Share Email Print
cover

Proceedings of SPIE Volume 6505

Security, Steganography, and Watermarking of Multimedia Contents IX
Format Member Price Non-Member Price
Softcover $105.00 * $105.00 *

*Available as a photocopy reprint only. Allow two weeks reprinting time plus standard delivery time. No discounts or returns apply.


Volume Details

Volume Number: 6505
Date Published: 26 February 2007
Softcover: 64 papers (672) pages
ISBN: 9780819466181

Table of Contents
show all abstracts | hide all abstracts
Front Matter: Volume 6505
Author(s): Proceedings of SPIE
Practical methods for minimizing embedding impact in steganography
Author(s): Jessica Fridrich; Tomas Filler
Show Abstract
Merging Markov and DCT features for multi-class JPEG steganalysis
Author(s): Tomas Pevny; Jessica Fridrich
Show Abstract
Batch steganography and the threshold game
Author(s): Andrew D. Ker
Show Abstract
Mel-cepstrum based steganalysis for VoIP steganography
Author(s): Christian Kraetzer; Jana Dittmann
Show Abstract
Optimally weighted least-squares steganalysis
Author(s): Andrew D. Ker
Show Abstract
Blind source separation for steganalytic secret message estimation
Author(s): Aruna Ambalavanan; R. Chandramouli
Show Abstract
Robust message authentication code algorithm for digital audio recordings
Author(s): Sascha Zmudzinski; Martin Steinebach
Show Abstract
Blind audio watermark synchronization by passive audio fingerprinting
Author(s): Martin Steinebach; Sascha Zmudzinski
Show Abstract
Audio watermarking robust to geometrical distortions based on dyadic wavelet transform
Author(s): Yong Wang; Shaoquan Wu; Jiwu Huang
Show Abstract
Efficient non-interactive zero-knowledge watermark detector robust to sensitivity attacks
Author(s): Juan Ramón Troncoso; Fernando Pérez-González
Show Abstract
Reverse-engineering a detector with false alarms
Author(s): Scott Craver; Jun Yu
Show Abstract
On distortion measures associated to random desynchronization attacks
Author(s): Félix Balado; Fernando Pérez-González
Show Abstract
Fast and automatic watermark resynchronization based on Zernike moments
Author(s): Xiangui Kang; Chunhui Liu; Wenjun Zeng; Jiwu Huang; Congbai Liu
Show Abstract
Security of spread-spectrum-based data hiding
Author(s): Luis Pérez-Freire; Pierre Moulin; Fernando Pérez-González
Show Abstract
Trellis coded modulation to improve dirty paper trellis watermarking
Author(s): Chin Kiong Wang; Gwenaël Doërr; Ingemar Cox
Show Abstract
Cramer-Rao bound on watermark desynchronization parameter estimation accuracy
Author(s): Shankar Sadasivam; Pierre Moulin
Show Abstract
A novel interpretation of content authentication
Author(s): Pedro Comesaña; Félix Balado; Fernando Pérez-González
Show Abstract
Capacity and optimal collusion attack channels for Gaussian fingerprinting games
Author(s): Ying Wang; Pierre Moulin
Show Abstract
Sphere packing lower bound on fingerprinting error probability
Author(s): Negar Kiyavash; Pierre Moulin
Show Abstract
Nested object watermarking: comparison of block-luminance and blue channel LSB wet paper code image watermarking
Author(s): Claus Vielhauer; Jana Dittmann
Show Abstract
Deterring watermark collusion attacks using signal processing techniques
Author(s): Aweke N. Lemma; Michiel van der Veen
Show Abstract
Experimental study on watermark interference in multiple re-watermarking
Author(s): Daniel Mark; Andreas Uhl; Hartmut Wernisch
Show Abstract
Evaluation of standard watermarking techniques
Author(s): Enrico Marini; Florent Autrusseau; Patrick Le Callet; Patrizio Campisi
Show Abstract
Digital imaging sensor identification (further study)
Author(s): Mo Chen; Jessica Fridrich; Miroslav Goljan
Show Abstract
Joint forensics and watermarking approach for video authentication
Author(s): Stefan Thiemert; Huajian Liu; Martin Steinebach; Lucilla Croce-Ferri
Show Abstract
Image splicing detection using 2D phase congruency and statistical moments of characteristic function
Author(s): Wen Chen; Yun Q. Shi; Wei Su
Show Abstract
Robust scanner identification based on noise features
Author(s): Hongmei Gou; Ashwin Swaminathan; Min Wu
Show Abstract
Detection of malevolent changes in digital video for forensic applications
Author(s): N. Mondaini; R. Caldelli; A. Piva; M. Barni; V. Cappellini
Show Abstract
Forensic classification of imaging sensor types
Author(s): Nitin Khanna; Aravind K. Mikkilineni; George T. C. Chiu; Jan P. Allebach; Edward J. Delp
Show Abstract
Information hiding through errors: a confusing approach
