The SCEAS System
Navigation Menu

Conferences in DBLP

Security, Steganography, and Watermarking of Multimedia Contents (sswmc)
2004 (conf/sswmc/2004)

  1. Shalin P. Trivedi, Rajarathnam Chandramouli
    Locally most-powerful detector for secret key estimation in spread spectrum image steganography. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:1-12 [Conf]
  2. Jeremiah J. Harmsen, William A. Pearlman
    Kernel Fisher discriminant for steganalysis of JPEG hiding methods. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:13-22 [Conf]
  3. Jessica J. Fridrich, Miroslav Goljan
    On estimation of secret message length in LSB steganography in spatial domain. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:23-34 [Conf]
  4. Siwei Lyu, Hany Farid
    Steganalysis using color wavelet statistics and one-class support vector machines. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:35-45 [Conf]
  5. Sos S. Agaian, Benjamin M. Rodriguez, Glenn B. Dietrich
    Steganalysis using modified pixel comparison and complexity measure. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:46-57 [Conf]
  6. Mark T. Hogan, Guenole C. M. Silvestre, Neil J. Hurley
    Performance evaluation of blind steganalysis classifiers. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:58-69 [Conf]
  7. Jessica J. Fridrich, Miroslav Goljan, David Soukal
    Searching for the stego-key. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:70-82 [Conf]
  8. Andrew D. Ker
    Quantitative evaluation of pairs and RS steganalysis. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:83-97 [Conf]
  9. Rui Du, Larry E. Guthrie, Doug Buchy
    Steganalysis with JPEG and GIF images. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:98-104 [Conf]
  10. Michael Arnold, Zongwei Huang
    Fast audio watermarking: concepts and realizations. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:105-115 [Conf]
  11. Alejandro LoboGuerrero, Patrick Bas, Joel Lienard
    An informed synchronization scheme for audio data hiding. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:116-126 [Conf]
  12. Toshiyuki Sakai, Naohisa Komatsu
    Digital watermarking based on process of speech production. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:127-138 [Conf]
  13. Ryuki Tachibana
    Two-dimensional audio watermark for MPEG AAC audio. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:139-150 [Conf]
  14. Kaliappan Gopalan
    Cepstral domain modification of audio signals for data embedding: preliminary results. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:151-161 [Conf]
  15. Thai Duy Hien, Zensho Nakao, Yen-Wei Chen
    ICA-based robust logo image watermarking. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:162-172 [Conf]
  16. Rakhi C. Motwani, Jeff Breidenbach, John R. Black
    Collocated Dataglyphs for large-message storage and retrieval. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:173-183 [Conf]
  17. John Stach
    Machine vision applications of digital watermarking. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:184-191 [Conf]
  18. Jonathan Irons, Martin Schmucker
    Fingerprinting of music scores. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:192-199 [Conf]
  19. Michiel van der Veen, Aweke N. Lemma, Ton Kalker
    Watermarking and fingerprinting for electronic music delivery. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:200-211 [Conf]
  20. Brett A. Bradley
    Improvement to CDF grounded lattice codes. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:212-223 [Conf]
  21. Jana Dittmann, Martin Steinebach, Andreas Lang, Sascha Zmudzinski
    Advanced audio watermarking benchmarking. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:224-235 [Conf]
  22. Hyung Cook Kim, Hakeem Ogunleye, Oriol Guitart, Edward J. Delp
    The Watermark Evaluation Testbed (WET). [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:236-247 [Conf]
  23. Sebastien Lugan, Benoit M. Macq
    Thread-based benchmarking deployment. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:248-255 [Conf]
  24. Iwan Setyawan, Reginald L. Lagendijk
    Human perception of geometric distortions in images. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:256-267 [Conf]
  25. Toshiyuki Umeda, Ana B. Batolomeu, Filipe A. Francob, Damien Delannay, Benoit M. Macq
    Rate-distortion analysis of steganography for conveying stereovision disparity maps. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:268-273 [Conf]
  26. Andrea Abrardo, Mauro Barni
    Orthogonal dirty paper coding for informed data hiding. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:274-285 [Conf]
  27. Stéphane Pateux, Gaëtan Le Guelvouit, Jonathan Delhumeau
    Capacity of data-hiding system subject to desynchronization. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:286-295 [Conf]
  28. Job Oostveen, Ton Kalker, Marius Staring
    Adaptive quantization watermarking. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:296-303 [Conf]
  29. Gwenaël J. Doërr, Jean-Luc Dugelay
    Secure background watermarking based on video mosaicing. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:304-314 [Conf]
