|
Conferences in DBLP
(mmsec) 2006 (conf/mmsec/2006)
- Mauro Barni
Processing encrypted signals: a new frontier for multimedia security. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:1- [Conf]
- Jessica J. Fridrich
Minimizing the embedding impact in steganography. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:2-10 [Conf]
- Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Taras Holotyak, Thierry Pun
Information-theoretic analysis of steganalysis in real images. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:11-16 [Conf]
- Christian Krätzer, Jana Dittmann, Andreas Lang, Tobias Kühne
WLAN steganography: a first practical review. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:17-22 [Conf]
- Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu
Digital invisible ink and its applications in steganography. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:23-28 [Conf]
- Hany Farid
Exposing digital forgeries in scientific images. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:29-36 [Conf]
- Weihong Wang, Hany Farid
Exposing digital forgeries in video by detecting double MPEG compression. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:37-47 [Conf]
- Micah K. Johnson, Hany Farid
Exposing digital forgeries through chromatic aberration. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:48-55 [Conf]
- Qiming Li, Ee-Chien Chang
Robust, short and sensitive authentication tags using secure sketch. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:56-61 [Conf]
- Mathias Schlauweg, Dima Pröfrock, Erika Müller
JPEG2000-based secure image authentication. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:62-67 [Conf]
- Luis Pérez-Freire, Fernando Pérez-González, Teddy Furon
On achievable security levels for lattice data hiding in the known message attack scenario. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:68-79 [Conf]
- Patrick Bas, François Cayre
Achieving subspace or key security for WOA using natural or circular watermarking. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:80-88 [Conf]
- Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Emre Topak, José-Emilio Vila-Forcén, Thierry Pun
On reversibility of random binning based data-hiding techniques: security perspectives. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:89-96 [Conf]
- Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González
Zero-knowledge watermark detector robust to sensitivity attacks. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:97-107 [Conf]
- Yuta Nakashima, Ryuki Tachibana, Masafumi Nishimura, Noboru Babaguchi
Estimation of recording location using audio watermarking. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:108-113 [Conf]
- P. Vinod, Gwenaël J. Doërr, P. K. Bora
Assessing motion-coherency in video watermarking. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:114-119 [Conf]
- Stefan Thiemert, Martin Steinebach, Patrick Wolf
A digital watermark for vector-based fonts. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:120-123 [Conf]
- In Koo Kang, Dong-Hyuck Im, Heung-Kyu Lee, Young-Ho Suh
Implementation of real-time watermarking scheme for high-quality video. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:124-129 [Conf]
- Tobias Scheidat, Andreas Engel, Claus Vielhauer
Parameter optimization for biometric fingerprint recognition using genetic algorithms. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:130-134 [Conf]
- Daniel Socek, Michal Sramka, Oge Marques, Dubravko Culibrk
An improvement to a biometric.based multimedia content protection scheme. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:135-139 [Conf]
- Albert Meixner, Andreas Uhl
Robustness and security of a wavelet-based CBIR hashing algorithm. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:140-145 [Conf]
- Mauro Barni, C. Orlandi, Alessandro Piva
A privacy-preserving protocol for neural-network-based computation. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:146-151 [Conf]
- Rade Petrovic, Babak Tehranchi, Joseph M. Winograd
Digital watermarking security considerations. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:152-157 [Conf]
- Qiming Li, Ee-Chien Chang
Zero-knowledge watermark detection resistant to ambiguity attacks. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:158-163 [Conf]
- Umut Topkara, Mercan Topkara, Mikhail J. Atallah
The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:164-174 [Conf]
- William Zhu, Clark D. Thomborson
Extraction in software watermarking. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:175-181 [Conf]
- Claus Vielhauer, Maik Schott
Image annotation watermarking: nested object embedding using hypergraph model. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:182-189 [Conf]
- Andreas Lang, Jana Dittmann
Transparency and complexity benchmarking of audio watermarking algorithms issues. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:190-201 [Conf]
- Dominik Engel, Rade Kutil, Andreas Uhl
A symbolic transform attack on lightweight encryption based on wavelet filter parameterization. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:202-207 [Conf]
- Andreas Westfeld
Lessons from the BOWS contest. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:208-213 [Conf]
- Teddy Furon
Hermite polynomials as provably good functions to watermark white gaussian hosts. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:224-229 [Conf]
- Parag Agarwal, Ketaki Adi, B. Prabhakaran
Robust blind watermarking mechanism for motion data streams. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:230-235 [Conf]
|