|
Conferences in DBLP
(mmsec) 2008 (conf/mmsec/2008)
Watermarking, steganography and content forensics. [Citation Graph (, )][DBLP]
Printer profiling for forensics and ballistics. [Citation Graph (, )][DBLP]
Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue. [Citation Graph (, )][DBLP]
Detecting digital audio forgeries by checking frame offsets. [Citation Graph (, )][DBLP]
Locating steganographic payload via ws residuals. [Citation Graph (, )][DBLP]
A lightweight rao-cauchy detector for additive watermarking in the dwt-domain. [Citation Graph (, )][DBLP]
A robust spectral approach for blind watermarking of manifold surfaces. [Citation Graph (, )][DBLP]
Self-synchronizing robust texel watermarking in gaussian scale-space. [Citation Graph (, )][DBLP]
Multiple re-watermarking using varying non-stationary mra with parameterized wavelet filters. [Citation Graph (, )][DBLP]
Histogram-based reversible data hiding technique using subsampling. [Citation Graph (, )][DBLP]
Psycho-acoustic model-based message authentication coding for audio data. [Citation Graph (, )][DBLP]
Efficient pointwise and blockwise encrypted operations. [Citation Graph (, )][DBLP]
Tamper proofing mechanisms for motion capture data. [Citation Graph (, )][DBLP]
On-off keying modulation and tardos fingerprinting. [Citation Graph (, )][DBLP]
The square root law of steganographic capacity. [Citation Graph (, )][DBLP]
Secure covert channels in multiplayer games. [Citation Graph (, )][DBLP]
On completeness of feature spaces in blind steganalysis. [Citation Graph (, )][DBLP]
Detecting LSB matching by applying calibration technique for difference image. [Citation Graph (, )][DBLP]
Steganalysis of YASS. [Citation Graph (, )][DBLP]
Steganalysis of QIM steganography using irregularity measure. [Citation Graph (, )][DBLP]
Impact of feature selection in classification for hidden channel detection on the example of audio data hiding. [Citation Graph (, )][DBLP]
Novelty detection in blind steganalysis. [Citation Graph (, )][DBLP]
Privacy-preserving multimodal person and object identification. [Citation Graph (, )][DBLP]
Vehicle systems: comfort & security enhancement of face/speech fusion with compensational biometric modalities. [Citation Graph (, )][DBLP]
Multimodal authentication based on random projections and source coding. [Citation Graph (, )][DBLP]
Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol. [Citation Graph (, )][DBLP]
A regression-based restoration technique for automated watermark removal. [Citation Graph (, )][DBLP]
A key-recovery attack on authentication watermarking by li and yuan. [Citation Graph (, )][DBLP]
Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes. [Citation Graph (, )][DBLP]
|