


default search action
9. MM&Sec 2007: Dallas, Texas, USA
- Deepa Kundur, Balakrishnan Prabhakaran, Jana Dittmann, Jessica J. Fridrich:

Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, 2007. ACM 2007, ISBN 978-1-59593-857-2 - Bhavani Thuraisingham:

Multimedia systems security. 1-2
Steganography and covert communications
- Jessica J. Fridrich, Tomás Pevný

, Jan Kodovský:
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. 3-14 - Pedro Comesaña

, Fernando Pérez-González
:
On the capacity of stegosystems. 15-24 - Arati Baliga, Joe Kilian:

On covert collaboration. 25-34
Authentication and forensics
- Weihong Wang, Hany Farid:

Exposing digital forgeries in video by detecting duplication. 35-42 - Brandon Dybala, Brian Jennings, David Letscher:

Detecting filtered cloning in digital images. 43-50 - Yun Q. Shi, Chunhua Chen, Wen Chen:

A natural image model approach to splicing detection. 51-62 - Christian Krätzer, Andrea Oermann, Jana Dittmann, Andreas Lang:

Digital audio forensics: a first practical evaluation on microphone and environment classification. 63-74
Security and encryption
- William Luh, Deepa Kundur:

Distributed keyless security for correlated data with applications in visual sensor networks. 75-86 - Dominik Engel, Thomas Stütz, Andreas Uhl:

Format-compliant jpeg2000 encryption with combined packet header and packet body protection. 87-96 - Thomas Stütz, Andreas Uhl:

On efficient transparent jpeg2000 encryption. 97-108 - Juan Ramón Troncoso-Pastoriza, Stefan Katzenbeisser, Mehmet Utku Celik

, Aweke N. Lemma:
A secure multidimensional point inclusion protocol. 109-120
Hashing
- Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang:

Histogram-based image hashing scheme robust against geometric deformations. 121-128 - Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan:

Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings. 129-140
Steganalysis
- Andrew D. Ker:

The ultimate steganalysis benchmark? 141-148 - Hafiz Malik

, K. P. Subbalakshmi
, Rajarathnam Chandramouli
:
Steganalysis of GIM-based data hiding using kernel density estimation. 149-160 - Julien S. Jainsky, Deepa Kundur, Don R. Halverson:

Towards digital video steganalysis using asymptotic memoryless detection. 161-168
Geometry in watermarking
- Dima Pröfrock, Mathias Schlauweg, Erika Müller:

Geometric warping watermarking extended concerning geometric attacks and embedding artifacts. 169-174 - Parag Agarwal, Balakrishnan Prabhakaran:

Robust blind watermarking mechanism for point sampled geometry. 175-186 - Claus Vielhauer, Maik Schott:

Nested object watermarking: from the rectangular con-straint to polygonal and private annotations. 187-194
Attacks
- Mauro Barni, Angela D'Angelo

, Neri Merhav:
Expanding the class of watermark de-synchronization attacks. 195-204 - Husrev T. Sencar, Qiming Li, Nasir D. Memon

:
A new approach to countering ambiguity attacks. 205-214 - Alexandra Czarlinska, Deepa Kundur:

Attack vs. failure detection in event-driven wireless visual sensor networks. 215-220
Watermarking and performance
- Corina Nafornita

:
A new pixel-wise mask for watermarking. 221-228 - Maneli Noorkami, Russell M. Mersereau:

Video watermark detection with controllable performance with and without knowledge of watermark location. 229-236 - Benjamin Mathon

, Patrick Bas, François Cayre:
Practical performance analysis of secure modulations for woa spread-spectrum based image watermarking. 237-244 - Puneet Maheshwari, Parag Agarwal, Balakrishnan Prabhakaran:

Progressive compression invariant semi-fragile watermarks for 3d meshes. 245-250

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














