Share Email Print
cover

Proceedings of SPIE Volume 6072

Security, Steganography, and Watermarking of Multimedia Contents VIII
Format Member Price Non-Member Price
Softcover $105.00 * $105.00 *

*Available as a photocopy reprint only. Allow two weeks reprinting time plus standard delivery time. No discounts or returns apply.


Volume Details

Volume Number: 6072
Date Published: 23 January 2006
Softcover: 74 papers (816) pages
ISBN: 9780819461124

Table of Contents
show all abstracts | hide all abstracts
New blind steganalysis and its implications
Author(s): Miroslav Goljan; Jessica Fridrich; Taras Holotyak
Show Abstract
Statistical modeling and steganalysis of DFT-based image steganography
Author(s): Ying Wang; Pierre Moulin
Show Abstract
Fourth-order structural steganalysis and analysis of cover assumptions
Author(s): Andrew D. Ker
Show Abstract
Application of conditional entropy measures to steganalysis
Author(s): John Marsh; Timothy Knapik; Ephraim Lo; Chad Heitzenrater
Show Abstract
Improving steganalysis by fusion techniques: a case study with image steganography
Author(s): Mehdi Kharrazi; Husrev T. Sencar; Nasir Memon
Show Abstract
A two-factor error model for quantitative steganalysis
Author(s): Rainer Böhme; Andrew D. Ker
Show Abstract
Compression-based steganalysis of LSB embedded images
Author(s): Charles Boncelet; Lisa Marvel; Adrienne Raglin
Show Abstract
Linguistically informed digital fingerprints for text
Author(s): Özlem Uzuner
Show Abstract
Attacks on lexical natural language steganography systems
Author(s): Cuneyt M. Taskiran; Umut Topkara; Mercan Topkara; Edward J. Delp
Show Abstract
Natural language watermarking: challenges in building a practical system
Author(s): Mercan Topkara; Giuseppe Riccardi; Dilek Hakkani-Tür; Mikhail J. Atallah
Show Abstract
Scale estimation in two-band filter attacks on QIM watermarks
Author(s): Jinshen Wang; Ivo D. Shterev; Reginald L. Lagendijk
Show Abstract
High-rate quantization data hiding robust to arbitrary linear filtering attacks
Author(s): Fernando Pérez-González; Carlos Mosquera; Marcos Alvarez; Reginald Lagendijk
Show Abstract
Countermeasure for collusion attacks against digital watermarking
Author(s): Martin Steinebach; Sascha Zmudzinski
Show Abstract
The blind Newton sensitivity attack
Author(s): Pedro Comesaña; Luis Pérez-Freire; Fernando Pérez-González
Show Abstract
Achieving non-ambiguity of quantization-based watermarking
Author(s): Xiangui Kang; Yun Q. Shi; Jiwu Huang
Show Abstract
On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks
Author(s): Maha El Choubassi; Pierre Moulin
Show Abstract
Analyzing handwriting biometrics in metadata context
Author(s): Tobias Scheidat; Franziska Wolf; Claus Vielhauer
Show Abstract
3D face recognition by projection-based methods
Author(s): Helin Dutagaci; Bülent Sankur; Yücel Yemez
Show Abstract
Face biometrics with renewable templates
Author(s): Michiel van der Veen; Tom Kevenaar; Geert-Jan Schrijen; Ton H. Akkermans; Fei Zuo
Show Abstract
Safety of templates in biometric person authentication using error-correcting code
Author(s): Tetsushi Ohki; Shiro Akatsuka; Naohisa Komatsu; Masao Kasahara
Show Abstract
On the comparison of audio fingerprints for extracting quality parameters of compressed audio
Author(s): P. J. O. Doets; M. Menor Gisbert; R. L. Lagendijk
Show Abstract
Fingerprinting with wow
Author(s): Eugene Yu; Scott Craver
Show Abstract
Limited distortion in LSB steganography
Author(s): Younhee Kim; Zoran Duric; Dana Richards
Show Abstract
