Share Email Print
cover

Proceedings of SPIE Volume 6819

Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
Format Member Price Non-Member Price
Softcover $105.00 * $105.00 *

*Available as a photocopy reprint only. Allow two weeks reprinting time plus standard delivery time. No discounts or returns apply.


Volume Details

Volume Number: 6819
Date Published: 2 April 2008
Softcover: 51 papers (564) pages
ISBN: 9780819469915

Table of Contents
show all abstracts | hide all abstracts
Front Matter: Volume
Author(s): Proceedings of SPIE
Show Abstract
Influence of embedding strategies on security of steganographic methods in the JPEG domain
Author(s): Jan Kodovský; Jessica Fridrich
Show Abstract
WLAN steganography revisited
Author(s): Christian Kraetzer; Jana Dittmann; Ronny Merkel
Show Abstract
Steganographic strategies for a square distortion function
Author(s): Andrew D. Ker
Show Abstract
Revisiting weighted stego-image steganalysis
Author(s): Andrew D. Ker; Rainer Böhme
Show Abstract
Security analysis of robust perceptual hashing
Author(s): Oleksiy Koval; Sviatoslav Voloshynovskiy; Fokko Beekhof; Thierry Pun
Show Abstract
A low-rate fingerprinting code and its application to blind image fingerprinting
Author(s): Jean-Francois Jourdas; Pierre Moulin
Show Abstract
Improved lower bounds on embedding distortion in information hiding
Author(s): Younhee Kim; Zoran Duric; Dana Richards
Show Abstract
Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks
Author(s): Pedro Comesaña; Neri Merhav; Mauro Barni
Show Abstract
A high-rate fingerprinting code
Author(s): Jean-Francois Jourdas; Pierre Moulin
Show Abstract
Analysis of physical unclonable identification based on reference list decoding
Author(s): Oleksiy Koval; Sviatoslav Voloshynovskiy; Fokko Beekhof; Thierry Pun
Show Abstract
Data embedding in hardcopy images via halftone-dot orientation modulation
Author(s): Orhan Bulan; Vishal Monga; Gaurav Sharma; Basak Oztan
Show Abstract
Secure surface identification codes
Author(s): F. Beekhof; S. Voloshynovskiy; O. Koval; R. Villan; T. Pun
Show Abstract
Camera identification from cropped and scaled images
Author(s): Miroslav Goljan; Jessica Fridrich
Show Abstract
On the detectability of local resampling in digital images
Author(s): Matthias Kirchner
Show Abstract
Scanner identification with extension to forgery detection
Author(s): Nitin Khanna; George T. C. Chiu; Jan P. Allebach; Edward J. Delp
Show Abstract
Individuality evaluation for paper based artifact-metrics using transmitted light image
Author(s): Manabu Yamakoshi; Junichi Tanaka; Makoto Furuie; Masashi Hirabayashi; Tsutomu Matsumoto
Show Abstract
Camera identification from printed images
Author(s): Miroslav Goljan; Jessica Fridrich; Jan Lukáš
Show Abstract
Toward robust watermarking of scalable video
Author(s): Peter Meerwald; Andreas Uhl
Show Abstract
The video watermarking container: efficient real-time transaction watermarking
Author(s): Patrick Wolf; Enrico Hauer; Martin Steinebach
Show Abstract
Robust audio hashing for audio authentication watermarking
Author(s): Sascha Zmudzinski; Martin Steinebach
Show Abstract
Comparison of compression algorithms' impact on iris recognition accuracy II: revisiting JPEG
Author(s): Stefan Jenisch; Stefan Lukesch; Andreas Uhl
Show Abstract
Biometric hashing for handwriting: entropy-based feature selection and semantic fusion
Author(s): Tobias Scheidat; Claus Vielhauer
Show Abstract
Realization of correlation attack against the fuzzy vault scheme
Author(s): Alisher Kholmatov; Berrin Yanikoglu
Show Abstract
Error exponent analysis of person identification based on fusion of dependent/independent modalities: multiple hypothesis testing case
Author(s): Oleksiy Koval; Sviatoslav Voloshynovskiy; Renato Villan; Thierry Pun
Show Abstract
Bridging biometrics and forensics
Author(s): Yanjun Yan; Lisa Ann Osadciw
