


default search action
6. MM&Sec 2004: Magdeburg, Germany
- Jana Dittmann, Jessica J. Fridrich:

Proceedings of the 6th workshop on Multimedia & Security, MM&Sec 2004, Magdeburg, Germany, September 20-21, 2004. ACM 2004, ISBN 1-58113-854-7 - Jana Dittmann, Jessica J. Fridrich:

Introduction to the ACM multimedia and security workshop. 1-3
Steganography I
- Jessica J. Fridrich, Miroslav Goljan, David Soukal:

Perturbed quantization steganography with wet paper codes. 4-15 - Mercan Topkara, Umut Topkara, Mikhail J. Atallah, Cüneyt M. Taskiran, Eugene T. Lin, Edward J. Delp:

A hierarchical protocol for increasing the stealthiness of steganographic methods. 16-24 - Rainer Böhme, Andreas Westfeld:

Statistical characterisation of MP3 encoders for steganalysis. 25-34
Attack and evaluation
- Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Fernando Pérez-González, Frédéric Deguillaume, Thierry Pun:

Quantization-based watermarking performance improvement using host statistics: AWGN attack case. 35-39 - Mustafa Kesal, Mehmet Kivanç Mihçak, Ramarathnam Venkatesan:

An improved attack analysis on a public-key spread spectrum watermarking. 41-45 - André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi:

Overcoming the obstacles of zero-knowledge watermark detection. 46-55
Steganography II
- Elke Franz, Antje Schneidewind:

Adaptive steganography based on dithering. 56-62 - Maxim Sidorov:

Hidden Markov models and steganalysis. 63-67 - Yannick Maret, Touradj Ebrahimi

:
Data hiding on 3D polygonal meshes. 68-74 - Benoit Roue, Patrick Bas, Jean-Marc Chassery:

Improving LSB steganalysis using marginal and joint probabilistic distributions. 75-80
Security
- Chao-Yong Hsu, Chun-Shien Lu:

Geometric distortion-resilient image hashing system and its application scalability. 81-92 - Rüdiger Grimm, Patrick Aichroth

:
Privacy protection for signed media files: a separation-of-duty approach to the lightweight DRM (LWDRM) system. 93-99 - Andreas Uhl, Andreas Pommer:

Are parameterised biorthogonal wavelet filters suited (better) for selective encryption? 100-106 - André Adelsbach, Jörg Schwenk:

Key-assignment strategies for CPPM. 107-115 - Edward J. Delp:

Multimedia security: the 22nd century approach! 116
Watermarking algorithms
- Sylvain Beauget, Michiel van der Veen, Aweke N. Lemma:

Informed detection of audio watermark for resolving playback speed modifications. 117-123 - Tie Liu, Ramarathnam Venkatesan, Mehmet Kivanç Mihçak:

Scale-invariant image watermarking via optimization algorithms for quantizing randomized statistics. 124-132 - Gwenaël J. Doërr

, Jean-Luc Dugelay, Lucas Grangé:
Exploiting self-similarities to defeat digital watermarking systems: a case study on still images. 133-142 - Francesca Uccheddu

, Massimiliano Corsini, Mauro Barni:
Wavelet-based blind watermarking of 3D models. 143-154
Authentication I
- Zheng Liu, Xue Li

, Zhaoyang Dong:
Multimedia authentication with sensor-based watermarking. 155-159 - Michael Voigt, Bian Yang, Christoph Busch:

Reversible watermarking of 2D-vector data. 160-165
Robust digital watermarking
- Emir Ganic, Ahmet M. Eskicioglu:

Robust DWT-SVD domain image watermarking: embedding data in all frequencies. 166-174 - Michael Brachtl, Andreas Uhl, Werner Dietl:

Key-dependency for a wavelet-based blind watermarking algorithm. 175-179 - Gerrit Schulz, Michael Voigt:

A high capacity watermarking system for digital maps. 180-186 - Ilaria Venturini:

Counteracting Oracle attacks. 187-192 - Natasa Terzija, Walter Geisselhardt:

Digital image watermarking using complex wavelet transform. 193-198 - Martin Steinebach, Sascha Zmudzinski, Fan Chen:

The digital watermarking container: secure and efficient embedding. 199-205 - David Megías, Jordi Herrera-Joancomartí

, Julià Minguillón:
An audio watermarking scheme robust against stereo attacks. 206-213
Authentication II
- Huayin Si, Chang-Tsun Li

:
Fragile watermarking scheme based on the block-wise dependence in the wavelet domain. 214-219 - Song Yuan, Sorin A. Huss:

Audio watermarking algorithm for real-time speech integrity and authentication. 220-226

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














