default search action
9. MM&Sec 2007: Dallas, Texas, USA
- Deepa Kundur, Balakrishnan Prabhakaran, Jana Dittmann, Jessica J. Fridrich:
Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, 2007. ACM 2007, ISBN 978-1-59593-857-2 - Bhavani Thuraisingham:
Multimedia systems security. 1-2
Steganography and covert communications
- Jessica J. Fridrich, Tomás Pevný, Jan Kodovský:
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. 3-14 - Pedro Comesaña, Fernando Pérez-González:
On the capacity of stegosystems. 15-24 - Arati Baliga, Joe Kilian:
On covert collaboration. 25-34
Authentication and forensics
- Weihong Wang, Hany Farid:
Exposing digital forgeries in video by detecting duplication. 35-42 - Brandon Dybala, Brian Jennings, David Letscher:
Detecting filtered cloning in digital images. 43-50 - Yun Q. Shi, Chunhua Chen, Wen Chen:
A natural image model approach to splicing detection. 51-62 - Christian Krätzer, Andrea Oermann, Jana Dittmann, Andreas Lang:
Digital audio forensics: a first practical evaluation on microphone and environment classification. 63-74
Security and encryption
- William Luh, Deepa Kundur:
Distributed keyless security for correlated data with applications in visual sensor networks. 75-86 - Dominik Engel, Thomas Stütz, Andreas Uhl:
Format-compliant jpeg2000 encryption with combined packet header and packet body protection. 87-96 - Thomas Stütz, Andreas Uhl:
On efficient transparent jpeg2000 encryption. 97-108 - Juan Ramón Troncoso-Pastoriza, Stefan Katzenbeisser, Mehmet Utku Celik, Aweke N. Lemma:
A secure multidimensional point inclusion protocol. 109-120
Hashing
- Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang:
Histogram-based image hashing scheme robust against geometric deformations. 121-128 - Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan:
Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings. 129-140
Steganalysis
- Andrew D. Ker:
The ultimate steganalysis benchmark? 141-148 - Hafiz Malik, K. P. Subbalakshmi, Rajarathnam Chandramouli:
Steganalysis of GIM-based data hiding using kernel density estimation. 149-160 - Julien S. Jainsky, Deepa Kundur, Don R. Halverson:
Towards digital video steganalysis using asymptotic memoryless detection. 161-168
Geometry in watermarking
- Dima Pröfrock, Mathias Schlauweg, Erika Müller:
Geometric warping watermarking extended concerning geometric attacks and embedding artifacts. 169-174 - Parag Agarwal, Balakrishnan Prabhakaran:
Robust blind watermarking mechanism for point sampled geometry. 175-186 - Claus Vielhauer, Maik Schott:
Nested object watermarking: from the rectangular con-straint to polygonal and private annotations. 187-194
Attacks
- Mauro Barni, Angela D'Angelo, Neri Merhav:
Expanding the class of watermark de-synchronization attacks. 195-204 - Husrev T. Sencar, Qiming Li, Nasir D. Memon:
A new approach to countering ambiguity attacks. 205-214 - Alexandra Czarlinska, Deepa Kundur:
Attack vs. failure detection in event-driven wireless visual sensor networks. 215-220
Watermarking and performance
- Corina Nafornita:
A new pixel-wise mask for watermarking. 221-228 - Maneli Noorkami, Russell M. Mersereau:
Video watermark detection with controllable performance with and without knowledge of watermark location. 229-236 - Benjamin Mathon, Patrick Bas, François Cayre:
Practical performance analysis of secure modulations for woa spread-spectrum based image watermarking. 237-244 - Puneet Maheshwari, Parag Agarwal, Balakrishnan Prabhakaran:
Progressive compression invariant semi-fragile watermarks for 3d meshes. 245-250
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.