The SCEAS System
Navigation Menu

Conferences in DBLP

(mmsec)
2008 (conf/mmsec/2008)


  1. Watermarking, steganography and content forensics. [Citation Graph (, )][DBLP]


  2. Printer profiling for forensics and ballistics. [Citation Graph (, )][DBLP]


  3. Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue. [Citation Graph (, )][DBLP]


  4. Detecting digital audio forgeries by checking frame offsets. [Citation Graph (, )][DBLP]


  5. Locating steganographic payload via ws residuals. [Citation Graph (, )][DBLP]


  6. A lightweight rao-cauchy detector for additive watermarking in the dwt-domain. [Citation Graph (, )][DBLP]


  7. A robust spectral approach for blind watermarking of manifold surfaces. [Citation Graph (, )][DBLP]


  8. Self-synchronizing robust texel watermarking in gaussian scale-space. [Citation Graph (, )][DBLP]


  9. Multiple re-watermarking using varying non-stationary mra with parameterized wavelet filters. [Citation Graph (, )][DBLP]


  10. Histogram-based reversible data hiding technique using subsampling. [Citation Graph (, )][DBLP]


  11. Psycho-acoustic model-based message authentication coding for audio data. [Citation Graph (, )][DBLP]


  12. Efficient pointwise and blockwise encrypted operations. [Citation Graph (, )][DBLP]


  13. Tamper proofing mechanisms for motion capture data. [Citation Graph (, )][DBLP]


  14. On-off keying modulation and tardos fingerprinting. [Citation Graph (, )][DBLP]


  15. The square root law of steganographic capacity. [Citation Graph (, )][DBLP]


  16. Secure covert channels in multiplayer games. [Citation Graph (, )][DBLP]


  17. On completeness of feature spaces in blind steganalysis. [Citation Graph (, )][DBLP]


  18. Detecting LSB matching by applying calibration technique for difference image. [Citation Graph (, )][DBLP]


  19. Steganalysis of YASS. [Citation Graph (, )][DBLP]


  20. Steganalysis of QIM steganography using irregularity measure. [Citation Graph (, )][DBLP]


  21. Impact of feature selection in classification for hidden channel detection on the example of audio data hiding. [Citation Graph (, )][DBLP]


  22. Novelty detection in blind steganalysis. [Citation Graph (, )][DBLP]


  23. Privacy-preserving multimodal person and object identification. [Citation Graph (, )][DBLP]


  24. Vehicle systems: comfort & security enhancement of face/speech fusion with compensational biometric modalities. [Citation Graph (, )][DBLP]


  25. Multimodal authentication based on random projections and source coding. [Citation Graph (, )][DBLP]


  26. Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol. [Citation Graph (, )][DBLP]


  27. A regression-based restoration technique for automated watermark removal. [Citation Graph (, )][DBLP]


  28. A key-recovery attack on authentication watermarking by li and yuan. [Citation Graph (, )][DBLP]


  29. Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002