|
Conferences in DBLP
(mmsec) 2001 (conf/mmsec/2001)
- Jana Dittmann, Petra Wohlmacher, Klara Nahrstedt
Introduction to multimedia and security: protecting the media of the future - securing the future of the media. [Citation Graph (0, 0)][DBLP] MM&Sec, 2001, pp:1-2 [Conf]
- Nicholas Paul Sheppard, Reihaneh Safavi-Naini, Philip Ogunbona
On multiple watermarking. [Citation Graph (0, 0)][DBLP] MM&Sec, 2001, pp:3-6 [Conf]
- Dimitrios Koukopoulos, Yannis C. Stamatiou
A compressed-domain watermarking algorithm for mpeg audio layer 3. [Citation Graph (0, 0)][DBLP] MM&Sec, 2001, pp:7-10 [Conf]
- Trista Pei-chun Chen, Tsuhan Chen
A framework for optimal blind watermark detection. [Citation Graph (0, 0)][DBLP] MM&Sec, 2001, pp:11-14 [Conf]
- M. A. Suhail, M. M. Dawoud
Watermarking security enhancement using filter parametrization in feature domain. [Citation Graph (0, 0)][DBLP] MM&Sec, 2001, pp:15-18 [Conf]
- Hwan Il Kang, Kab Il Kim, Seung-Soo Han
Watermarking techniques using the Drawing Exchange Format (DXF) file. [Citation Graph (0, 0)][DBLP] MM&Sec, 2001, pp:19-22 [Conf]
- Chih-Hsuan Tzeng, Wen-Hsiang Tsai
A new technique for authentication of image/video for multimedia applications. [Citation Graph (0, 0)][DBLP] MM&Sec, 2001, pp:23-26 [Conf]
- Jessica J. Fridrich, Miroslav Goljan, Rui Du
Reliable detection of LSB steganography in color and grayscale images. [Citation Graph (0, 0)][DBLP] MM&Sec, 2001, pp:27-30 [Conf]
- Veena Sridhar, Xiaobo Li, Mario A. Nascimento
Towards robust hidden watermarking using multiple quasi-circles. [Citation Graph (0, 0)][DBLP] MM&Sec, 2001, pp:31-35 [Conf]
- Klaus Hansen, Christian Hammer, Lars R. Randleff, Jens Damgaard Andersen
Steganographic capacity of images, based on image equivalence classes. [Citation Graph (0, 0)][DBLP] MM&Sec, 2001, pp:36-39 [Conf]
- Jörg Schwenk, Tobias Martin, Erik Neumann
From pay-tv to pay-streaming: similarities and differences. [Citation Graph (0, 0)][DBLP] MM&Sec, 2001, pp:40-43 [Conf]
- Jana Dittmann, Martin Steinebach
PlataJanus: an audio annotation watermarking framework. [Citation Graph (0, 0)][DBLP] MM&Sec, 2001, pp:44-47 [Conf]
- Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle
Secure fingerprint-based authentication for Lotus Notes®. [Citation Graph (0, 0)][DBLP] MM&Sec, 2001, pp:48-51 [Conf]
- Sofia K. Tzelepi, Dimitrios K. Koukopoulos, George Pangalos
A flexible content and context-based access control model for multimedia medical image database systems. [Citation Graph (0, 0)][DBLP] MM&Sec, 2001, pp:52-55 [Conf]
- Rüdiger Grimm
Security requirements for internet voting. [Citation Graph (0, 0)][DBLP] MM&Sec, 2001, pp:56-59 [Conf]
- Matthias Hollick
Security awareness in service discovery for multimedia collaboration. [Citation Graph (0, 0)][DBLP] MM&Sec, 2001, pp:60-63 [Conf]
- J. R. Nickerson, S. T. Chow, H. J. Johnson
Tamper resistant software: extending trust into a hostile environment. [Citation Graph (0, 0)][DBLP] MM&Sec, 2001, pp:64-67 [Conf]
|