The SCEAS System
Navigation Menu

Conferences in DBLP

(mmsec)
2004 (conf/mmsec/2004)

  1. Jana Dittmann, Jessica J. Fridrich
    Introduction to the ACM multimedia and security workshop. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:1-3 [Conf]
  2. Jessica J. Fridrich, Miroslav Goljan, David Soukal
    Perturbed quantization steganography with wet paper codes. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:4-15 [Conf]
  3. Mercan Topkara, Umut Topkara, Mikhail J. Atallah, Cüneyt M. Taskiran, Eugene Lin, Edward J. Delp
    A hierarchical protocol for increasing the stealthiness of steganographic methods. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:16-24 [Conf]
  4. Rainer Böhme, Andreas Westfeld
    Statistical characterisation of MP3 encoders for steganalysis. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:25-34 [Conf]
  5. Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Fernando Pérez-González, Frédéric Deguillaume, Thierry Pun
    Quantization-based watermarking performance improvement using host statistics: AWGN attack case. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:35-39 [Conf]
  6. Mustafa Kesal, Mehmet Kivanç Mihçak, Ramarathnam Venkatesan
    An improved attack analysis on a public-key spread spectrum watermarking. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:41-45 [Conf]
  7. André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi
    Overcoming the obstacles of zero-knowledge watermark detection. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:46-55 [Conf]
  8. Elke Franz, Antje Schneidewind
    Adaptive steganography based on dithering. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:56-62 [Conf]
  9. Maxim Sidorov
    Hidden Markov models and steganalysis. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:63-67 [Conf]
  10. Yannick Maret, Touradj Ebrahimi
    Data hiding on 3D polygonal meshes. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:68-74 [Conf]
  11. Benoit Roue, Patrick Bas, Jean-Marc Chassery
    Improving LSB steganalysis using marginal and joint probabilistic distributions. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:75-80 [Conf]
  12. Chao-Yong Hsu, Chun-Shien Lu
    Geometric distortion-resilient image hashing system and its application scalability. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:81-92 [Conf]
  13. Rüdiger Grimm, Patrick Aichroth
    Privacy protection for signed media files: a separation-of-duty approach to the lightweight DRM (LWDRM) system. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:93-99 [Conf]
  14. Andreas Uhl, Andreas Pommer
    Are parameterised biorthogonal wavelet filters suited (better) for selective encryption? [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:100-106 [Conf]
  15. André Adelsbach, Jörg Schwenk
    Key-assignment strategies for CPPM. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:107-115 [Conf]
  16. Edward J. Delp
    Multimedia security: the 22nd century approach! [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:116- [Conf]
  17. Sylvain Beauget, Michiel van der Veen, Aweke N. Lemma
    Informed detection of audio watermark for resolving playback speed modifications. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:117-123 [Conf]
  18. Tie Liu, Ramarathnam Venkatesan, Mehmet Kivanç Mihçak
    Scale-invariant image watermarking via optimization algorithms for quantizing randomized statistics. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:124-132 [Conf]
  19. Gwenaël J. Doërr, Jean-Luc Dugelay, Lucas Grangé
    Exploiting self-similarities to defeat digital watermarking systems: a case study on still images. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:133-142 [Conf]
  20. F. Uccheddu, Massimiliano Corsini, Mauro Barni
    Wavelet-based blind watermarking of 3D models. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:143-154 [Conf]
  21. Zheng Liu, Xue Li, ZhaoYang Dong
    Multimedia authentication with sensor-based watermarking. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:155-159 [Conf]
  22. Michael Voigt, Bian Yang, Christoph Busch
    Reversible watermarking of 2D-vector data. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:160-165 [Conf]
  23. Emir Ganic, Ahmet M. Eskicioglu
    Robust DWT-SVD domain image watermarking: embedding data in all frequencies. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:166-174 [Conf]
  24. Michael Brachtl, Andreas Uhl, Werner Dietl
    Key-dependency for a wavelet-based blind watermarking algorithm. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:175-179 [Conf]
  25. Gerrit Schulz, Michael Voigt
    A high capacity watermarking system for digital maps. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:180-186 [Conf]
  26. Ilaria Venturini
    Counteracting Oracle attacks. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:187-192 [Conf]
  27. Natasa Terzija, Walter Geisselhardt
    Digital image watermarking using complex wavelet transform. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:193-198 [Conf]
  28. Martin Steinebach, Sascha Zmudzinski, Fan Chen
    The digital watermarking container: secure and efficient embedding. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:199-205 [Conf]
  29. David Megías, Jordi Herrera-Joancomartí, Julià Minguillón
    An audio watermarking scheme robust against stereo attacks. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:206-213 [Conf]
  30. Huayin Si, Chang-Tsun Li
    Fragile watermarking scheme based on the block-wise dependence in the wavelet domain. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:214-219 [Conf]
  31. Song Yuan, Sorin A. Huss
    Audio watermarking algorithm for real-time speech integrity and authentication. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:220-226 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002