehmet Kucukgoz; Mehmet Kivanc Mihcak
Show Abstract
Use of inferential statistics to estimate error probability of video watermarks
Author(s): Isao Echizen; Hiroshi Yoshiura; Yasuhiro Fujii; Takaaki Yamada; Satoru Tezuka
Feature-based watermarking of 3D objects: toward robustness against remeshing and desynchronization
Author(s): Patrice Rondao Alface; Benoit B. Macq
Show Abstract
Printer identification based on graylevel co-occurrence features for security and forensic applications
Author(s): Aravind K. Mikkilineni; Pei-Ju Chiang; Gazi N. Ali; George T. C. Chiu; Jan P. Allebach; Edward J. Delp
Show Abstract
Natural language watermarking
Author(s): Mercan Topkara; Cuneyt M. Taskiran; Edward J. Delp
Show Abstract
A watermarking algorithm for map and chart images
Author(s): Mark A. Masry
Show Abstract
Finding meta data in speech and handwriting biometrics
Author(s): Claus Vielhauer; T. K. Basu; Jana Dittmann; Pranab K. Dutta
Show Abstract
Maximum likelihood amplitude scale estimation for quantization-based watermarking in the presence of dither
Author(s): Ivo D. Shterev; Reginald L. Lagendijk
Show Abstract
Geometrically robust digital image watermarking using scale normalization and flowline curvature
Author(s): Chaw-Seng Woo; Jiang Du; Binh Pham
Show Abstract
Watermarking in JPEG bitstream
Author(s): Robert J. Berger; Bijan G. Mobasseri
Show Abstract
Simple reversible watermarking schemes
Author(s): Dinu Coltuc; Alain Tremeau
Show Abstract
On the choice of risk optimal data embedding strategy, safe embedding rate, and passive steganalysis
Author(s): Rajarathnam Chandramouli
Show Abstract
Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain
Author(s): Jessica Fridrich; David Soukal; Miroslav Goljan
Show Abstract
Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set
Author(s): Jana Dittmann; Danny Hesse; Reyk Hillert
Show Abstract
Unitary embedding for data hiding with the SVD
Author(s): Clifford Bergman; Jennifer Davidson
Show Abstract
Forensic steganalysis: determining the stego key in spatial domain steganography
Author(s): Jessica Fridrich; Miroslav Goljan; David Soukal; Taras Holotyak
Show Abstract
On steganalysis of plus-minus one embedding of continuous-tone images
Author(s): Ping Wah Wong; Hong Chen; Zhongjue Tang
Show Abstract
New multilevel DCT, feature vectors, and universal blind steganalysis
Author(s): Sos S. Agaian; Hong Cai
Show Abstract
Steganalysis of recorded speech
Author(s): Micah K. Johnson; Siwei Lyu; Hany Farid
Show Abstract
Stochastic approach to secret message length estimation in ±k embedding steganography
Author(s): Taras Holotyak; Jessica Fridrich; David Soukal
Show Abstract
Security analysis of robust data-hiding with geometrically structured codebooks
Author(s): E. Topak; Sviatoslav Voloshynovskiy; Oleksiy Koval; M. K. Mihcak; Thierry Pun
Show Abstract
Detection in quantization-based watermarking: performance and security issues
Author(s): Luis Perez-Freire; Pedro Comesana-Alfaro; Fernando Perez-Gonzalez
Show Abstract
New sensitivity analysis attack
Author(s): Maha El Choubassi; Pierre Moulin
Show Abstract
Watermarking security part one: Theory
Author(s): Francois Cayre; Caroline Fontaine; Teddy Furon
Show Abstract
Watermarking security part two: Practice
Author(s): Francois Cayre; Caroline Fontaine; Teddy Furon
Show Abstract
An investigation of robustness in nonlinear audio watermarking
Author(s): Finbarr B. O'Donovan; Neil J. Hurley; Guenole C. M. Silvestre
Show Abstract
Audio watermarking and partial encryption
Author(s): Martin Steinebach; Sascha Zmudzinski; Torsten Bolke
High-capacity invertible data-hiding algorithm for digital audio
Author(s): Brett Bradley; Adnan M. Alattar
Show Abstract

© SPIE. Terms of Use
Back to Top