IH&MMSec C

31 papers

YearTitle / Authors
2013A simple tracing algorithm for binary fingerprinting code under averaging attack.
Minoru Kuribayashi
2013ACM Information Hiding and Multimedia Security Workshop, IH&MMSec '13, Montpellier, France, June 17-19, 2013
William Puech, Marc Chaumont, Jana Dittmann, Patrizio Campisi
2013An asymmetric fingerprinting code for collusion-resistant buyer-seller watermarking.
Serdar Pehlivanoglu
2013Bayesian inference to evaluate information leakage in complex scenarios.
Carmela Troncoso
2013Context embedding for raster-scan rhombus based reversible watermarking.
Dinu Coltuc, Ioan-Catalin Dragoi
2013Detection and classification of double compressed MP3 audio tracks.
Tiziano Bianchi, Alessia De Rosa, Marco Fontani, Giovanni Rocciolo, Alessandro Piva
2013Digital image steganography using universal distortion.
Vojtech Holub, Jessica J. Fridrich
2013Discrete distributions in the tardos scheme, revisited.
Thijs Laarhoven, Benne de Weger
2013Distortion function designing for JPEG steganography with uncompressed side-image.
Fangjun Huang, Weiqi Luo, Jiwu Huang, Yun-Qing Shi
2013Document authentication using graphical codes: impacts of the channel model.
Anh Thu Phan Ho, Bao An Mai Hoang, Wadih Sawaya, Patrick Bas
2013Embedding change rate estimation based on ensemble learning.
Zhenyu Li, Zongyun Hu, Xiangyang Luo, Bin Lu
2013Exposing digital audio forgeries in time domain by using singularity analysis with wavelets.
Jiaorong Chen, Shijun Xiang, Weiping Liu, Hongbin Huang
2013First investigation of latent fingerprints long-term aging using chromatic white light sensors.
Ronny Merkel, Karen Otte, Robert Clausing, Jana Dittmann, Claus Vielhauer, Anja Bräutigam
2013Forensic identification of GSM mobile phones.
Jakob Hasse, Thomas Gloe, Martin Beck
2013JPEG anti-forensics using non-parametric DCT quantization noise estimation and natural image statistics.
Wei Fan, Kai Wang, François Cayre, Zhang Xiong
2013Joint watermarking and progressive geometric compression of 3D meshes.
Ines Bouzidi, Azza Ouled Zaid, Meha Hachani, William Puech
2013Leakage detection and tracing for databases.
Waldemar Berchtold, Marcel Schäfer, Martin Steinebach
2013Moving steganography and steganalysis from the laboratory into the real world.
Andrew D. Ker, Patrick Bas, Rainer Böhme, Rémi Cogranne, Scott Craver, Tomás Filler, Jessica J. Fridrich, Tomás Pevný
2013Natural language watermarking for german texts.
Oren Halvani, Martin Steinebach, Patrick Wolf, Ralf Zimmermann
2013Non-invertible and revocable iris templates using key-dependent wavelet transforms.
Jutta Hämmerle-Uhl, Elias Pschernig, Andreas Uhl
2013On optimal detection for matrix multiplicative data hiding.
Babak Moussakhani, Mohammad Ali Sedaghat, John T. Flåm, Tor A. Ramstad
2013On the intertwining of information hiding and multimedia security: a personal perspective.
Anthony T. S. Ho
2013Optimal suspicion functions for tardos traitor tracing schemes.
Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen
2013Optimizing acoustic features for source cell-phone recognition using speech signals.
Cemal Hanilçi, Figen Ertas
2013Privacy and security challenges in the smart grid user domain.
Dominik Engel
2013Region of interest signalling for encrypted JPEG images.
Dominik Engel, Andreas Uhl, Andreas Unterweger
2013SIFT keypoint removal and injection for countering matching-based image forensics.
Irene Amerini, Mauro Barni, Roberto Caldelli, Andrea Costanzo
2013Secure and efficient approximate nearest neighbors search.
Benjamin Mathon, Teddy Furon, Laurent Amsaleg, Julien Bringer
2013Towards standardised fingerprint matching robustness assessment: the StirMark toolkit - cross-database comparisons with minutiae-based matching.
Jutta Hämmerle-Uhl, Michael Pober, Andreas Uhl
2013Watermarking road maps against crop and merge attacks.
Kai Jiang, Kenny Q. Zhu, Yan Huang, Xiaobin Ma
2013XOR-based meaningful visual secret sharing by generalized random grids.
Xiaotian Wu, Duanhao Ou, Lu Dai, Wei Sun