Share Email Print
cover

Proceedings of SPIE Volume 7254

Media Forensics and Security
Format Member Price Non-Member Price
Softcover $105.00 * $105.00 *

*Available as a photocopy reprint only. Allow two weeks reprinting time plus standard delivery time. No discounts or returns apply.


Volume Details

Volume Number: 7254
Date Published: 4 February 2009
Softcover: 41 papers (438) pages
ISBN: 9780819475046

Table of Contents
show all abstracts | hide all abstracts
Front Matter: 7254
Author(s): Proceedings of SPIE
Show Abstract
Video fingerprinting for copy identification: from research to industry applications
Author(s): Jian Lu
Show Abstract
Video fingerprinting for live events
Author(s): Mehmet Celik; Jaap Haitsma; Pavlo Barvinko; Gerhard Langelaar; Martijn Maas
Show Abstract
Machine-assisted editing of user-generated content
Author(s): Markus Cremer; Randall Cook
Show Abstract
Image and video fingerprinting: forensic applications
Author(s): Frédéric Lefebvre; Bertrand Chupeau; Ayoub Massoudi; Eric Diehl
Show Abstract
Robust efficient video fingerprinting
Author(s): Manika Puri; Jeffrey Lubin
Show Abstract
A review of video fingerprints invariant to geometric attacks
Author(s): Regunathan Radhakrishnan; Wenyu Jiang; Claus Bauer
Show Abstract
The square root law of steganographic capacity for Markov covers
Author(s): Tomáš Filler; Andrew D. Ker; Jessica Fridrich
Show Abstract
The impact of information fusion in steganalysis on the example of audio steganalysis
Author(s): Christian Kraetzer; Jana Dittmann
Show Abstract
Feature reduction and payload location with WAM steganalysis
Author(s): Andrew D. Ker; Ivans Lubenko
Show Abstract
Model-based steganalysis using invariant features
Author(s): Tu-Thach Quach; Fernando Pérez-González; Gregory L. Heileman
Show Abstract
From blind to quantitative steganalysis
Author(s): Tomáš Pevny; Jessica Fridrich; Andrew D. Ker
Show Abstract
Conception and limits of robust perceptual hashing: towards side information assisted hash functions
Author(s): Sviatoslav Voloshynovskiy; Oleksiy Koval; Fokko Beekhof; Thierry Pun
Show Abstract
Expectation maximization decoding of Tardos probabilistic fingerprinting code
Author(s): Ana Charpentier; Fuchun Xie; Caroline Fontaine; Teddy Furon
Show Abstract
Joint detection-estimation games for sensitivity analysis attacks
Author(s): Maha El Choubassi; Pierre Moulin
Show Abstract
On security threats for robust perceptual hashing
Author(s): O. Koval; S. Voloshynovskiy; P. Bas; F. Cayre
Show Abstract
Large scale test of sensor fingerprint camera identification
Author(s): Miroslav Goljan; Jessica Fridrich; Tomáš Filler
Show Abstract
Detection and description of geometrically transformed digital images
Author(s): Babak Mahdian; Stanislav Saic
Show Abstract
Synthesis of color filter array pattern in digital images
Author(s): Matthias Kirchner; Rainer Böhme
Show Abstract
Lighting analysis of diffusely illuminated tableaus in realist paintings: an application to detecting "compositing" in the portraits of Garth Herrick
Author(s): David G. Stork; Micah K. Johnson
Show Abstract
A study of the robustness of PRNU-based camera identification
Author(s): Kurt Rosenfeld; Husrev Taha Sencar
Show Abstract
Robust fingerprinting codes and applications
Author(s): Aggelos Kiayias
Show Abstract
Practical tracing traitors
Author(s): Jeffrey Lotspiech; Hongxia Jin
Show Abstract
Next generation DRM: cryptography or forensics?
Author(s): Arnaud Robert
Show Abstract
Stream it to me! Why is it challenging?
Author(s): Thomas Scott
Show Abstract
Broadcast encryption: paving the road to practical content protection systems
Author(s): G. Deen; D. Ponceleon; Donald Leake
Show Abstract
Exhibition QIM-based watermarking for digital cinema
Author(s): Pilar Callau; Rony Darazi; Benoît Macq
Show Abstract
Digital watermarking for digital cinema
Author(s): Stefan Thiemert; Martin Steinebach; Huajian Liu
Show Abstract
Protocols for data hiding in pseudo-random state
Author(s): Scott Craver; Enping Li; Jun Yu
Show Abstract
High-capacity data hiding in text documents
Author(s): Aravind K. Mikkilineni; George T. C. Chiu; Jan P. Allebach; Edward J. Delp
Show Abstract
Digital watermarking opportunities enabled by mobile media proliferation
Author(s): Sierra Modro; Ravi K. Sharma
Show Abstract
Real-time application of digital watermarking to embed tactical metadata into full motion video captured from unmanned aerial systems
Author(s): Alex Philp; Brett Bradley; John Stach; Tony Rodriguez
Show Abstract
Binary forensic code for multimedia signals: resisting minority collusion attacks
Author(s): W. Sabrina Lin; Shan He; Jeffrey Bloom
Show Abstract
Authenticating cropped and resized images using distributed source coding and expectation maximization
Author(s): Yao-Chung Lin; David Varodayan; Bernd Girod
Show Abstract
Random projections based item authentication
Author(s): Sviatoslav Voloshynovskiy; Oleksiy Koval; Fokko Beekhof; Thierry Pun
Show Abstract
Perception-based authentication watermarking for digital audio data
Author(s): Sascha Zmudzinski; Martin Steinebach
Show Abstract
Improvements on image authentication and recovery using distributed source coding
Author(s): Nitin Khanna; Antoni Roca; George T. C. Chiu; Jan P. Allebach; Edward J. Delp
Show Abstract
Nested object watermarking
Author(s): Claus Vielhauer; Maik Schott; Jana Dittmann
Show Abstract
High capacity color barcodes using dot orientation and color separability
Author(s): Orhan Bulan; Vishal Monga; Gaurav Sharma
Show Abstract
Enabling search over encrypted multimedia databases
Author(s): Wenjun Lu; Ashwin Swaminathan; Avinash L. Varna; Min Wu
Show Abstract
RF device forensics using passband filter analysis
Author(s): Deen King-Smith; Aravind K. Mikkilineni; Saul Gelfand; Edward J. Delp
Show Abstract
H.264/AVC substitution watermarking: a CAVLC example
Author(s): Dekun Zou; Jeffrey A. Bloom
Show Abstract

© SPIE. Terms of Use
Back to Top