


default search action
11. MM&Sec 2009: Princeton, NJ, USA
- Edward W. Felten, Jana Dittmann, Jessica J. Fridrich, Scott Craver:

Multimedia and Security Workshop, MM&Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009. ACM 2009, ISBN 978-1-60558-492-8
Watermarking I
- Patrick Bas, Andreas Westfeld:

Two key estimation techniques for the broken arrows watermarking scheme. 1-8 - Mina Deng, Tiziano Bianchi

, Alessandro Piva
, Bart Preneel
:
An efficient buyer-seller watermarking protocol based on composite signal representation. 9-18
Watermarking II
- Ming Chen, Zhenyong Chen, Xiao Zeng, Zhang Xiong:

Reversible data hiding using additive prediction-error expansion. 19-24 - Peter Meerwald

, Andreas Uhl:
Additive spread-spectrum watermark detection in demosaicked images. 25-32 - Benjamin Mathon

, Patrick Bas, François Cayre, Benoît Macq:
Optimization of natural watermarking using transportation theory. 33-38
Forensics I
- Weihong Wang, Hany Farid:

Exposing digital forgeries in video by detecting double quantization. 39-48 - Christian Kraetzer, Maik Schott, Jana Dittmann:

Unweighted fusion in microphone forensics using a decision tree and linear logistic regression models. 49-56 - Brian D'Alessandro, Yun Q. Shi:

Mp3 bit rate quality detection through frequency spectrum analysis. 57-62
Steganalysis
- Jan Kodovský, Jessica J. Fridrich:

Calibration revisited. 63-74 - Tomás Pevný

, Patrick Bas, Jessica J. Fridrich:
Steganalysis by subtractive pixel adjacency matrix. 75-84 - Andrew D. Ker:

The square root law requires a linear key. 85-92
Fingerprinting
- W. Sabrina Lin, Shan He, Jeffrey Bloom:

Performance study and improvement on ECC-based binary anti-collusion forensic code for multimedia. 93-98 - Teddy Furon, Luis Pérez-Freire:

EM decoding of tardos traitor tracing codes. 99-106
Forensics II
- Anindya Sarkar, Lakshmanan Nataraj, B. S. Manjunath:

Detection of seam carving and localization of seam insertions in digital images. 107-116 - Rui Yang, Yun-Qing Shi, Jiwu Huang:

Defeating fake-quality MP3. 117-124 - Na Fan, Cheng Jin, Yizhen Huang:

A pixel-based digital photo authentication framework via demosaicking inter-pixel correlation. 125-130
Steganography
- Vasiliy Sachnev, Hyoung Joong Kim, Rongyue Zhang:

Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. 131-140 - Elke Franz, Stefan Rönisch, Robert Bartel:

Improved embedding based on a set of cover images. 141-150 - Enping Li, Scott Craver:

A supraliminal channel in a wireless phone application. 151-154
Encryption
- Yun Cao, Xianfeng Zhao

, Dengguo Feng:
Entropy codec based on evolutionary MHT and its application in video encryption. 155-160 - Heinz Hofbauer, Andreas Uhl:

Selective encryption of the MC EZBC bitstream for DRM scenarios. 161-170 - Idris M. Atakli, Yu Chen, Qing Wu, Scott Craver:

BLINK: pixel-domain encryption for secure document management. 171-176

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














