


default search action
8. MM&Sec 2006: Geneva, Switzerland
- Sviatoslav Voloshynovskiy, Jana Dittmann, Jessica J. Fridrich:

Proceedings of the 8th workshop on Multimedia & Security, MM&Sec 2006, Geneva, Switzerland, September 26-27, 2006. ACM 2006, ISBN 1-59593-493-6 - Mauro Barni:

Processing encrypted signals: a new frontier for multimedia security. 1
Steganography and steganalysis
- Jessica J. Fridrich:

Minimizing the embedding impact in steganography. 2-10 - Oleksiy J. Koval, Sviatoslav Voloshynovskiy

, Taras Holotyak
, Thierry Pun:
Information-theoretic analysis of steganalysis in real images. 11-16 - Christian Krätzer, Jana Dittmann, Andreas Lang, Tobias Kühne:

WLAN steganography: a first practical review. 17-22 - Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu:

Digital invisible ink and its applications in steganography. 23-28
Authentication and forensics
- Hany Farid:

Exposing digital forgeries in scientific images. 29-36 - Weihong Wang, Hany Farid:

Exposing digital forgeries in video by detecting double MPEG compression. 37-47 - Micah K. Johnson, Hany Farid:

Exposing digital forgeries through chromatic aberration. 48-55 - Qiming Li, Ee-Chien Chang

:
Robust, short and sensitive authentication tags using secure sketch. 56-61 - Mathias Schlauweg, Dima Pröfrock, Erika Müller:

JPEG2000-based secure image authentication. 62-67
Security analysis I
- Luis Pérez-Freire, Fernando Pérez-González, Teddy Furon:

On achievable security levels for lattice data hiding in the known message attack scenario. 68-79 - Patrick Bas, François Cayre:

Achieving subspace or key security for WOA using natural or circular watermarking. 80-88 - Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Emre Topak, José-Emilio Vila-Forcén, Thierry Pun:

On reversibility of random binning based data-hiding techniques: security perspectives. 89-96 - Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González:

Zero-knowledge watermark detector robust to sensitivity attacks. 97-107
Applications I
- Yuta Nakashima, Ryuki Tachibana, Masafumi Nishimura, Noboru Babaguchi:

Estimation of recording location using audio watermarking. 108-113 - P. Vinod, Gwenaël J. Doërr

, Prabin Kumar Bora:
Assessing motion-coherency in video watermarking. 114-119 - Stefan Thiemert, Martin Steinebach, Patrick Wolf:

A digital watermark for vector-based fonts. 120-123 - In Koo Kang, Dong-Hyuck Im, Heung-Kyu Lee, Young-Ho Suh:

Implementation of real-time watermarking scheme for high-quality video. 124-129 - Tobias Scheidat, Andreas Engel, Claus Vielhauer:

Parameter optimization for biometric fingerprint recognition using genetic algorithms. 130-134 - Daniel Socek, Michal Sramka

, Oge Marques, Dubravko Culibrk:
An improvement to a biometric.based multimedia content protection scheme. 135-139
Security analysis II
- Albert Meixner, Andreas Uhl:

Robustness and security of a wavelet-based CBIR hashing algorithm. 140-145 - Mauro Barni, Claudio Orlandi

, Alessandro Piva:
A privacy-preserving protocol for neural-network-based computation. 146-151 - Rade Petrovic, Babak Tehranchi, Joseph M. Winograd:

Digital watermarking security considerations. 152-157 - Qiming Li, Ee-Chien Chang:

Zero-knowledge watermark detection resistant to ambiguity attacks. 158-163
Applications II
- Umut Topkara, Mercan Topkara, Mikhail J. Atallah:

The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions. 164-174 - William Zhu, Clark D. Thomborson:

Extraction in software watermarking. 175-181 - Claus Vielhauer, Maik Schott:

Image annotation watermarking: nested object embedding using hypergraph model. 182-189
Benchmarking and attacks
- Andreas Lang, Jana Dittmann:

Transparency and complexity benchmarking of audio watermarking algorithms issues. 190-201 - Dominik Engel, Rade Kutil, Andreas Uhl:

A symbolic transform attack on lightweight encryption based on wavelet filter parameterization. 202-207 - Andreas Westfeld:

Lessons from the BOWS contest. 208-213
Performance analysis and enhancement
- Teddy Furon:

Hermite polynomials as provably good functions to watermark white gaussian hosts. 224-229 - Parag Agarwal, Ketaki Adi, B. Prabhakaran:

Robust blind watermarking mechanism for motion data streams. 230-235

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














