The SCEAS System
Navigation Menu

Conferences in DBLP

(mmsec)
2006 (conf/mmsec/2006)

  1. Mauro Barni
    Processing encrypted signals: a new frontier for multimedia security. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:1- [Conf]
  2. Jessica J. Fridrich
    Minimizing the embedding impact in steganography. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:2-10 [Conf]
  3. Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Taras Holotyak, Thierry Pun
    Information-theoretic analysis of steganalysis in real images. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:11-16 [Conf]
  4. Christian Krätzer, Jana Dittmann, Andreas Lang, Tobias Kühne
    WLAN steganography: a first practical review. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:17-22 [Conf]
  5. Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu
    Digital invisible ink and its applications in steganography. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:23-28 [Conf]
  6. Hany Farid
    Exposing digital forgeries in scientific images. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:29-36 [Conf]
  7. Weihong Wang, Hany Farid
    Exposing digital forgeries in video by detecting double MPEG compression. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:37-47 [Conf]
  8. Micah K. Johnson, Hany Farid
    Exposing digital forgeries through chromatic aberration. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:48-55 [Conf]
  9. Qiming Li, Ee-Chien Chang
    Robust, short and sensitive authentication tags using secure sketch. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:56-61 [Conf]
  10. Mathias Schlauweg, Dima Pröfrock, Erika Müller
    JPEG2000-based secure image authentication. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:62-67 [Conf]
  11. Luis Pérez-Freire, Fernando Pérez-González, Teddy Furon
    On achievable security levels for lattice data hiding in the known message attack scenario. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:68-79 [Conf]
  12. Patrick Bas, François Cayre
    Achieving subspace or key security for WOA using natural or circular watermarking. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:80-88 [Conf]
  13. Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Emre Topak, José-Emilio Vila-Forcén, Thierry Pun
    On reversibility of random binning based data-hiding techniques: security perspectives. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:89-96 [Conf]
  14. Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González
    Zero-knowledge watermark detector robust to sensitivity attacks. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:97-107 [Conf]
  15. Yuta Nakashima, Ryuki Tachibana, Masafumi Nishimura, Noboru Babaguchi
    Estimation of recording location using audio watermarking. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:108-113 [Conf]
  16. P. Vinod, Gwenaël J. Doërr, P. K. Bora
    Assessing motion-coherency in video watermarking. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:114-119 [Conf]
  17. Stefan Thiemert, Martin Steinebach, Patrick Wolf
    A digital watermark for vector-based fonts. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:120-123 [Conf]
  18. In Koo Kang, Dong-Hyuck Im, Heung-Kyu Lee, Young-Ho Suh
    Implementation of real-time watermarking scheme for high-quality video. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:124-129 [Conf]
  19. Tobias Scheidat, Andreas Engel, Claus Vielhauer
    Parameter optimization for biometric fingerprint recognition using genetic algorithms. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:130-134 [Conf]
  20. Daniel Socek, Michal Sramka, Oge Marques, Dubravko Culibrk
    An improvement to a biometric.based multimedia content protection scheme. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:135-139 [Conf]
  21. Albert Meixner, Andreas Uhl
    Robustness and security of a wavelet-based CBIR hashing algorithm. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:140-145 [Conf]
  22. Mauro Barni, C. Orlandi, Alessandro Piva
    A privacy-preserving protocol for neural-network-based computation. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:146-151 [Conf]
  23. Rade Petrovic, Babak Tehranchi, Joseph M. Winograd
    Digital watermarking security considerations. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:152-157 [Conf]
  24. Qiming Li, Ee-Chien Chang
    Zero-knowledge watermark detection resistant to ambiguity attacks. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:158-163 [Conf]
  25. Umut Topkara, Mercan Topkara, Mikhail J. Atallah
    The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:164-174 [Conf]
  26. William Zhu, Clark D. Thomborson
    Extraction in software watermarking. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:175-181 [Conf]
  27. Claus Vielhauer, Maik Schott
    Image annotation watermarking: nested object embedding using hypergraph model. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:182-189 [Conf]
  28. Andreas Lang, Jana Dittmann
    Transparency and complexity benchmarking of audio watermarking algorithms issues. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:190-201 [Conf]
  29. Dominik Engel, Rade Kutil, Andreas Uhl
    A symbolic transform attack on lightweight encryption based on wavelet filter parameterization. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:202-207 [Conf]
  30. Andreas Westfeld
    Lessons from the BOWS contest. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:208-213 [Conf]
  31. Teddy Furon
    Hermite polynomials as provably good functions to watermark white gaussian hosts. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:224-229 [Conf]
  32. Parag Agarwal, Ketaki Adi, B. Prabhakaran
    Robust blind watermarking mechanism for motion data streams. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:230-235 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002