Share Email Print
cover

PROCEEDINGS VOLUME 5681

Security, Steganography, and Watermarking of Multimedia Contents VII
Format Member Price Non-Member Price
Softcover $105.00 * $105.00 *

*Available as a photocopy reprint only. Allow two weeks reprinting time plus standard delivery time. No discounts or returns apply.


Volume Details

Volume Number: 5681
Date Published: 21 March 2005
Softcover: 74 papers (816) pages
ISBN: 9780819456540

Table of Contents
show all abstracts | hide all abstracts
Resampling and the detection of LSB matching in color bitmaps
Author(s): Andrew D. Ker
Show Abstract
ML detection of steganography
Author(s): Mark T. Hogan; Neil J. Hurley; Guenole C. M. Silvestre; Felix Balado; Kevin M. Whelan
Show Abstract
Space filling curves in steganalysis
Author(s): Andreas Westfeld
Show Abstract
Steganalysis of spread spectrum data hiding exploiting cover memory
Author(s): Kenneth Sullivan; Upamanyu Madhow; Shivkumar Chandrasekaran; Bangalore S. Manjunath
Show Abstract
Efficient secure image transmission: compression integrated with encryption
Author(s): Paul Salama; Brian King
Show Abstract
A model for improving the performance of feature-extraction-based robust hashing
Author(s): Elizabeth P. McCarthy; Felix Balado; Guenole C. M. Silvestre; Neil J. Hurley
Show Abstract
Cumulant-based image fingerprints
Author(s): Longjiang Yu; Martin Schmucker; Christoph Busch; Shenghe Sun
Show Abstract
Development of a platform offering video copyright protection and security against illegal distribution
Author(s): Elisa Sayrol; Miquel Soriano; Marcel Fernandez; Joan Casanellas; Joan Tomas
Show Abstract
Security architectures and analysis for content adaptation
Author(s): Wenjun Zeng; Junqiang Lan; Xinhua Zhuang
Show Abstract
Group-based joint coding and embedding technique for multimedia fingerprinting
Author(s): Shan He; Min Wu
Show Abstract
Shedding light on some possible remedies against watermark desynchronization: a case study
Author(s): Mauro Barni
Show Abstract
Additive non-Gaussian noise attacks on the scalar Costa scheme (SCS)
Author(s): Roman Tzschoppe; Robert Bauml; Robert Fischer; Johannes Huber; Andre Kaup
Show Abstract
Time jitter versus additive noise in a game theory context
Author(s): Abdellatif Zaidi; Remy Boyer; Pierre Duhamel
Show Abstract
Worst-case additive attack against quantization-based data-hiding methods
Author(s): Jose-Emilio Vila-Forcen; Sviatoslav Voloshynovskiy; Oleksiy J. Koval; Fernando Perez-Gonzalez; Thierry Pun
Show Abstract
Robust hash-based image watermarking with resistance to geometric distortions and watermark-estimation attack
Author(s): Chun-Shien Lu; Shih-Wei Sun; Pao-Chi Chang
Show Abstract
Coping with local geometric attacks by means of optic-flow-based resynchronization for robust watermarking
Author(s): R. Caldelli; A. De Rosa; R. Becarelli; Mauro Barni
Show Abstract
Embedding multiple watermarks in the DFT domain using low- and high-frequency bands
Author(s): Emir Ganic; Scott D. Dexter; Ahmet M. Eskicioglu
Show Abstract
TCQ-based quantizer design for data hiding in images
Author(s): Ning Liu; Koduvayur P. Subbalakshmi
Show Abstract
Handling uneven embedding capacity in binary images: a revisit
Author(s): Min Wu; Jessica Fridrich; Miroslav Goljan; Hongmei Gou
Show Abstract
Ensuring gain-invariance in high-rate data hiding
Author(s): Fernando Perez-Gonzalez; Carlos Mosquera; Mauro Barni; Andrea Abrardo
Show Abstract
Integer-DCT-based reversible image watermarking by adaptive coefficient modification
Author(s): Bian Yang; Martin Schmucker; Xiamu Niu; Christoph Busch; Shenghe Sun
Show Abstract
Three-dimensional image quality measurement for the benchmarking of 3D watermarking schemes
