IH&MMSec C

27 papers

YearTitle / Authors
2014A universal image forensic strategy based on steganalytic model.
Xiaoqing Qiu, Haodong Li, Weiqi Luo, Jiwu Huang
2014ACM Information Hiding and Multimedia Security Workshop, IH&MMSec '14, Salzburg, Austria, June 11-13, 2014
Andreas Unterweger, Andreas Uhl, Stefan Katzenbeisser, Roland Kwitt, Alessandro Piva
2014Adaptive steganalysis against WOW embedding algorithm.
Weixuan Tang, Haodong Li, Weiqi Luo, Jiwu Huang
2014Application of Grubbs' test for outliers to the detection of watermarks.
Matthieu Urvoy, Florent Autrusseau
2014Architecture-driven smart grid security management.
Markus Kammerstetter, Lucie Langer, Florian Skopik, Wolfgang Kastner
2014Audio source authentication and splicing detection using acoustic environmental signature.
Hong Zhao, Yifan Chen, Rui Wang, Hafiz Malik
2014Automatic location of frame deletion point for digital video forensics.
Chunhui Feng, Zhengquan Xu, Wenting Zhang, Yanyan Xu
2014Biometrics based observer free transferable E-cash.
Kamlesh Tiwari, Phalguni Gupta
2014Capacities and capacity-achieving decoders for various fingerprinting games.
Thijs Laarhoven
2014Detection of JSteg algorithm using hypothesis testing theory and a statistical model with nuisance parameters.
Tong Qiao, Cathel Zitzmann, Rémi Cogranne, Florent Retraint
2014Digital crime scene analysis: automatic matching of firing pin impressions on cartridge bottoms using 2d and 3d spatial features.
Robert Fischer, Claus Vielhauer
2014Distributional differential privacy for large-scale smart metering.
Márk Jelasity, Kenneth P. Birman
2014FastPass: automated border control as challenging combination of various security technologies.
Markus Clabian
2014From StirNark to StirTrace: benchmarking pattern recognition based printed fingerprint detection.
Mario Hildebrandt, Jana Dittmann
2014GSHADE: faster privacy-preserving distance computation and biometric identification.
Julien Bringer, Hervé Chabanne, Mélanie Favre, Alain Patey, Thomas Schneider, Michael Zohner
2014Gradient based prediction for reversible watermarking by difference expansion.
Ioan-Catalin Dragoi, Dinu Coltuc, Ion Caciula
2014Image security tools for JPEG standards.
Peter Schelkens
2014Influence of data granularity on nonintrusive appliance load monitoring.
Günther Eibl, Dominik Engel
2014Notes on non-interactive secure comparison in "image feature extraction in the encrypted domain with privacy-preserving SIFT".
Matthias Schneider, Thomas Schneider
2014On the combination of randomized thresholds and non-parametric boundaries to protect digital watermarks against sensitivity attacks.
Erwin Quiring, Pascal Schöttle
2014Predictable rain?: steganalysis of public-key steganography using wet paper codes.
Matthias Carnein, Pascal Schöttle, Rainer Böhme
2014Robust palmprint verification using sparse representation of binarized statistical features: a comprehensive study.
Ramachandra Raghavendra, Christoph Busch
2014Slice groups for post-compression region of interest encryption in SVC.
Andreas Unterweger, Andreas Uhl
2014Steganographic key leakage through payload metadata.
Tomás Pevný, Andrew D. Ker
2014Video steganalysis based on subtractive probability of optimal matching feature.
Yanzhen Ren, Liming Zhai, Lina Wang, Tingting Zhu
2014Video steganography with perturbed macroblock partition.
Hong Zhang, Yun Cao, Xianfeng Zhao, Weiming Zhang, Nenghai Yu
2014What's the PointiSA?
Sudeep Ghosh, Jason D. Hiser, Jack W. Davidson