Share Email Print


Media Watermarking, Security, and Forensics III
For the purchase of this volume in printed format, please visit

Volume Details

Volume Number: 7880
Date Published: 8 February 2011

Table of Contents
show all abstracts | hide all abstracts
Front Matter: Volume 7880
Author(s): Proceedings of SPIE
Signal rich art: enabling the vision of ubiquitous computing
Author(s): Bruce Davis
Show Abstract
Comparison of three solutions to correct erroneous blocks to extract an image of a multiplicative homomorphic cryptosystem
Author(s): N. Islam; W. Puech; R. Brouzet
Show Abstract
Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction
Author(s): Chao-Yung Hsu; Chun-Shien Lu; Soo-Chang Pei
Show Abstract
Determining approximate age of digital images using sensor defects
Author(s): Jessica Fridrich; Miroslav Goljan
Show Abstract
Performance comparison of denoising filters for source camera identification
Author(s): A. Cortiana; V. Conotter; G. Boato; F. G. B. De Natale
Show Abstract
Identifying image forgeries using change points detection
Author(s): Babak Mahdian; Stanislav Saic
Show Abstract
Enhancing ROC performance of trustworthy camera source identification
Author(s): Xiangui Kang; Yinxiang Li; Zhenhua Qu; Jiwu Huang
Show Abstract
Feature point-based 3D mesh watermarking that withstands the cropping attack
Author(s): Mireia Montañola Sales; Rony Darazi; Joachim Giard; Patrice Rondao Alface; Benoît A. Macq
Show Abstract
A perceptually driven hybrid additive-multiplicative watermarking technique in the wavelet domain
Author(s): Florent Autrusseau; Sylvain David; Vinod Pankajakshan; Patrizio Campisi
Show Abstract
Assessment of camera phone distortion and implications for watermarking
Author(s): Aparna Gurijala; Alastair Reed; Eric Evans
Show Abstract
A new metric for measuring the visual quality of video watermarks
Author(s): Daniel Trick; Stefan Thiemert
Show Abstract
A curiosity regarding steganographic capacity of pathologically nonstationary sources
Author(s): Andrew D. Ker
Show Abstract
Design of adaptive steganographic schemes for digital images
Author(s): Tomás Filler; Jessica Fridrich
Show Abstract
Feature restoration and distortion metrics
Author(s): Ventsislav K. Chonev; Andrew D. Ker
Show Abstract
Lossless image data embedding in plain areas
Author(s): Mehdi Fallahpour; David Megias; Yun Q. Shi
Show Abstract
Re-synchronizing audio watermarking after nonlinear time stretching
Author(s): Martin Steinebach; Sascha Zmudzinski; Stefan Nürnberger
Show Abstract
On locating steganographic payload using residuals
Author(s): Tu-Thach Quach
Show Abstract
Steganalysis using logistic regression
Author(s): Ivans Lubenko; Andrew D. Ker
Show Abstract
Steganalysis in high dimensions: fusing classifiers built on random subspaces
Author(s): Jan Kodovský; Jessica Fridrich
Show Abstract
Private content identification based on soft fingerprinting
Author(s): Sviatoslav Voloshynovskiy; Taras Holotyak; Oleksiy Koval; Fokko Beekhof; Farzad Farhadzadeh
Show Abstract
Geometrically robust perceptual fingerprinting: an asymmetric case
Author(s): Oleksiy Koval; Svyatoslav Voloshynovskiy; Farzad Farhadzadeh; Taras Holotyak; Fokko Beekhof
Show Abstract
Trading-off performance and complexity in identification problem
Author(s): Taras Holotyak; Svyatoslav Voloshynovskiy; Oleksiy Koval; Fokko Beekhof
Show Abstract
A context model for microphone forensics and its application in evaluations
Author(s): Christian Kraetzer; Kun Qian; Maik Schott; Jana Dittmann
Show Abstract
Double H.264/AVC compression detection using quantized nonzero AC coefficients
Author(s): Dandan Liao; Rui Yang; Hongmei Liu; Jian Li; Jiwu Huang
Show Abstract
Forensic printer detection using intrinsic signatures
Author(s): Aravind K. Mikkilineni; Nitin Khanna; Edward J. Delp
Show Abstract
Non-destructive forensic latent fingerprint acquisition with chromatic white light sensors
Author(s): Marcus Leich; Stefan Kiltz; Jana Dittmann; Claus Vielhauer
Show Abstract
Detecting messages of unknown length
Author(s): Tomas Pevny
Show Abstract
A new paradigm for steganalysis via clustering
Author(s): Andrew D. Ker; Tomás Pevný
Show Abstract
Collusion-secure patchwork embedding for transaction watermarking
Author(s): Waldemar Berchtold; Sascha Zmudzinski; Marcel Schäfer; Martin Steinebach
Show Abstract
Probabilistic fingerprinting codes used to detect traitor zero-bit watermark
Author(s): Mathieu Desoubeaux; Gaëtan Le Guelvouit; William Puech
Show Abstract
Rihamark: perceptual image hash benchmarking
Author(s): Christoph Zauner; Martin Steinebach; Eckehard Hermann
Show Abstract
Contrast-enhancing and deterministic tone mapping method in natural image hiding scheme using halftone images
Author(s): Emi Myodo; Koichi Takagi; Ryoichi Kawada
Show Abstract
Toward the identification of DSLR lenses by chromatic aberration
Author(s): Jun Yu; Scott Craver; Enping Li
Show Abstract

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?