Author(s): Patrice Rondao Alface; Mathieu De Craene; Benoit B. Macq
Show Abstract
Further progress in watermark evaluation testbed (WET)
Author(s): Hyung Cook Kim; Eugene T. Lin; Oriol Guitart; Edward J. Delp
Show Abstract
Benchmarking steganographic and steganalysis techniques
Author(s): Mehdi Kharrazi; Husrev T. Sencar; Nasir Memon
Show Abstract
Characterization of steganographic algorithms using software metrics
Author(s): Chad Heitzenrater
Show Abstract
Application-oriented audio watermark benchmark service
Author(s): Andreas Lang; Jana Dittmann; Eugene T. Lin; Edward J. Delp
Show Abstract
A framework for data-driven algorithm testing
Author(s): Wolfgang Funk; Daniel Kirchner
Show Abstract
Applying Erez and Ten Brink's dirty paper codes to data hiding
Author(s): Pedro Comesana; Fernando Perez-Gonzalez; Frans M. J. Willems
Show Abstract
On achievable error exponents for watermarking
Author(s): Pierre Moulin; Ying Wang
Show Abstract
Secure Lempel-Ziv compression with embedded encryption
Author(s): Dahua Xie; C.-C. Jay Kuo
Show Abstract
Writing on wet paper
Author(s): Jessica Fridrich; Miroslav Goljan; Petr Lisonek; David Soukal
Show Abstract
Spread-spectrum vs. quantization-based data hiding: misconceptions and implications
Author(s): Luis Perez-Freire; Fernando Perez-Gonzalez
Show Abstract
Applying interest operators in semi-fragile video watermarking
Author(s): Stefan Thiemert; Hichem Sahbi; Martin Steinebach
Show Abstract
Robust video watermarking via optimization algorithm for quantization of pseudo-random semi-global statistics
Author(s): Mehmet Kucukgoz; Oztan Harmanci; Mehmet Kivanc Mihcak; Ramarathnam Venkatesan
Show Abstract
Temporal synchronization of watermarked video using image hashing
Author(s): Oztan Harmanci; Mehmet Kucukgoz; Mehmet Kivanc Mihcak
Show Abstract
Robust digital watermark solution for intercoded frames of MPEG video data
Author(s): Enrico Hauer; Martin Steinebach
Show Abstract
Use of inferential statistics to estimate error probability of video watermarks
Author(s): Isao Echizen; Hiroshi Yoshiura; Yasuhiro Fujii; Takaaki Yamada; Satoru Tezuka
Show Abstract
Feature-based watermarking of 3D objects: toward robustness against remeshing and desynchronization
Author(s): Patrice Rondao Alface; Benoit B. Macq
Show Abstract
High-capacity reversible watermarking for 2D vector data
Author(s): Michael Voigt; Bian Yang; Christoph Busch
Show Abstract
Modeling the print-scan process for resilient data hiding
Author(s): Kaushal Solanki; Upamanyu Madhow; Bangalore S. Manjunath; Shivkumar Chandrasekaran
Show Abstract
Printer identification based on graylevel co-occurrence features for security and forensic applications
Author(s): Aravind K. Mikkilineni; Pei-Ju Chiang; Gazi N. Ali; George T. C. Chiu; Jan P. Allebach; Edward J. Delp
Show Abstract
Natural language watermarking
Author(s): Mercan Topkara; Cuneyt M. Taskiran; Edward J. Delp
Show Abstract
Multilevel 2D bar codes: toward high capacity storage modules for multimedia security and management
Author(s): Renato Villan; Sviatoslav Voloshynovskiy; Oleksiy Koval; Thierry Pun
Show Abstract
Hiding phase-quantized biometrics: a case of steganography for reduced-complexity correlation filter classifiers
Author(s): Pablo Hennings; Marios Savvides; B.V.K. Vijaya Kumar
Show Abstract
Security analysis for biometric data in ID documents
Author(s): Sascha Schimke; Stefan Kiltz; Claus Vielhauer; Ton Kalker
Show Abstract
Quaternion correlation filters for color face recognition
Author(s): Chunyan Xie; B.V.K. Vijaya Kumar
Show Abstract
A watermarking algorithm for map and chart images
Author(s): Mark A. Masry
Show Abstract
Finding meta data in speech and handwriting biometrics