Author(s): Mercan Topkara; Umut Topkara; Mikhail J. Atallah
Show Abstract
A comprehensive bibliography of linguistic steganography
Author(s): Richard Bergmair
Show Abstract
Syntactic tools for text watermarking
Author(s): Hasan M. Meral; Emre Sevinç; Ersin Ünkar; Bülent Sankur; A. Sumru Özsoy; Tunga Güngör
Show Abstract
The syntax of concealment: reliable methods for plain text information hiding
Author(s): Brian Murphy; Carl Vogel
Show Abstract
Statistically constrained shallow text marking: techniques, evaluation paradigm, and results
Author(s): Brian Murphy; Carl Vogel
Show Abstract
Adaptive and distributed cryptography for signature biometrics protection
Author(s): Patrizio Campisi; Emanuele Maiorana; Miguel Gonzalez Prats; Alessandro Neri
Show Abstract
Analyzing a multimodal biometric system using real and virtual users
Author(s): Tobias Scheidat; Claus Vielhauer
Show Abstract
Digital watermarking of biometric speech references: impact to the EER system performance
Author(s): Andreas Lang; Jana Dittmann
Show Abstract
How to protect biometric templates
Author(s): Yagiz Sutcu; Qiming Li; Nasir Memon
Show Abstract
Error exponent analysis of person identification based on fusion of dependent/independent modalities
Author(s): Oleksiy Koval; Sviatoslav Voloshynovskiy; Thierry Pun
Show Abstract
The first BOWS contest (Break Our Watermarking System)
Author(s): A. Piva; M. Barni
Show Abstract
The good, the bad, and the ugly: three different approaches to break their watermarking system
Author(s): G. Le Guelvouit; T. Furon; F. Cayre
Show Abstract
Watermarking attack: BOWS contest
Author(s): J. Bennour; J.-L. Dugelay; F. Matta
Show Abstract
Tangential sensitivity analysis of watermarks using prior information
Author(s): John W. Earl
Show Abstract
Tackling BOWS with the sensitivity attack
Author(s): Andreas Westfeld
Show Abstract
Two different approaches for attacking BOWS
Author(s): Pedro Comesaña; Fernando Pérez-González
Show Abstract
How we broke the BOWS watermark
Author(s): Scott Craver; Idris Atakli; Jun Yu
Show Abstract
Adaptive MPEG-2 video data hiding scheme
Author(s): Anindya Sarkar; Upamanyu Madhow; Shivkumar Chandrasekaran; Bangalore S. Manjunath
Show Abstract
Digital video watermarking in P-frames
Author(s): Maneli Noorkami; Russell M. Mersereau
Show Abstract
Framework for combined video frame synchronization and watermark detection
Author(s): Enrico Hauer; Torsten Bölke; Martin Steinebach
Show Abstract
Source digital camcorder identification using sensor photo response non-uniformity
Author(s): Mo Chen; Jessica Fridrich; Miroslav Goljan; Jan Lukáš
Show Abstract
Blind identification of cellular phone cameras
Author(s): Oya Çeliktutan; Ismail Avcibas; Bülent Sankur
Show Abstract
Forensics for flatbed scanners
Author(s): Thomas Gloe; Elke Franz; Antje Winkler
Show Abstract
Intrinsic fingerprints for image authentication and steganalysis
Author(s): Ashwin Swaminathan; Min Wu; K. J. Ray Liu
Show Abstract
Scanner identification using sensor pattern noise
Author(s): Nitin Khanna; Aravind K. Mikkilineni; George T. C. Chiu; Jan P. Allebach; Edward J. Delp
Show Abstract
A generalized Benford’s law for JPEG coefficients and its applications in image forensics
Author(s): Dongdong Fu; Yun Q. Shi; Wei Su
Show Abstract
Distortion-free robust watermarking: a case study
Author(s): Dinu Coltuc; Jean-Marc Chassery
Show Abstract
Hidden context highlighting with JPEG2000 imagery
Author(s): René Rosenbaum; Heidrun Schumann
Show Abstract
Perceptual data hiding in tree structured Haar transform domain
Author(s): M. Cancellaro; M. Carli; K. Egiazarian; J. Astola
Show Abstract
A method of text watermarking using presuppositions
Author(s): O. Vybornova; B. Macq
Show Abstract
An evaluation of lightweight JPEG2000 encryption with anisotropic wavelet packets
Author(s): Dominik Engel; Andreas Uhl
Show Abstract
Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding
Author(s): R. Villán; S. Voloshynovskiy; O. Koval; F. Deguillaume; T. Pun
Show Abstract
Channel model and operational capacity analysis of printed text documents
Author(s): Aravind K. Mikkilineni; Pei-Ju Chiang; George T. C. Chiu; Jan P. Allebach; Edward J. Delp
Show Abstract
Watermarking geographic vector-data using a variable strip-size scheme
Author(s): Michael Voigt
Show Abstract
Authentication of H.264 streams by direct watermarking of CAVLC blocks
Author(s): Bijan G. Mobasseri; Yatish Naik Raikar
Show Abstract

© SPIE. Terms of Use
Back to Top