Multi-class blind steganalysis for JPEG images
Author(s): Tomáš Pevný; Jessica Fridrich
Show Abstract
MPSteg: hiding a message in the matching pursuit domain
Author(s): G. Cancelli; M. Barni; G. Menegaz
Show Abstract
Stego sensitivity measure and multibit plane based steganography using different color models
Author(s): Sos S. Agaian; Benjamin Rodriguez; Juan Pablo Perez
Show Abstract
Zero-knowledge ST-DM watermarking
Author(s): A. Piva; V. Cappellini; D. Corazzi; A. De Rosa; C. Orlandi; M. Barni
Show Abstract
Compression and rotation resistant watermark using a circular chirp structure
Author(s): Christopher E. Fleming; Bijan G. Mobasseri
Show Abstract
Rotation/scale insensitive spread spectrum image watermarking game
Author(s): Maxime Ossonce; Gaëtan Le Guelvouit; Claude Delpha; Pierre Duhamel
Show Abstract
New results on robustness of secure steganography
Author(s): Mark T. Hogan; Félix Balado; Neil J. Hurley; Guénolé C. M. Silvestre
Show Abstract
Sphere-hardening dither modulation
Author(s): F. Balado; N. Hurley; G. Silvestre
Show Abstract
Secret dither estimation in lattice-quantization data hiding: a set membership approach
Author(s): Luis Pérez-Freire; Fernando Pérez-Gonzalez; Pedro Comesaña
Show Abstract
Performance analysis of nonuniform quantization-based data hiding
Author(s): J. E. Vila-Forcén; S. Voloshynovskiy; O. Koval; T. Pun
Show Abstract
Detecting digital image forgeries using sensor pattern noise
Author(s): Jan Lukáš; Jessica Fridrich; Miroslav Goljan
Show Abstract
Fingerprinting digital elevation maps
Author(s): Hongmei Gou; Min Wu
Show Abstract
Information embedding and extraction for electrophotographic printing processes
Author(s): Aravind K. Mikkilineni; Pei-Ju Chiang; Sungjoo Suh; George T. C. Chiu; Jan P. Allebach; Edward J. Delp
Show Abstract
An online system for classifying computer graphics images from natural photographs
Author(s): Tian-Tsong Ng; Shih-Fu Chang
Show Abstract
Text data-hiding for digital and printed documents: theoretical and practical considerations
Author(s): R. Villán; S. Voloshynovskiy; O. Koval; J. Vila; E. Topak; F. Deguillaume; Y. Rytsar; T. Pun
Show Abstract
E-capacity analysis of data-hiding channels with geometrical attacks
Author(s): E. Topak; S. Voloshynovskiy; O. Koval; M. E. Haroutunian; J. E. Vila-Forcén; T. Pun
Show Abstract
Image data-hiding based on capacity-approaching dirty-paper coding
Author(s): Yang Yang; Yong Sun; Vladimir Stanković; Zixiang Xiong
Show Abstract
Wet paper codes with improved embedding efficiency
Author(s): Jessica Fridrich; Miroslav Goljan; David Soukal
Show Abstract
New modulation-based watermarking technique for video
Author(s): Aweke Lemma; Michiel van der Veen; Mehmet Celik
Show Abstract
Selective encryption for H.264/AVC video coding
Author(s): Tuo Shi; Brian King; Paul Salama
Show Abstract
Using entropy for image and video authentication watermarks
Author(s): Stefan Thiemert; Hichem Sahbi; Martin Steinebach
Show Abstract
Temporal synchronization of marked MPEG video frames based on image hash system
Author(s): Enrico Hauer; Martin Steinebach
Show Abstract
Towards robust compressed-domain video watermarking for H.264
Author(s): Maneli Noorkami; Russell M. Mersereau
Show Abstract
Selective video encryption of a distributed coded bitstream using LDPC codes
Author(s): Hwayoung Um; Edward J. Delp
Show Abstract
VLC pair tree: a paradigm for MPEG-2 watermarking
Author(s): Michael P. Marcinak; Bijan G. Mobasseri
Show Abstract
Information-theoretic analysis of electronic and printed document authentication
