


default search action
7. SSWMC 2005: San Jose, California, USA
- Edward J. Delp III, Ping Wah Wong:

Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, California, USA, January 17-20, 2005, Proceedings. Proceedings of SPIE 5681, SPIE 2005, ISBN 978-0-8194-5654-0 - Andrew D. Ker:

Resampling and the detection of LSB matching in color bitmaps. 1-15 - Mark T. Hogan, Neil J. Hurley

, Guenole C. M. Silvestre, Félix Balado, Kevin M. Whelan:
ML detection of steganography. 16-27 - Andreas Westfeld:

Space filling curves in steganalysis. 28-37 - Kenneth Sullivan, Upamanyu Madhow, Shivkumar Chandrasekaran, B. S. Manjunath:

Steganalysis of spread spectrum data hiding exploiting cover memory. 38-46 - Paul Salama

, Brian King:
Efficient secure image transmission: compression integrated with encryption. 47-58 - Elizabeth P. McCarthy, Félix Balado, Guenole C. M. Silvestre, Neil J. Hurley

:
A model for improving the performance of feature-extraction-based robust hashing. 59-67 - Longjiang Yu, Martin Schmucker, Christoph Busch, Sheng-He Sun:

Cumulant-based image fingerprints. 68-75 - Elisa Sayrol, Miguel Soriano

, Marcel Fernandez, Joan Casanellas, Joan Tomàs:
Development of a platform offering video copyright protection and security against illegal distribution. 76-83 - Wenjun Zeng

, Junqiang Lan, Xinhua Zhuang:
Security architectures and analysis for content adaptation. 84-95 - Shan He, Min Wu:

Group-based joint coding and embedding technique for multimedia fingerprinting. 96-105 - Mauro Barni:

Shedding light on some possible remedies against watermark desynchronization: a case study. 106-113 - Roman Tzschoppe, Robert Bäuml, Robert F. H. Fischer, Johannes B. Huber, André Kaup

:
Additive non-Gaussian noise attacks on the scalar Costa scheme (SCS). 114-123 - Abdellatif Zaidi, Rémy Boyer, Pierre Duhamel

:
Time jitter versus additive noise in a game theory context. 124-135 - José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy

, Oleksiy J. Koval, Fernando Pérez-González
, Thierry Pun:
Worst-case additive attack against quantization-based data-hiding methods. 136-146 - Chun-Shien Lu, Shih-Wei Sun

, Pao-Chi Chang:
Robust hash-based image watermarking with resistance to geometric distortions and watermark-estimation attack. 147-163 - Roberto Caldelli

, Alessia De Rosa, Rudy Becarelli, Mauro Barni:
Coping with local geometric attacks by means of optic-flow-based resynchronization for robust watermarking. 164-174 - Emir Ganic, Scott D. Dexter

, Ahmet M. Eskicioglu:
Embedding multiple watermarks in the DFT domain using low- and high-frequency bands. 175-184 - Ning Liu, Koduvayur P. Subbalakshmi

:
TCQ-based quantizer design for data hiding in images. 185-193 - Min Wu, Jessica J. Fridrich, Miroslav Goljan, Hongmei Gou:

Handling uneven embedding capacity in binary images: a revisit. 194-205 - Fernando Pérez-González

, Carlos Mosquera
, Mauro Barni, Andrea Abrardo:
Ensuring gain-invariance in high-rate data hiding. 206-217 - Bian Yang, Martin Schmucker, Xiamu Niu, Christoph Busch, Sheng-He Sun:

Integer-DCT-based reversible image watermarking by adaptive coefficient modification. 218-229 - Patrice Rondao-Alface

, Mathieu De Craene, Benoît Macq:
Three-dimensional image quality measurement for the benchmarking of 3D watermarking schemes. 230-240 - Hyung Cook Kim, Eugene T. Lin, Oriol Guitart, Edward J. Delp

:
Further progress in watermark evaluation testbed (WET). 241-251 - Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon

:
Benchmarking steganographic and steganalysis techniques. 252-263 - Chad Heitzenrater:

Characterization of steganographic algorithms using software metrics. 264-274 - Andreas Lang, Jana Dittmann, Eugene T. Lin, Edward J. Delp

:
Application-oriented audio watermark benchmark service. 275-286 - Wolfgang Funk, Daniel Kirchner:

A framework for data-driven algorithm testing. 287-297 - Pedro Comesaña

, Fernando Pérez-González
, Frans M. J. Willems:
Applying Erez and Ten Brink's dirty paper codes to data hiding. 298-307 - Pierre Moulin, Ying Wang:

On achievable error exponents for watermarking. 308-317 - Dahua Xie, C.-C. Jay Kuo

:
Secure Lempel-Ziv compression with embedded encryption. 318-327 - Jessica J. Fridrich, Miroslav Goljan, Petr Lisonek, David Soukal:

Writing on wet paper. 328-340 - Luis Pérez-Freire, Fernando Pérez-González

:
Spread-spectrum vs. quantization-based data hiding: misconceptions and implications. 341-352 - Stefan Thiemert, Hichem Sahbi, Martin Steinebach:

Applying interest operators in semi-fragile video watermarking. 353-362 - Mehmet Kucukgoz, Oztan Harmanci, Mehmet Kivanç Mihçak, Ramarathnam Venkatesan:

Robust video watermarking via optimization algorithm for quantization of pseudo-random semi-global statistics. 363-369 - Oztan Harmanci, Mehmet Kucukgoz, Mehmet Kivanç Mihçak:

Temporal synchronization of watermarked video using image hashing. 370-380 - Enrico Hauer, Martin Steinebach:

Robust digital watermark solution for intercoded frames of MPEG video data. 381-390 - Isao Echizen, Hiroshi Yoshiura, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka:

Use of inferential statistics to estimate error probability of video watermarks. 391-399 - Patrice Rondao-Alface

, Benoît Macq:
Feature-based watermarking of 3D objects: toward robustness against remeshing and desynchronization. 400-408 - Michael Voigt, Bian Yang, Christoph Busch:

High-capacity reversible watermarking for 2D vector data. 409-417 - Kaushal Solanki, Upamanyu Madhow, B. S. Manjunath, Shivkumar Chandrasekaran:

Modeling the print-scan process for resilient data hiding. 418-429 - Aravind K. Mikkilineni, Pei-Ju Chiang, Gazi N. Ali, George T.-C. Chiu

, Jan P. Allebach, Edward J. Delp
:
Printer identification based on graylevel co-occurrence features for security and forensic applications.. 430-440 - Mercan Topkara, Cüneyt M. Taskiran, Edward J. Delp

:
Natural language watermarking. 441-452 - Renato Villán, Sviatoslav Voloshynovskiy

, Oleksiy J. Koval, Thierry Pun:
Multilevel 2D bar codes: toward high-capacity storage modules for multimedia security and management. 453-464 - Pablo Hennings, Marios Savvides, B. V. K. Vijaya Kumar

:
Hiding phase-quantized biometrics: a case of steganography for reduced-complexity correlation filter classifiers. 465-473 - Sascha Schimke, Stefan Kiltz, Claus Vielhauer, Ton Kalker:

Security analysis for biometric data in ID documents. 474-485 - Chunyan Xie, B. V. K. Vijaya Kumar

:
Quaternion correlation filters for color face recognition. 486-494 - Mark A. Masry:

A watermarking algorithm for map and chart images. 495-503 - Claus Vielhauer, T. K. Basu

, Jana Dittmann, Pranab K. Dutta:
Finding meta data in speech and handwriting biometrics. 504-515 - Ivo D. Shterev, Reginald L. Lagendijk:

Maximum likelihood amplitude scale estimation for quantization-based watermarking in the presence of dither. 516-527 - Chaw-Seng Woo

, Jiang Du, Binh Pham:
Geometrically robust digital image watermarking using scale normalization and flowline curvature. 528-538 - Robert J. Berger II, Bijan G. Mobasseri:

Watermarking in JPEG bitstream. 539-548 - Kevin M. Whelan, Félix Balado, Guenole C. M. Silvestre, Neil J. Hurley

:
Iterative estimation of amplitude scaling on distortion-compensated dither modulation. 549-560 - Dinu Coltuc

, Alain Trémeau:
Simple reversible watermarking schemes. 561-568 - Oleksiy J. Koval, Sviatoslav Voloshynovskiy

, Frédéric Deguillaume, Fernando Pérez-González
, Thierry Pun:
Robustness improvement of known-host-state watermarking using host statistics. 569-577 - Thomas Vogel, Jana Dittmann:

Illustration watermarking: an object-based approach for digital images. 578-589 - Rajarathnam Chandramouli

:
On the choice of risk optimal data embedding strategy, safe embedding rate, and passive steganalysis. 590-594 - Jessica J. Fridrich, David Soukal, Miroslav Goljan:

Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain. 595-606 - Jana Dittmann, Danny Hesse, Reyk Hillert:

Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set. 607-618 - Clifford Bergman

, Jennifer L. Davidson
:
Unitary embedding for data hiding with the SVD. 619-630 - Jessica J. Fridrich, Miroslav Goljan, David Soukal, Taras Holotyak

:
Forensic steganalysis: determining the stego key in spatial domain steganography. 631-642 - Ping Wah Wong, Hong Chen, Zhongjue Tang:

On steganalysis of plus-minus one embedding of continuous-tone images. 643-652 - Sos S. Agaian, Hong Cai:

New multilevel DCT, feature vectors, and universal blind steganalysis. 653-663 - Micah K. Johnson, Siwei Lyu, Hany Farid:

Steganalysis of recorded speech. 664-672 - Taras Holotyak

, Jessica J. Fridrich, David Soukal:
Stochastic approach to secret message length estimation in ±k embedding steganography. 673-684 - Gwenaël J. Doërr

, Jean-Luc Dugelay
:
Collusion issue in video watermarking. 685-696 - Chuhong Fei, Deepa Kundur, Raymond H. Kwong:

Achieving computational and unconditional security in authentication watermarking: analysis, insights, and algorithms. 697-708 - Emre Topak, Sviatoslav Voloshynovskiy

, Oleksiy J. Koval, Mehmet Kivanç Mihçak, Thierry Pun:
Security analysis of robust data-hiding with geometrically structured codebooks. 709-720 - Luis Pérez-Freire, Pedro Comesaña Alfaro

, Fernando Pérez-González
:
Detection in quantization-based watermarking: performance and security issues. 721-733 - Maha El Choubassi, Pierre Moulin:

New sensitivity analysis attack. 734-745 - François Cayre, Caroline Fontaine, Teddy Furon:

Watermarking security part one: Theory. 746-757 - François Cayre, Caroline Fontaine, Teddy Furon:

Watermarking security part two: Practice. 758-768 - Finbarr B. O'Donovan, Neil J. Hurley

, Guenole C. M. Silvestre:
An investigation of robustness in nonlinear audio watermarking. 769-778 - Martin Steinebach, Sascha Zmudzinski, Torsten Bölke:

Audio watermarking and partial encryption. 779-788 - Brett A. Bradley, Adnan M. Alattar:

High-capacity invertible data-hiding algorithm for digital audio. 789-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