  30. Enrico Hauer, Stefan Thiemert
    Synchronization technique to detect MPEG video frames for watermark retrieval. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:315-324 [Conf]
  31. Yuewei Dai, Stefan Thiemert, Martin Steinebach
    Feature-based watermarking scheme for MPEG-I/II video authentication. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:325-335 [Conf]
  32. Wolfgang Funk
    Impact of MPEG-4 3D mesh coding on watermarking algorithms for polygonal 3D meshes. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:336-344 [Conf]
  33. Hideki Noda, Tomofumi Furuta, Michiharu Niimi, Eiji Kawaguchi
    Video steganography based on bit-plane decomposition of wavelet-transformed video. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:345-353 [Conf]
  34. Jessica J. Fridrich, Miroslav Goljan, Qing Chen, Vivek Pathak
    Lossless data embedding with file size preservation. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:354-365 [Conf]
  35. Bijan G. Mobasseri, Robert J. Berger II
    Reversible compressed domain watermarking by exploiting code space inefficiency. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:366-373 [Conf]
  36. Arno J. van Leest, Michiel van der Veen, Fons Bruekers
    Reversible watermarking for images. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:374-385 [Conf]
  37. John Stach, Adnan M. Alattar
    A high-capacity invertible data-hiding algorithm using a generalized reversible integer transform. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:386-396 [Conf]
  38. Bijan G. Mobasseri, Domenick Cinalli
    Reversible watermarking using two-way decodable codes. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:397-404 [Conf]
  39. Bian Yang, Martin Schmucker, Wolfgang Funk, Christoph Busch, Sheng-He Sun
    Integer DCT-based reversible watermarking for images using companding technique. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:405-415 [Conf]
  40. Justin Picard, Claus Vielhauer, Niels J. Thorwirth
    Towards fraud-proof ID documents using multiple data hiding technologies and biometrics. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:416-427 [Conf]
  41. Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Frédéric Deguillaume, Thierry Pun
    Visual communications with side information via distributed printing channels: extended multimedia and security perspectives. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:428-445 [Conf]
  42. Khaled W. Mahmoud, Jonathon M. Blackledge, Sekharjit Datta, James A. Flint
    Print protection using high-frequency fractal noise. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:446-454 [Conf]
  43. Aravind K. Mikkilineni, Gazi N. Ali, Pei-Ju Chiang, George T.-C. Chiu, Jan P. Allebach, Edward J. Delp
    Signature-embedding in printed documents for security and forensic applications. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:455-466 [Conf]
  44. Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp
    Universal image steganalysis using rate-distortion curves. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:467-476 [Conf]
  45. Ying Wang, Pierre Moulin
    Steganalysis of block-structured stegotext. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:477-488 [Conf]
  46. Jeremiah J. Harmsen, Kevin D. Bowers, William A. Pearlman
    Fast additive noise steganalysis. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:489-495 [Conf]
  47. Rajarathnam Chandramouli, Shalin P. Trivedi, R. N. Uma
    On the complexity and hardness of the steganography embedding problem. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:496-500 [Conf]
  48. Jeroen Lichtenauer, Iwan Setyawan, Reginald L. Lagendijk
    Hiding correlation-based watermark templates using secret modulation. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:501-512 [Conf]
  49. Yuxin Liu, Bin Ni, Xiaojun Feng, Edward J. Delp
    LOT-based adaptive image watermarking. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:513-523 [Conf]
  50. Kevin M. Whelan, Guenole C. M. Silvestre, Neil J. Hurley
    Error correction coding of nonlinear side-informed watermarking schemes. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:524-535 [Conf]
  51. Eugene T. Lin, Edward J. Delp
    Spatial synchronization using watermark key structure. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:536-547 [Conf]
  52. Ning Liu, Koduvayur P. Subbalakshmi
    Vector-quantization-based scheme for data embedding for images. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:548-559 [Conf]
  53. Jin S. Seo, Chang D. Yoo
    Image watermarking based on scale-space representation. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:560-570 [Conf]
  54. Oriol Guitart Pla, Eugene T. Lin, Edward J. Delp
    A wavelet watermarking algorithm based on a tree structure. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:571-580 [Conf]
  55. Damien Delannay, Benoit M. Macq
    Classification of watermarking schemes robust against loss of synchronization. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:581-591 [Conf]