Show Abstract
Security issues of Internet-based biometric authentication systems: risks of Man-in-the-Middle and BioPhishing on the example of BioWebAuth
Author(s): Christian Zeitz; Tobias Scheidat; Jana Dittmann; Claus Vielhauer; Elisardo González Agulla; Enrique Otero Muras; Carmen García Mateo; José L. Alba Castro
Show Abstract
Anticollusion watermarking of 3D meshes by prewarping
Author(s): Francesca Uccheddu; C.-C. Jay Kuo; Mauro Barni
Show Abstract
In-theater piracy: finding where the pirate was
Author(s): Bertrand Chupeau; Ayoub Massoudi; Frédéric Lefèbvre
Show Abstract
A theoretical analysis of spatial/temporal modulation-based systems for prevention of illegal recordings in movie theaters
Author(s): Pascal Bourdon; Sylvain Thiebaud; Didier Doyen
Show Abstract
Toward DRM for 3D geometry data
Author(s): Michael Gschwandtner; Andreas Uhl
Show Abstract
Establishing target track history by digital watermarking
Author(s): Bijan G. Mobasseri; Preethi Krishnamurthy
Show Abstract
MPEG recompression detection based on block artifacts
Author(s): Weiqi Luo; Min Wu; Jiwu Huang
Show Abstract
Cover signal specific steganalysis: the impact of training on the example of two selected audio steganalysis approaches
Author(s): Christian Kraetzer; Jana Dittmann
Show Abstract
Evaluation of robustness and transparency of multiple audio watermark embedding
Author(s): Martin Steinebach; Sascha Zmudzinski
Show Abstract
Forensic watermarking and bit-rate conversion of partially encrypted AAC bitstreams
Author(s): Aweke Lemma; Stefan Katzenbeisser; Mehmet U. Celik; S. Kirbiz
Show Abstract
Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images
Author(s): Tomáš Pevný; Jessica Fridrich
Show Abstract
Textural features based universal steganalysis
Author(s): Bin Li; Jiwu Huang; Yun Q. Shi
Show Abstract
Isotropy-based steganalysis in multiple least significant bits
Author(s): Xiaoyi Yu; Noboru Babaguchi; Yunhong Wang
Show Abstract
Nonparametric steganalysis of QIM data hiding using approximate entropy
Author(s): Hafiz Malik; K. P. Subbalakshmi; R. Chandramouli
Show Abstract
Steganalysis-aware steganography: statistical indistinguishability despite high distortion
Author(s): Adem Orsdemir; H. Oktay Altun; Gaurav Sharma; Mark F. Bocko
Show Abstract
Steganographic capacity estimation for the statistical restoration framework
Author(s): Anindya Sarkar; Kenneth Sullivan; B. S. Manjunath
Show Abstract
Further study on YASS: steganography based on randomized embedding to resist blind steganalysis
Author(s): Anindya Sarkar; Kaushal Solanki; B. S. Manjunath
Show Abstract
Nested object watermarking: transparency and capacity evaluation
Author(s): Claus Vielhauer; Maik Schott; Christian Krätzer; Jana Dittmann
Show Abstract
Reduced embedding complexity using BP message passing for LDGM codes
Author(s): Peter Günther; Dagmar Schönfeld; Antje Winkler
Show Abstract
A joint asymmetric watermarking and image encryption scheme
Author(s): G. Boato; V. Conotter; F. G. B. De Natale; C. Fontanari
Show Abstract
Robust digital image watermarking in curvelet domain
Author(s): Peining Tao; Scott Dexter; Ahmet M. Eskicioglu
Show Abstract
A joint digital watermarking and encryption method
Author(s): M. Cancellaro; F. Battisti; M. Carli; G. Boato; F. G. B. De Natale; A. Neri
Show Abstract
Embedding considering dependencies between pixels
Author(s): Elke Franz
Show Abstract
A reversible data hiding method for encrypted images
Author(s): W. Puech; M. Chaumont; O. Strauss
Show Abstract
Improved embedding efficiency and AWGN robustness for SS watermarks via pre-coding
Author(s): H. Oktay Altun; Orhan Bulan; Gaurav Sharma; Mark F. Bocko
Show Abstract
Perceptual hash based blind geometric synchronization of images for watermarking
Author(s): Baris Coskun; M. Kivanç Mihçak
Show Abstract

© SPIE. Terms of Use
Back to Top