Share Email Print
cover

PROCEEDINGS VOLUME 6505

Security, Steganography, and Watermarking of Multimedia Contents IX
For the purchase of this volume in printed format, please visit Proceedings.com

Volume Details

Volume Number: 6505
Date Published: 26 February 2007

Table of Contents
show all abstracts | hide all abstracts
Front Matter: Volume 6505
Author(s): Proceedings of SPIE
Practical methods for minimizing embedding impact in steganography
Author(s): Jessica Fridrich; Tomas Filler
Show Abstract
Merging Markov and DCT features for multi-class JPEG steganalysis
Author(s): Tomas Pevny; Jessica Fridrich
Show Abstract
Batch steganography and the threshold game
Author(s): Andrew D. Ker
Show Abstract
Mel-cepstrum based steganalysis for VoIP steganography
Author(s): Christian Kraetzer; Jana Dittmann
Show Abstract
Optimally weighted least-squares steganalysis
Author(s): Andrew D. Ker
Show Abstract
Blind source separation for steganalytic secret message estimation
Author(s): Aruna Ambalavanan; R. Chandramouli
Show Abstract
Robust message authentication code algorithm for digital audio recordings
Author(s): Sascha Zmudzinski; Martin Steinebach
Show Abstract
Blind audio watermark synchronization by passive audio fingerprinting
Author(s): Martin Steinebach; Sascha Zmudzinski
Show Abstract
Audio watermarking robust to geometrical distortions based on dyadic wavelet transform
Author(s): Yong Wang; Shaoquan Wu; Jiwu Huang
Show Abstract
Efficient non-interactive zero-knowledge watermark detector robust to sensitivity attacks
Author(s): Juan Ramón Troncoso; Fernando Pérez-González
Show Abstract
Reverse-engineering a detector with false alarms
Author(s): Scott Craver; Jun Yu
Show Abstract
On distortion measures associated to random desynchronization attacks
Author(s): Félix Balado; Fernando Pérez-González
Show Abstract
Fast and automatic watermark resynchronization based on Zernike moments
Author(s): Xiangui Kang; Chunhui Liu; Wenjun Zeng; Jiwu Huang; Congbai Liu
Show Abstract
Security of spread-spectrum-based data hiding
Author(s): Luis Pérez-Freire; Pierre Moulin; Fernando Pérez-González
Show Abstract
Trellis coded modulation to improve dirty paper trellis watermarking
Author(s): Chin Kiong Wang; Gwenaël Doërr; Ingemar Cox
Show Abstract
Cramer-Rao bound on watermark desynchronization parameter estimation accuracy
Author(s): Shankar Sadasivam; Pierre Moulin
Show Abstract
A novel interpretation of content authentication
Author(s): Pedro Comesaña; Félix Balado; Fernando Pérez-González
Show Abstract
Capacity and optimal collusion attack channels for Gaussian fingerprinting games
Author(s): Ying Wang; Pierre Moulin
Show Abstract
Sphere packing lower bound on fingerprinting error probability
Author(s): Negar Kiyavash; Pierre Moulin
Show Abstract
Nested object watermarking: comparison of block-luminance and blue channel LSB wet paper code image watermarking
Author(s): Claus Vielhauer; Jana Dittmann
Show Abstract
Deterring watermark collusion attacks using signal processing techniques
Author(s): Aweke N. Lemma; Michiel van der Veen
Show Abstract
Experimental study on watermark interference in multiple re-watermarking
Author(s): Daniel Mark; Andreas Uhl; Hartmut Wernisch
Show Abstract
Evaluation of standard watermarking techniques
Author(s): Enrico Marini; Florent Autrusseau; Patrick Le Callet; Patrizio Campisi
Show Abstract
Digital imaging sensor identification (further study)
Author(s): Mo Chen; Jessica Fridrich; Miroslav Goljan
Show Abstract
Joint forensics and watermarking approach for video authentication
Author(s): Stefan Thiemert; Huajian Liu; Martin Steinebach; Lucilla Croce-Ferri
Show Abstract
Image splicing detection using 2D phase congruency and statistical moments of characteristic function
Author(s): Wen Chen; Yun Q. Shi; Wei Su
Show Abstract
Robust scanner identification based on noise features
Author(s): Hongmei Gou; Ashwin Swaminathan; Min Wu
Show Abstract
Detection of malevolent changes in digital video for forensic applications
Author(s): N. Mondaini; R. Caldelli; A. Piva; M. Barni; V. Cappellini
Show Abstract
Forensic classification of imaging sensor types
Author(s): Nitin Khanna; Aravind K. Mikkilineni; George T. C. Chiu; Jan P. Allebach; Edward J. Delp
Show Abstract
Information hiding through errors: a confusing approach
Author(s): Mercan Topkara; Umut Topkara; Mikhail J. Atallah
Show Abstract
