The SCEAS System
Navigation Menu

Conferences in DBLP

Security, Steganography, and Watermarking of Multimedia Contents (sswmc)
2005 (conf/sswmc/2005)

  1. Andrew D. Ker
    Resampling and the detection of LSB matching in color bitmaps. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:1-15 [Conf]
  2. Mark T. Hogan, Neil J. Hurley, Guenole C. M. Silvestre, Félix Balado, Kevin M. Whelan
    ML detection of steganography. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:16-27 [Conf]
  3. Andreas Westfeld
    Space filling curves in steganalysis. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:28-37 [Conf]
  4. Kenneth Sullivan, Upamanyu Madhow, Shivkumar Chandrasekaran, B. S. Manjunath
    Steganalysis of spread spectrum data hiding exploiting cover memory. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:38-46 [Conf]
  5. Paul Salama, Brian King
    Efficient secure image transmission: compression integrated with encryption. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:47-58 [Conf]
  6. Elizabeth P. McCarthy, Félix Balado, Guenole C. M. Silvestre, Neil J. Hurley
    A model for improving the performance of feature-extraction-based robust hashing. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:59-67 [Conf]
  7. Longjiang Yu, Martin Schmucker, Christoph Busch, Sheng-He Sun
    Cumulant-based image fingerprints. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:68-75 [Conf]
  8. Elisa Sayrol, Miguel Soriano, Marcel Fernandez, Joan Casanellas, Joan Tomas
    Development of a platform offering video copyright protection and security against illegal distribution. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:76-83 [Conf]
  9. Wenjun Zeng, Junqiang Lan, Xinhua Zhuang
    Security architectures and analysis for content adaptation. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:84-95 [Conf]
  10. Shan He, Min Wu
    Group-based joint coding and embedding technique for multimedia fingerprinting. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:96-105 [Conf]
  11. Mauro Barni
    Shedding light on some possible remedies against watermark desynchronization: a case study. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:106-113 [Conf]
  12. Roman Tzschoppe, Robert Bauml, Robert F. H. Fischer, Johannes B. Huber, Andre Kaup
    Additive non-Gaussian noise attacks on the scalar Costa scheme (SCS). [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:114-123 [Conf]
  13. Abdellatif Zaidi, Remy Boyer, Pierre Duhamel
    Time jitter versus additive noise in a game theory context. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:124-135 [Conf]
  14. José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fernando Pérez-González, Thierry Pun
    Worst-case additive attack against quantization-based data-hiding methods. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:136-146 [Conf]
  15. Chun-Shien Lu, Shih-Wei Sun, Pao-Chi Chang
    Robust hash-based image watermarking with resistance to geometric distortions and watermark-estimation attack. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:147-163 [Conf]
  16. Roberto Caldelli, Alessia De Rosa, R. Becarelli, Mauro Barni
    Coping with local geometric attacks by means of optic-flow-based resynchronization for robust watermarking. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:164-174 [Conf]
  17. Emir Ganic, Scott D. Dexter, Ahmet M. Eskicioglu
    Embedding multiple watermarks in the DFT domain using low- and high-frequency bands. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:175-184 [Conf]
  18. Ning Liu, Koduvayur P. Subbalakshmi
    TCQ-based quantizer design for data hiding in images. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:185-193 [Conf]
  19. Min Wu, Jessica J. Fridrich, Miroslav Goljan, Hongmei Gou
    Handling uneven embedding capacity in binary images: a revisit. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:194-205 [Conf]
  20. Fernando Pérez-González, Carlos Mosquera, Mauro Barni, Andrea Abrardo
    Ensuring gain-invariance in high-rate data hiding. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:206-217 [Conf]
  21. Bian Yang, Martin Schmucker, Xiamu Niu, Christoph Busch, Sheng-He Sun
    Integer-DCT-based reversible image watermarking by adaptive coefficient modification. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:218-229 [Conf]
  22. Patrice Rondao-Alface, Mathieu De Craene, Benoit M. Macq
    Three-dimensional image quality measurement for the benchmarking of 3D watermarking schemes. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:230-240 [Conf]
  23. Hyung Cook Kim, Eugene T. Lin, Oriol Guitart, Edward J. Delp
    Further progress in watermark evaluation testbed (WET). [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:241-251 [Conf]
  24. Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon
