default search action
6. MM&Sec 2004: Magdeburg, Germany
- Jana Dittmann, Jessica J. Fridrich:
Proceedings of the 6th workshop on Multimedia & Security, MM&Sec 2004, Magdeburg, Germany, September 20-21, 2004. ACM 2004, ISBN 1-58113-854-7 - Jana Dittmann, Jessica J. Fridrich:
Introduction to the ACM multimedia and security workshop. 1-3
Steganography I
- Jessica J. Fridrich, Miroslav Goljan, David Soukal:
Perturbed quantization steganography with wet paper codes. 4-15 - Mercan Topkara, Umut Topkara, Mikhail J. Atallah, Cüneyt M. Taskiran, Eugene T. Lin, Edward J. Delp:
A hierarchical protocol for increasing the stealthiness of steganographic methods. 16-24 - Rainer Böhme, Andreas Westfeld:
Statistical characterisation of MP3 encoders for steganalysis. 25-34
Attack and evaluation
- Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Fernando Pérez-González, Frédéric Deguillaume, Thierry Pun:
Quantization-based watermarking performance improvement using host statistics: AWGN attack case. 35-39 - Mustafa Kesal, Mehmet Kivanç Mihçak, Ramarathnam Venkatesan:
An improved attack analysis on a public-key spread spectrum watermarking. 41-45 - André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi:
Overcoming the obstacles of zero-knowledge watermark detection. 46-55
Steganography II
- Elke Franz, Antje Schneidewind:
Adaptive steganography based on dithering. 56-62 - Maxim Sidorov:
Hidden Markov models and steganalysis. 63-67 - Yannick Maret, Touradj Ebrahimi:
Data hiding on 3D polygonal meshes. 68-74 - Benoit Roue, Patrick Bas, Jean-Marc Chassery:
Improving LSB steganalysis using marginal and joint probabilistic distributions. 75-80
Security
- Chao-Yong Hsu, Chun-Shien Lu:
Geometric distortion-resilient image hashing system and its application scalability. 81-92 - Rüdiger Grimm, Patrick Aichroth:
Privacy protection for signed media files: a separation-of-duty approach to the lightweight DRM (LWDRM) system. 93-99 - Andreas Uhl, Andreas Pommer:
Are parameterised biorthogonal wavelet filters suited (better) for selective encryption? 100-106 - André Adelsbach, Jörg Schwenk:
Key-assignment strategies for CPPM. 107-115 - Edward J. Delp:
Multimedia security: the 22nd century approach! 116
Watermarking algorithms
- Sylvain Beauget, Michiel van der Veen, Aweke N. Lemma:
Informed detection of audio watermark for resolving playback speed modifications. 117-123 - Tie Liu, Ramarathnam Venkatesan, Mehmet Kivanç Mihçak:
Scale-invariant image watermarking via optimization algorithms for quantizing randomized statistics. 124-132 - Gwenaël J. Doërr, Jean-Luc Dugelay, Lucas Grangé:
Exploiting self-similarities to defeat digital watermarking systems: a case study on still images. 133-142 - Francesca Uccheddu, Massimiliano Corsini, Mauro Barni:
Wavelet-based blind watermarking of 3D models. 143-154
Authentication I
- Zheng Liu, Xue Li, Zhaoyang Dong:
Multimedia authentication with sensor-based watermarking. 155-159 - Michael Voigt, Bian Yang, Christoph Busch:
Reversible watermarking of 2D-vector data. 160-165
Robust digital watermarking
- Emir Ganic, Ahmet M. Eskicioglu:
Robust DWT-SVD domain image watermarking: embedding data in all frequencies. 166-174 - Michael Brachtl, Andreas Uhl, Werner Dietl:
Key-dependency for a wavelet-based blind watermarking algorithm. 175-179 - Gerrit Schulz, Michael Voigt:
A high capacity watermarking system for digital maps. 180-186 - Ilaria Venturini:
Counteracting Oracle attacks. 187-192 - Natasa Terzija, Walter Geisselhardt:
Digital image watermarking using complex wavelet transform. 193-198 - Martin Steinebach, Sascha Zmudzinski, Fan Chen:
The digital watermarking container: secure and efficient embedding. 199-205 - David Megías, Jordi Herrera-Joancomartí, Julià Minguillón:
An audio watermarking scheme robust against stereo attacks. 206-213
Authentication II
- Huayin Si, Chang-Tsun Li:
Fragile watermarking scheme based on the block-wise dependence in the wavelet domain. 214-219 - Song Yuan, Sorin A. Huss:
Audio watermarking algorithm for real-time speech integrity and authentication. 220-226
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.