The SCEAS System
Navigation Menu

Conferences in DBLP

(mmsec)
2001 (conf/mmsec/2001)

  1. Jana Dittmann, Petra Wohlmacher, Klara Nahrstedt
    Introduction to multimedia and security: protecting the media of the future - securing the future of the media. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2001, pp:1-2 [Conf]
  2. Nicholas Paul Sheppard, Reihaneh Safavi-Naini, Philip Ogunbona
    On multiple watermarking. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2001, pp:3-6 [Conf]
  3. Dimitrios Koukopoulos, Yannis C. Stamatiou
    A compressed-domain watermarking algorithm for mpeg audio layer 3. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2001, pp:7-10 [Conf]
  4. Trista Pei-chun Chen, Tsuhan Chen
    A framework for optimal blind watermark detection. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2001, pp:11-14 [Conf]
  5. M. A. Suhail, M. M. Dawoud
    Watermarking security enhancement using filter parametrization in feature domain. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2001, pp:15-18 [Conf]
  6. Hwan Il Kang, Kab Il Kim, Seung-Soo Han
    Watermarking techniques using the Drawing Exchange Format (DXF) file. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2001, pp:19-22 [Conf]
  7. Chih-Hsuan Tzeng, Wen-Hsiang Tsai
    A new technique for authentication of image/video for multimedia applications. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2001, pp:23-26 [Conf]
  8. Jessica J. Fridrich, Miroslav Goljan, Rui Du
    Reliable detection of LSB steganography in color and grayscale images. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2001, pp:27-30 [Conf]
  9. Veena Sridhar, Xiaobo Li, Mario A. Nascimento
    Towards robust hidden watermarking using multiple quasi-circles. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2001, pp:31-35 [Conf]
  10. Klaus Hansen, Christian Hammer, Lars R. Randleff, Jens Damgaard Andersen
    Steganographic capacity of images, based on image equivalence classes. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2001, pp:36-39 [Conf]
  11. Jörg Schwenk, Tobias Martin, Erik Neumann
    From pay-tv to pay-streaming: similarities and differences. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2001, pp:40-43 [Conf]
  12. Jana Dittmann, Martin Steinebach
    PlataJanus: an audio annotation watermarking framework. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2001, pp:44-47 [Conf]
  13. Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle
    Secure fingerprint-based authentication for Lotus Notes®. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2001, pp:48-51 [Conf]
  14. Sofia K. Tzelepi, Dimitrios K. Koukopoulos, George Pangalos
    A flexible content and context-based access control model for multimedia medical image database systems. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2001, pp:52-55 [Conf]
  15. Rüdiger Grimm
    Security requirements for internet voting. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2001, pp:56-59 [Conf]
  16. Matthias Hollick
    Security awareness in service discovery for multimedia collaboration. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2001, pp:60-63 [Conf]
  17. J. R. Nickerson, S. T. Chow, H. J. Johnson
    Tamper resistant software: extending trust into a hostile environment. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2001, pp:64-67 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002