|
Conferences in DBLP
(mmsec) 2007 (conf/mmsec/2007)
- Bhavani M. Thuraisingham
Multimedia systems security. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:1-2 [Conf]
- Jessica J. Fridrich, Tomás Pevný, Jan Kodovský
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:3-14 [Conf]
- Pedro Comesaña, Fernando Pérez-González
On the capacity of stegosystems. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:15-24 [Conf]
- Arati Baliga, Joe Kilian
On covert collaboration. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:25-34 [Conf]
- Weihong Wang, Hany Farid
Exposing digital forgeries in video by detecting duplication. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:35-42 [Conf]
- Brandon Dybala, Brian Jennings, David Letscher
Detecting filtered cloning in digital images. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:43-50 [Conf]
- Yun Q. Shi, Chunhua Chen, Wen Chen
A natural image model approach to splicing detection. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:51-62 [Conf]
- Christian Krätzer, Andrea Oermann, Jana Dittmann, Andreas Lang
Digital audio forensics: a first practical evaluation on microphone and environment classification. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:63-74 [Conf]
- William Luh, Deepa Kundur
Distributed keyless security for correlated data with applications in visual sensor networks. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:75-86 [Conf]
- Dominik Engel, Thomas Stütz, Andreas Uhl
Format-compliant jpeg2000 encryption with combined packet header and packet body protection. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:87-96 [Conf]
- Thomas Stütz, Andreas Uhl
On efficient transparent jpeg2000 encryption. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:97-108 [Conf]
- Juan Ramón Troncoso-Pastoriza, Stefan Katzenbeisser, Mehmet Utku Celik, Aweke N. Lemma
A secure multidimensional point inclusion protocol. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:109-120 [Conf]
- Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang
Histogram-based image hashing scheme robust against geometric deformations. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:121-128 [Conf]
- Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan
Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:129-140 [Conf]
- Andrew D. Ker
The ultimate steganalysis benchmark? [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:141-148 [Conf]
- Hafiz Malik, K. P. Subbalakshmi, Rajarathnam Chandramouli
Steganalysis of GIM-based data hiding using kernel density estimation. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:149-160 [Conf]
- Julien S. Jainsky, Deepa Kundur, Don R. Halverson
Towards digital video steganalysis using asymptotic memoryless detection. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:161-168 [Conf]
- Dima Pröfrock, Mathias Schlauweg, Erika Müller
Geometric warping watermarking extended concerning geometric attacks and embedding artifacts. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:169-174 [Conf]
- Parag Agarwal, Balakrishnan Prabhakaran
Robust blind watermarking mechanism for point sampled geometry. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:175-186 [Conf]
- Claus Vielhauer, Maik Schott
Nested object watermarking: from the rectangular con-straint to polygonal and private annotations. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:187-194 [Conf]
- Mauro Barni, Angela D'Angelo, Neri Merhav
Expanding the class of watermark de-synchronization attacks. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:195-204 [Conf]
- Husrev T. Sencar, Qiming Li, Nasir Memon
A new approach to countering ambiguity attacks. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:205-214 [Conf]
- Alexandra Czarlinska, Deepa Kundur
Attack vs. failure detection in event-driven wireless visual sensor networks. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:215-220 [Conf]
- Corina Nafornita
A new pixel-wise mask for watermarking. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:221-228 [Conf]
- Maneli Noorkami, Russell M. Mersereau
Video watermark detection with controllable performance with and without knowledge of watermark location. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:229-236 [Conf]
- Benjamin Mathon, Patrick Bas, François Cayre
Practical performance analysis of secure modulations for woa spread-spectrum based image watermarking. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:237-244 [Conf]
- Puneet Maheshwari, Parag Agarwal, Balakrishnan Prabhakaran
Progressive compression invariant semi-fragile watermarks for 3d meshes. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:245-250 [Conf]
|