default search action
13th MM&Sec 2011: Buffalo, NY, USA
- Chad Heitzenrater, Scott Craver, Jana Dittmann:
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, MM&Sec '11, Buffalo, New York, USA, September 29-30, 2011. ACM 2011, ISBN 978-1-4503-0806-9
Forensics I
- Mario Hildebrandt, Stefan Kiltz, Ina Grossmann, Claus Vielhauer:
Convergence of digital and traditional forensic disciplines: a first exemplary study for digital dactyloscopy. 1-8 - Wenjun Lu, Min Wu:
Seam carving estimation using forensic hash. 9-14 - Xunyu Pan, Xing Zhang, Siwei Lyu:
Exposing image forgery with blind noise estimation. 15-20
Forensics II
- Chang-Hee Choi, Jung-Ho Choi, Heung-Kyu Lee:
CFA pattern identification of digital cameras using intermediate value counting. 21-26 - Tobias Kiertscher, Robert Fischer, Claus Vielhauer:
Latent fingerprint detection using a spectral texture feature. 27-32 - Mario Hildebrandt, Stefan Kiltz, Jana Dittmann, Claus Vielhauer:
Malicious fingerprint traces: a proposal for an automated analysis of printed amino acid dots using houghcircles. 33-40
Biometrics
- Ronny Merkel, Anja Bräutigam, Christian Kraetzer, Jana Dittmann, Claus Vielhauer:
Evaluation of binary pixel aging curves of latent fingerprint traces for different surfaces using a chromatic white light (CWL) sensor. 41-50 - Abdul Serwadda, Vir V. Phoha, Ankunda R. Kiremire:
Using global knowledge of users' typing traits to attack keystroke biometrics templates. 51-60 - Tobias Scheidat, Claus Vielhauer, Robert Fischer:
Comparative study on fusion strategies for biometric handwriting. 61-68
Steganography
- Jan Kodovský, Jessica J. Fridrich, Vojtech Holub:
On dangers of overtraining steganography to incomplete cover model. 69-76 - Qingzhong Liu:
Steganalysis of DCT-embedding based adaptive steganography and YASS. 77-86 - Enping Li, Scott Craver:
A square-root law for active wardens. 87-92
Protocols
- Christian Kraetzer, Ronny Merkel, Robert Altschaffel, Eric Clausing, Jana Dittmann:
Semi-automated communication protocol security verification for watermarking - pros and cons illustrated on a complex application scenario. 93-102 - Martin Franz, Stefan Katzenbeisser:
Processing encrypted floating point signals. 103-108 - Sanjay Ganesh Kanade, Dijana Petrovska-Delacrétaz, Bernadette Dorizzi:
Multi-biometrics based crypto-biometric session key generation and sharing protocol. 109-114
Applications
- Kun Qian, Maik Schott, Christian Kraetzer, Matthias L. Hemmje:
Contextualizing security for digital long-term preservation. 115-120 - Junaid Jameel Ahmad, Shujun Li, Ihab Amer, Marco Mattavelli:
Building multimedia security applications in the MPEG reconfigurable video coding (RVC) framework. 121-130
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.