    Benchmarking steganographic and steganalysis techniques. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:252-263 [Conf]
  25. Chad Heitzenrater
    Characterization of steganographic algorithms using software metrics. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:264-274 [Conf]
  26. Andreas Lang, Jana Dittmann, Eugene T. Lin, Edward J. Delp
    Application-oriented audio watermark benchmark service. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:275-286 [Conf]
  27. Wolfgang Funk, Daniel Kirchner
    A framework for data-driven algorithm testing. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:287-297 [Conf]
  28. Pedro Comesaña, Fernando Pérez-González, Frans M. Willems
    Applying Erez and Ten Brink's dirty paper codes to data hiding. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:298-307 [Conf]
  29. Pierre Moulin, Ying Wang
    On achievable error exponents for watermarking. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:308-317 [Conf]
  30. Dahua Xie, C. C. Jay Kuo
    Secure Lempel-Ziv compression with embedded encryption. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:318-327 [Conf]
  31. Jessica J. Fridrich, Miroslav Goljan, Petr Lisonek, David Soukal
    Writing on wet paper. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:328-340 [Conf]
  32. Luis Pérez-Freire, Fernando Pérez-González
    Spread-spectrum vs. quantization-based data hiding: misconceptions and implications. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:341-352 [Conf]
  33. Stefan Thiemert, Hichem Sahbi, Martin Steinebach
    Applying interest operators in semi-fragile video watermarking. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:353-362 [Conf]
  34. Mehmet Kucukgoz, Oztan Harmanci, Mehmet Kivanç Mihçak, Ramarathnam Venkatesan
    Robust video watermarking via optimization algorithm for quantization of pseudo-random semi-global statistics. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:363-369 [Conf]
  35. Oztan Harmanci, Mehmet Kucukgoz, Mehmet Kivanç Mihçak
    Temporal synchronization of watermarked video using image hashing. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:370-380 [Conf]
  36. Enrico Hauer, Martin Steinebach
    Robust digital watermark solution for intercoded frames of MPEG video data. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:381-390 [Conf]
  37. Isao Echizen, Hiroshi Yoshiura, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka
    Use of inferential statistics to estimate error probability of video watermarks. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:391-399 [Conf]
  38. Patrice Rondao-Alface, Benoit M. Macq
    Feature-based watermarking of 3D objects: toward robustness against remeshing and desynchronization. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:400-408 [Conf]
  39. Michael Voigt, Bian Yang, Christoph Busch
    High-capacity reversible watermarking for 2D vector data. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:409-417 [Conf]
  40. Kaushal Solanki, Upamanyu Madhow, B. S. Manjunath, Shivkumar Chandrasekaran
    Modeling the print-scan process for resilient data hiding. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:418-429 [Conf]
  41. Aravind K. Mikkilineni, Pei-Ju Chiang, Gazi N. Ali, George T.-C. Chiu, Jan P. Allebach, Edward J. Delp
    Printer identification based on graylevel co-occurrence features for security and forensic applications.. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:430-440 [Conf]
  42. Mercan Topkara, Cüneyt M. Taskiran, Edward J. Delp
    Natural language watermarking. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:441-452 [Conf]
  43. Renato Villán, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun
    Multilevel 2D bar codes: toward high-capacity storage modules for multimedia security and management. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:453-464 [Conf]
  44. Pablo Hennings, Marios Savvides, B. V. K. Vijaya Kumar
    Hiding phase-quantized biometrics: a case of steganography for reduced-complexity correlation filter classifiers. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:465-473 [Conf]
  45. Sascha Schimke, Stefan Kiltz, Claus Vielhauer, Ton Kalker
    Security analysis for biometric data in ID documents. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:474-485 [Conf]
  46. Chunyan Xie, B. V. K. Vijaya Kumar
    Quaternion correlation filters for color face recognition. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:486-494 [Conf]
  47. Mark A. Masry
    A watermarking algorithm for map and chart images. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:495-503 [Conf]
  48. Claus Vielhauer, T. K. Basu, Jana Dittmann, Pranab K. Dutta
    Finding meta data in speech and handwriting biometrics. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:504-515 [Conf]
  49. Ivo D. Shterev, Reginald L. Lagendijk