  56. Pedro Comesaña, Fernando Pérez-González
    Quantifying security leaks in spread spectrum data hiding: a game-theoretic approach. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:592-601 [Conf]
  57. Jinhai Wu, Bin B. Zhu, Shipeng Li, Fuzong Lin
    New attacks on SARI image authentication system. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:602-609 [Conf]
  58. Min Wu
    Distortion compensated lookup-table embedding: joint security and robustness enhancement for quantization-based data hiding. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:610-621 [Conf]
  59. Umut Uludag, Anil K. Jain
    Attacks on biometric systems: a case study in fingerprints. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:622-633 [Conf]
  60. Raymond N. J. Veldhuis, Asker M. Bazen, Joost A. Kauffman, Pieter H. Hartel
    Biometric verification based on grip-pattern recognition. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:634-641 [Conf]
  61. Claus Vielhauer, Ton Kalker
    Security for biometric data. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:642-652 [Conf]
  62. Anoop M. Namboodiri, Anil K. Jain
    Multimedia document authentication using on-line signatures as watermarks. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:653-662 [Conf]
  63. Gordon W. Braudaway, Fred Mintzer
    Application of invisible image watermarks to previously half-toned images. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:663-669 [Conf]
  64. Gaurav Sharma, Shen-ge Wang
    Show-through watermarking of duplex printed documents. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:670-684 [Conf]
  65. Adnan M. Alattar, Osama M. Alattar
    Watermarking electronic text documents containing justified paragraphs and irregular line spacing. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:685-695 [Conf]
  66. Dahua Xie, C. C. Jay Kuo
    Efficient multimedia data encryption based on flexible QM coder. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:696-704 [Conf]
  67. Scott D. Dexter, Roman Belostotskiy, Ahmet M. Eskicioglu
    Multilayer multicast key management with threshold cryptography. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:705-715 [Conf]
  68. Hirotsugu Yamamoto, Yoshio Hayasaki, Nobuo Nishida
    Securing display of grayscale and multicolored images by use of visual cryptography. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:716-724 [Conf]
  69. Xiaowei Xu, Scott D. Dexter, Ahmet M. Eskicioglu
    A hybrid scheme for encryption and watermarking. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:725-736 [Conf]
  70. Roberto Caldelli, Giovanni Macaluso, Franco Bartolini, Mauro Barni
    Near-lossless image authentication transparent to near-lossless coding. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:737-747 [Conf]
  71. Min Wu, Wade Trappe, Z. Jane Wang, K. J. Ray Liu
    Collusion-resistant multimedia fingerprinting: a unified framework. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:748-759 [Conf]
  72. Chuhong Fei, Deepa Kundur, Raymond H. Kwong
    Analysis and design of authentication watermarking. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:760-771 [Conf]
  73. Albert Meixner, Andreas Uhl
    Analysis of a wavelet-based robust hash algorithm. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:772-783 [Conf]
  74. Emmanuel Fernandes, Jean-François Delaigle
    Geometric soft hash functions for 2D and 3D objects. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:784-795 [Conf]
  75. Ivo D. Shterev, Reginald L. Lagendijk, Richard Heusdens
    Statistical amplitude scale estimation for quantization-based watermarking. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:796-804 [Conf]
  76. Félix Balado, Fernando Pérez-González, Pedro Comesaña
    Blind iterative decoding of side-informed data hiding using the expectation-maximization algorithm. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:805-815 [Conf]
  77. Ng Tek Ming, Hari Krishna Garg
    Wavelet domain watermarking using maximum-likelihood detection. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:816-826 [Conf]
  78. Vinicius Licks, Fabrício Ourique, Ramiro Jordan
    Performance bounds on optimal watermark synchronizers. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:827-837 [Conf]
  79. Stefan Katzenbeisser, Jana Dittmann
    Malicious attacks on media authentication schemes based on invertible watermarks. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:838-847 [Conf]
  80. Radu Sion, Mikhail J. Atallah
    Attacking digital watermarks. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:848-858 [Conf]
  81. Mauro Barni, Attilio Borello, Franco Bartolini, Alessandro Piva
    Evaluating the performance of ST-DM watermarking in nonadditive channels. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:859-869 [Conf]
  82. Xavier Desurmont, Jean-François Delaigle, Benoit M. Macq
    Characterization of geometric distortions attacks in robust watermarking. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:870-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002