Stop the war!
Остановите войну!
for scientists:
default search action
11. MM&Sec 2009: Princeton, NJ, USA
- Edward W. Felten, Jana Dittmann, Jessica J. Fridrich, Scott Craver:
Multimedia and Security Workshop, MM&Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009. ACM 2009, ISBN 978-1-60558-492-8
Watermarking I
- Patrick Bas, Andreas Westfeld:
Two key estimation techniques for the broken arrows watermarking scheme. 1-8 - Mina Deng, Tiziano Bianchi, Alessandro Piva, Bart Preneel:
An efficient buyer-seller watermarking protocol based on composite signal representation. 9-18
Watermarking II
- Ming Chen, Zhenyong Chen, Xiao Zeng, Zhang Xiong:
Reversible data hiding using additive prediction-error expansion. 19-24 - Peter Meerwald, Andreas Uhl:
Additive spread-spectrum watermark detection in demosaicked images. 25-32 - Benjamin Mathon, Patrick Bas, François Cayre, Benoît Macq:
Optimization of natural watermarking using transportation theory. 33-38
Forensics I
- Weihong Wang, Hany Farid:
Exposing digital forgeries in video by detecting double quantization. 39-48 - Christian Kraetzer, Maik Schott, Jana Dittmann:
Unweighted fusion in microphone forensics using a decision tree and linear logistic regression models. 49-56 - Brian D'Alessandro, Yun Q. Shi:
Mp3 bit rate quality detection through frequency spectrum analysis. 57-62
Steganalysis
- Jan Kodovský, Jessica J. Fridrich:
Calibration revisited. 63-74 - Tomás Pevný, Patrick Bas, Jessica J. Fridrich:
Steganalysis by subtractive pixel adjacency matrix. 75-84 - Andrew D. Ker:
The square root law requires a linear key. 85-92
Fingerprinting
- W. Sabrina Lin, Shan He, Jeffrey Bloom:
Performance study and improvement on ECC-based binary anti-collusion forensic code for multimedia. 93-98 - Teddy Furon, Luis Pérez-Freire:
EM decoding of tardos traitor tracing codes. 99-106
Forensics II
- Anindya Sarkar, Lakshmanan Nataraj, B. S. Manjunath:
Detection of seam carving and localization of seam insertions in digital images. 107-116 - Rui Yang, Yun-Qing Shi, Jiwu Huang:
Defeating fake-quality MP3. 117-124 - Na Fan, Cheng Jin, Yizhen Huang:
A pixel-based digital photo authentication framework via demosaicking inter-pixel correlation. 125-130
Steganography
- Vasiliy Sachnev, Hyoung Joong Kim, Rongyue Zhang:
Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. 131-140 - Elke Franz, Stefan Rönisch, Robert Bartel:
Improved embedding based on a set of cover images. 141-150 - Enping Li, Scott Craver:
A supraliminal channel in a wireless phone application. 151-154
Encryption
- Yun Cao, Xianfeng Zhao, Dengguo Feng:
Entropy codec based on evolutionary MHT and its application in video encryption. 155-160 - Heinz Hofbauer, Andreas Uhl:
Selective encryption of the MC EZBC bitstream for DRM scenarios. 161-170 - Idris M. Atakli, Yu Chen, Qing Wu, Scott Craver:
BLINK: pixel-domain encryption for secure document management. 171-176
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.