Share Email Print


Media Watermarking, Security, and Forensics 2015
For the purchase of this volume in printed format, please visit

Volume Details

Volume Number: 9409
Date Published: 7 April 2015

Table of Contents
show all abstracts | hide all abstracts
Front Matter: Volume 9409
Author(s): Proceedings of SPIE
Exposing photo manipulation from user-guided 3D lighting analysis
Author(s): Tiago Carvalho; Hany Farid; Eric R. Kee
Show Abstract
Thinking beyond the block: block matching for copy-move forgery detection revisited
Author(s): Matthias Kirchner; Pascal Schoettle; Christian Riess
Show Abstract
The non-trusty clown attack on model-based speaker recognition systems
Author(s): Alireza Farrokh Baroughi; Scott Craver
Show Abstract
Automation and workflow considerations for embedding Digimarc Barcodes at scale
Author(s): Tony Rodriguez; Don Haaga Jr.; Sean Calhoon
Show Abstract
Watermarking spot colors in packaging
Author(s): Alastair Reed; Tomáš Filler; Kristyn Falkenstern; Yang Bai
Show Abstract
Scanning-time evaluation of Digimarc Barcode
Author(s): Rebecca Gerlach; Dan Pinard; Matt Weaver; Adnan Alattar
Show Abstract
Digimarc Discover on Google Glass
Author(s): Eliot Rogers; Tony F. Rodriguez; John Lord; Adnan Alattar
Show Abstract
Benford's Law based detection of latent fingerprint forgeries on the example of artificial sweat printed fingerprints captured by confocal laser scanning microscopes
Author(s): Mario Hildebrandt; Jana Dittmann
Show Abstract
Capturing latent fingerprints from metallic painted surfaces using UV-VIS spectroscope
Author(s): Andrey Makrushin; Tobias Scheidat; Claus Vielhauer
Show Abstract
Comparative study of minutiae selection algorithms for ISO fingerprint templates
Author(s): B. Vibert; C. Charrier; J.-M. Le Bars; C. Rosenberger
Show Abstract
Detection of latent fingerprints using high-resolution 3D confocal microscopy in non-planar acquisition scenarios
Author(s): Stefan Kirst; Claus Vielhauer
Show Abstract
Benchmarking contactless acquisition sensor reproducibility for latent fingerprint trace evidence
Author(s): Mario Hildebrandt; Jana Dittmann
Show Abstract
Design of a steganographic virtual operating system
Author(s): Elan Ashendorf; Scott Craver
Show Abstract
Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model
Author(s): Vahid Sedighi; Jessica Fridrich; Remi Cogranne
Show Abstract
Towards dependable steganalysis
Author(s): Tomáš Pevný; Andrew D. Ker
Show Abstract
Deep learning for steganalysis via convolutional neural networks
Author(s): Yinlong Qian; Jing Dong; Wei Wang; Tieniu Tan
Show Abstract
Counter-forensics in machine learning based forgery detection
Author(s): Francesco Marra; Giovanni Poggi; Fabio Roli; Carlo Sansone; Luisa Verdoliva
Show Abstract
Anti-forensics of chromatic aberration
Author(s): Owen Mayer; Matthew C. Stamm
Show Abstract
Recent advances in counter PRNU based source attribution and beyond
Author(s): Ahmet Karaküҫük; Ahmet E. Dirik; Hüsrev T. Sencar; Nasir D. Memon
Show Abstract
Disparity estimation and disparity-coherent watermarking
Author(s): Hasan Sheikh Faridul; Gwenaël Doërr; Séverine Baudry
Show Abstract
Estimating synchronization signal phase
Author(s): Robert G. Lyons; John D. Lord
Show Abstract
Mobile visual object identification: from SIFT-BoF-RANSAC to Sketchprint
Author(s): Sviatoslav Voloshynovskiy; Maurits Diephuis; Taras Holotyak
Show Abstract
Analysis of optically variable devices using a photometric light-field approach
Author(s): Daniel Soukup; Svorad Štolc; Reinhold Huber-Mörk
Show Abstract
Phase-aware projection model for steganalysis of JPEG images
Author(s): Vojtěch Holub; Jessica Fridrich
Show Abstract
JPEG quantization table mismatched steganalysis via robust discriminative feature transformation
Author(s): Likai Zeng; Xiangwei Kong; Ming Li; Yanqing Guo
Show Abstract
CFA-aware features for steganalysis of color images
Author(s): Miroslav Goljan; Jessica Fridrich
Show Abstract
Steganalysis of overlapping images
Author(s): James M. Whitaker; Andrew D. Ker
Show Abstract

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?