The SCEAS System
Navigation Menu

Conferences in DBLP

(mmsec)
2007 (conf/mmsec/2007)

  1. Bhavani M. Thuraisingham
    Multimedia systems security. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:1-2 [Conf]
  2. Jessica J. Fridrich, Tomás Pevný, Jan Kodovský
    Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:3-14 [Conf]
  3. Pedro Comesaña, Fernando Pérez-González
    On the capacity of stegosystems. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:15-24 [Conf]
  4. Arati Baliga, Joe Kilian
    On covert collaboration. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:25-34 [Conf]
  5. Weihong Wang, Hany Farid
    Exposing digital forgeries in video by detecting duplication. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:35-42 [Conf]
  6. Brandon Dybala, Brian Jennings, David Letscher
    Detecting filtered cloning in digital images. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:43-50 [Conf]
  7. Yun Q. Shi, Chunhua Chen, Wen Chen
    A natural image model approach to splicing detection. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:51-62 [Conf]
  8. Christian Krätzer, Andrea Oermann, Jana Dittmann, Andreas Lang
    Digital audio forensics: a first practical evaluation on microphone and environment classification. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:63-74 [Conf]
  9. William Luh, Deepa Kundur
    Distributed keyless security for correlated data with applications in visual sensor networks. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:75-86 [Conf]
  10. Dominik Engel, Thomas Stütz, Andreas Uhl
    Format-compliant jpeg2000 encryption with combined packet header and packet body protection. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:87-96 [Conf]
  11. Thomas Stütz, Andreas Uhl
    On efficient transparent jpeg2000 encryption. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:97-108 [Conf]
  12. Juan Ramón Troncoso-Pastoriza, Stefan Katzenbeisser, Mehmet Utku Celik, Aweke N. Lemma
    A secure multidimensional point inclusion protocol. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:109-120 [Conf]
  13. Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang
    Histogram-based image hashing scheme robust against geometric deformations. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:121-128 [Conf]
  14. Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan
    Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:129-140 [Conf]
  15. Andrew D. Ker
    The ultimate steganalysis benchmark? [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:141-148 [Conf]
  16. Hafiz Malik, K. P. Subbalakshmi, Rajarathnam Chandramouli
    Steganalysis of GIM-based data hiding using kernel density estimation. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:149-160 [Conf]
  17. Julien S. Jainsky, Deepa Kundur, Don R. Halverson
    Towards digital video steganalysis using asymptotic memoryless detection. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:161-168 [Conf]
  18. Dima Pröfrock, Mathias Schlauweg, Erika Müller
    Geometric warping watermarking extended concerning geometric attacks and embedding artifacts. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:169-174 [Conf]
  19. Parag Agarwal, Balakrishnan Prabhakaran
    Robust blind watermarking mechanism for point sampled geometry. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:175-186 [Conf]
  20. Claus Vielhauer, Maik Schott
    Nested object watermarking: from the rectangular con-straint to polygonal and private annotations. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:187-194 [Conf]
  21. Mauro Barni, Angela D'Angelo, Neri Merhav
    Expanding the class of watermark de-synchronization attacks. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:195-204 [Conf]
  22. Husrev T. Sencar, Qiming Li, Nasir Memon
    A new approach to countering ambiguity attacks. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:205-214 [Conf]
  23. Alexandra Czarlinska, Deepa Kundur
    Attack vs. failure detection in event-driven wireless visual sensor networks. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:215-220 [Conf]
  24. Corina Nafornita
    A new pixel-wise mask for watermarking. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:221-228 [Conf]
  25. Maneli Noorkami, Russell M. Mersereau
    Video watermark detection with controllable performance with and without knowledge of watermark location. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:229-236 [Conf]
  26. Benjamin Mathon, Patrick Bas, François Cayre
    Practical performance analysis of secure modulations for woa spread-spectrum based image watermarking. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:237-244 [Conf]
  27. Puneet Maheshwari, Parag Agarwal, Balakrishnan Prabhakaran
    Progressive compression invariant semi-fragile watermarks for 3d meshes. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:245-250 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002