Author(s): Claus Vielhauer; T. K. Basu; Jana Dittmann; Pranab K. Dutta
Show Abstract
Maximum likelihood amplitude scale estimation for quantization-based watermarking in the presence of dither
Author(s): Ivo D. Shterev; Reginald L. Lagendijk
Show Abstract
Geometrically robust digital image watermarking using scale normalization and flowline curvature
Author(s): Chaw-Seng Woo; Jiang Du; Binh Pham
Show Abstract
Watermarking in JPEG bitstream
Author(s): Robert J. Berger; Bijan G. Mobasseri
Show Abstract
Iterative estimation of amplitude scaling on distortion-compensated dither modulation
Author(s): Kevin M. Whelan; Felix Balado; Guenole C. M. Silvestre; Neil J. Hurley
Show Abstract
Simple reversible watermarking schemes
Author(s): Dinu Coltuc; Alain Tremeau
Show Abstract
Robustness improvement of known-host-state watermarking using host statistics
Author(s): Oleksiy Koval; Sviatoslav Voloshynovskiy; F. Deguillaume; Fernando Perez-Gonzalez; Thierry Pun
Show Abstract
Illustration watermarking: an object-based approach for digital images
Author(s): Thomas Vogel; Jana Dittmann
Show Abstract
On the choice of risk optimal data embedding strategy, safe embedding rate, and passive steganalysis
Author(s): Rajarathnam Chandramouli
Show Abstract
Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain
Author(s): Jessica Fridrich; David Soukal; Miroslav Goljan
Show Abstract
Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set
Author(s): Jana Dittmann; Danny Hesse; Reyk Hillert
Show Abstract
Unitary embedding for data hiding with the SVD
Author(s): Clifford Bergman; Jennifer Davidson
Show Abstract
Forensic steganalysis: determining the stego key in spatial domain steganography
Author(s): Jessica Fridrich; Miroslav Goljan; David Soukal; Taras Holotyak
Show Abstract
On steganalysis of plus-minus one embedding of continuous-tone images
Author(s): Ping Wah Wong; Hong Chen; Zhongjue Tang
Show Abstract
New multilevel DCT, feature vectors, and universal blind steganalysis
Author(s): Sos S. Agaian; Hong Cai
Show Abstract
Steganalysis of recorded speech
Author(s): Micah K. Johnson; Siwei Lyu; Hany Farid
Show Abstract
Stochastic approach to secret message length estimation in ±k embedding steganography
Author(s): Taras Holotyak; Jessica Fridrich; David Soukal
Show Abstract
Collusion issue in video watermarking
Author(s): Gwenael Doerr; Jean-Luc Dugelay
Show Abstract
Achieving computational and unconditional security in authentication watermarking: analysis, insights, and algorithms
Author(s): Chuhong Fei; Deepa Kundur; Raymond Kwong
Show Abstract
Security analysis of robust data-hiding with geometrically structured codebooks
Author(s): E. Topak; Sviatoslav Voloshynovskiy; Oleksiy Koval; M. K. Mihcak; Thierry Pun
Show Abstract
Detection in quantization-based watermarking: performance and security issues
Author(s): Luis Perez-Freire; Pedro Comesana-Alfaro; Fernando Perez-Gonzalez
Show Abstract
New sensitivity analysis attack
Author(s): Maha El Choubassi; Pierre Moulin
Show Abstract
Watermarking security part one: Theory
Author(s): Francois Cayre; Caroline Fontaine; Teddy Furon
Show Abstract
Watermarking security part two: Practice
Author(s): Francois Cayre; Caroline Fontaine; Teddy Furon
Show Abstract
An investigation of robustness in nonlinear audio watermarking
Author(s): Finbarr B. O'Donovan; Neil J. Hurley; Guenole C. M. Silvestre
Show Abstract
Audio watermarking and partial encryption
Author(s): Martin Steinebach; Sascha Zmudzinski; Torsten Bolke
Show Abstract
High-capacity invertible data-hiding algorithm for digital audio
Author(s): Brett Bradley; Adnan M. Alattar
Show Abstract

© SPIE. Terms of Use
Back to Top