    Maximum likelihood amplitude scale estimation for quantization-based watermarking in the presence of dither. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:516-527 [Conf]
  50. Chaw-Seng Woo, Jiang Du, Binh Pham
    Geometrically robust digital image watermarking using scale normalization and flowline curvature. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:528-538 [Conf]
  51. Robert J. Berger II, Bijan G. Mobasseri
    Watermarking in JPEG bitstream. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:539-548 [Conf]
  52. Kevin M. Whelan, Félix Balado, Guenole C. M. Silvestre, Neil J. Hurley
    Iterative estimation of amplitude scaling on distortion-compensated dither modulation. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:549-560 [Conf]
  53. Dinu Coltuc, Alain Trémeau
    Simple reversible watermarking schemes. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:561-568 [Conf]
  54. Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Frédéric Deguillaume, Fernando Pérez-González, Thierry Pun
    Robustness improvement of known-host-state watermarking using host statistics. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:569-577 [Conf]
  55. Thomas Vogel, Jana Dittmann
    Illustration watermarking: an object-based approach for digital images. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:578-589 [Conf]
  56. Rajarathnam Chandramouli
    On the choice of risk optimal data embedding strategy, safe embedding rate, and passive steganalysis. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:590-594 [Conf]
  57. Jessica J. Fridrich, David Soukal, Miroslav Goljan
    Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:595-606 [Conf]
  58. Jana Dittmann, Danny Hesse, Reyk Hillert
    Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:607-618 [Conf]
  59. Clifford Bergman, Jennifer Davidson
    Unitary embedding for data hiding with the SVD. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:619-630 [Conf]
  60. Jessica J. Fridrich, Miroslav Goljan, David Soukal, Taras Holotyak
    Forensic steganalysis: determining the stego key in spatial domain steganography. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:631-642 [Conf]
  61. Ping Wah Wong, Hong Chen, Zhongjue Tang
    On steganalysis of plus-minus one embedding of continuous-tone images. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:643-652 [Conf]
  62. Sos S. Agaian, Hong Cai
    New multilevel DCT, feature vectors, and universal blind steganalysis. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:653-663 [Conf]
  63. Micah K. Johnson, Siwei Lyu, Hany Farid
    Steganalysis of recorded speech. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:664-672 [Conf]
  64. Taras Holotyak, Jessica J. Fridrich, David Soukal
    Stochastic approach to secret message length estimation in ±k embedding steganography. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:673-684 [Conf]
  65. Gwenaël J. Doërr, Jean-Luc Dugelay
    Collusion issue in video watermarking. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:685-696 [Conf]
  66. Chuhong Fei, Deepa Kundur, Raymond H. Kwong
    Achieving computational and unconditional security in authentication watermarking: analysis, insights, and algorithms. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:697-708 [Conf]
  67. Emre Topak, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Mehmet Kivanç Mihçak, Thierry Pun
    Security analysis of robust data-hiding with geometrically structured codebooks. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:709-720 [Conf]
  68. Luis Pérez-Freire, Pedro Comesaña Alfaro, Fernando Pérez-González
    Detection in quantization-based watermarking: performance and security issues. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:721-733 [Conf]
  69. Maha El Choubassi, Pierre Moulin
    New sensitivity analysis attack. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:734-745 [Conf]
  70. François Cayre, Caroline Fontaine, Teddy Furon
    Watermarking security part one: Theory. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:746-757 [Conf]
  71. François Cayre, Caroline Fontaine, Teddy Furon
    Watermarking security part two: Practice. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:758-768 [Conf]
  72. Finbarr B. O'Donovan, Neil J. Hurley, Guenole C. M. Silvestre
    An investigation of robustness in nonlinear audio watermarking. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:769-778 [Conf]
  73. Martin Steinebach, Sascha Zmudzinski, Torsten Bolke
    Audio watermarking and partial encryption. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:779-788 [Conf]
  74. Brett A. Bradley, Adnan M. Alattar
    High-capacity invertible data-hiding algorithm for digital audio. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:789-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002