Author(s): Sviatoslav Voloshynovskiy; Oleksiy Koval; Renato Villan; Emre Topak; José Emilio Vila Forcén; Frederic Deguillaume; Yuriy Rytsar; Thierry Pun
Show Abstract
Joint data hiding and source coding with partially available side information
Author(s): Çağatay Dikici; Khalid Idrissi; Atilla Baskurt
Show Abstract
Asymmetrically informed data-hiding optimization of achievable rate for Laplacian host
Author(s): J. E. Vila-Forcén; S. Voloshynovskiy; O. Koval; E. Topak; T. Pun
Show Abstract
Some theoretical aspects of watermarking detection
Author(s): T. Furon; J. Josse; S. Le Squin
Show Abstract
A framework for the design of good watermark identification codes
Author(s): Pierre Moulin; Ralf Koetter
Show Abstract
Profiles for evaluation: the usage of audio WET
Author(s): Andreas Lang; Jana Dittmann
Show Abstract
A benchmark assessment of the WAUC watermarking audio algorithm
Author(s): David Megías; Jordi Herrera-Joancomart; Jordi Serra; Julià Minguillón
Show Abstract
Transparency benchmarking on audio watermarks and steganography
Author(s): Christian Kraetzer; Jana Dittmann; Andreas Lang
Show Abstract
Shape quality measurement for 3D watermarking schemes
Author(s): Patrice Rondao Alface; Benoit Macq
Show Abstract
A reliability engineering approach to digital watermark evaluation
Author(s): Hyung Cook Kim; Edward J. Delp
Show Abstract
The watermark evaluation testbed (WET): new functionalities
Author(s): Oriol Guitart; Hyung Cook Kim; Edward J. Delp
Show Abstract
Protection and governance of MPEG-21 music player MAF contents using MPEG-21 IPMP tools
Author(s): Hendry; Munchurl Kim
Show Abstract
Watermarking of 3D objects based on 2D apparent contours
Author(s): J. Bennour; J.-L. Dugelay
Show Abstract
Quality assessment of watermarked 3D polygonal models
Author(s): Wolfgang Funk; Jennifer Prasiswa
Show Abstract
Reducing the processing time of the hierarchical watermark detector when applied to unmarked images
Author(s): Adnan M. Alattar; Osama M. Alattar
Show Abstract
Exploring QIM-based anti-collusion fingerprinting for multimedia
Author(s): Ashwin Swaminathan; Shan He; Min Wu
Show Abstract
Reference point detection for improved fingerprint matching
Author(s): Tanya Ignatenko; Ton Kalker; Michiel van der Veen; Asker Bazen
Show Abstract
Perceptual hashing of sheet music based on graphical representation
Author(s): Gert Kremser; Martin Schmucker
Show Abstract
A web oriented and interactive buyer-seller watermarking protocol
Author(s): Franco Frattolillo; Salvatore D'Onofrio
Show Abstract
Matrix embedding for large payloads
Author(s): Jessica Fridrich; David Soukal
Show Abstract
Simple reversible watermarking schemes: further results
Author(s): Dinu Coltuc; Jean-Marc Chassery
Show Abstract
New detector for spread-spectrum based image watermarking using underdetermined ICA
Author(s): Hafiz Malik; Ashfaq Khokhar; Rashid Ansari
Show Abstract
Optimal detector for an additive watermarking scheme based on human auditory system
Author(s): Mohsen Haddad; Andre Gilloire; Alain Le Guyader; Pierre Duhamel
Show Abstract
A hypothesis testing approach for achieving semi-fragility in multimedia authentication
Author(s): Chuhong Fei; Deepa Kundur; Raymond Kwong
Show Abstract
A DWT-based robust semi-blind image watermarking algorithm using two bands
Author(s): Ersin Elbasi; Ahmet M. Eskicioglu
Show Abstract
Evaluating the visual quality of watermarked images
Author(s): Aleksandr Shnayderman; Ahmet M. Eskicioglu
Show Abstract

© SPIE. Terms of Use
Back to Top