A comprehensive bibliography of linguistic steganography
Author(s): Richard Bergmair
Show Abstract
Syntactic tools for text watermarking
Author(s): Hasan M. Meral; Emre Sevinç; Ersin Ünkar; Bülent Sankur; A. Sumru Özsoy; Tunga Güngör
Show Abstract
The syntax of concealment: reliable methods for plain text information hiding
Author(s): Brian Murphy; Carl Vogel
Show Abstract
Statistically constrained shallow text marking: techniques, evaluation paradigm, and results
Author(s): Brian Murphy; Carl Vogel
Show Abstract
Adaptive and distributed cryptography for signature biometrics protection
Author(s): Patrizio Campisi; Emanuele Maiorana; Miguel Gonzalez Prats; Alessandro Neri
Show Abstract
Analyzing a multimodal biometric system using real and virtual users
Author(s): Tobias Scheidat; Claus Vielhauer
Show Abstract
Digital watermarking of biometric speech references: impact to the EER system performance
Author(s): Andreas Lang; Jana Dittmann
Show Abstract
How to protect biometric templates
Author(s): Yagiz Sutcu; Qiming Li; Nasir Memon
Show Abstract
Error exponent analysis of person identification based on fusion of dependent/independent modalities
Author(s): Oleksiy Koval; Sviatoslav Voloshynovskiy; Thierry Pun
Show Abstract
The first BOWS contest (Break Our Watermarking System)
Author(s): A. Piva; M. Barni
Show Abstract
The good, the bad, and the ugly: three different approaches to break their watermarking system
Author(s): G. Le Guelvouit; T. Furon; F. Cayre
Show Abstract
Watermarking attack: BOWS contest
Author(s): J. Bennour; J.-L. Dugelay; F. Matta
Show Abstract
Tangential sensitivity analysis of watermarks using prior information
Author(s): John W. Earl
Show Abstract
Tackling BOWS with the sensitivity attack
Author(s): Andreas Westfeld
Show Abstract
Two different approaches for attacking BOWS
Author(s): Pedro Comesaña; Fernando Pérez-González
Show Abstract
How we broke the BOWS watermark
Author(s): Scott Craver; Idris Atakli; Jun Yu
Show Abstract
Adaptive MPEG-2 video data hiding scheme
Author(s): Anindya Sarkar; Upamanyu Madhow; Shivkumar Chandrasekaran; Bangalore S. Manjunath
Show Abstract
Digital video watermarking in P-frames
Author(s): Maneli Noorkami; Russell M. Mersereau
Show Abstract
Framework for combined video frame synchronization and watermark detection
Author(s): Enrico Hauer; Torsten Bölke; Martin Steinebach
Show Abstract
Source digital camcorder identification using sensor photo response non-uniformity
Author(s): Mo Chen; Jessica Fridrich; Miroslav Goljan; Jan Lukáš
Show Abstract
Blind identification of cellular phone cameras
Author(s): Oya Çeliktutan; Ismail Avcibas; Bülent Sankur
Show Abstract
Forensics for flatbed scanners
Author(s): Thomas Gloe; Elke Franz; Antje Winkler
Show Abstract
Intrinsic fingerprints for image authentication and steganalysis
Author(s): Ashwin Swaminathan; Min Wu; K. J. Ray Liu
Show Abstract
Scanner identification using sensor pattern noise
Author(s): Nitin Khanna; Aravind K. Mikkilineni; George T. C. Chiu; Jan P. Allebach; Edward J. Delp
Show Abstract
A generalized Benford’s law for JPEG coefficients and its applications in image forensics
Author(s): Dongdong Fu; Yun Q. Shi; Wei Su
Show Abstract
Distortion-free robust watermarking: a case study
Author(s): Dinu Coltuc; Jean-Marc Chassery
Show Abstract
Hidden context highlighting with JPEG2000 imagery
Author(s): René Rosenbaum; Heidrun Schumann
Show Abstract
Perceptual data hiding in tree structured Haar transform domain
Author(s): M. Cancellaro; M. Carli; K. Egiazarian; J. Astola
Show Abstract
A method of text watermarking using presuppositions
Author(s): O. Vybornova; B. Macq
Show Abstract
An evaluation of lightweight JPEG2000 encryption with anisotropic wavelet packets
Author(s): Dominik Engel; Andreas Uhl
Show Abstract
Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding
Author(s): R. Villán; S. Voloshynovskiy; O. Koval; F. Deguillaume; T. Pun
Show Abstract
Channel model and operational capacity analysis of printed text documents
Author(s): Aravind K. Mikkilineni; Pei-Ju Chiang; George T. C. Chiu; Jan P. Allebach; Edward J. Delp
Show Abstract
Watermarking geographic vector-data using a variable strip-size scheme
Author(s): Michael Voigt
Show Abstract
Authentication of H.264 streams by direct watermarking of CAVLC blocks
Author(s): Bijan G. Mobasseri; Yatish Naik Raikar
Show Abstract

© SPIE. Terms of Use
Back to Top