IH&MMSec C

23 papers

YearTitle / Authors
20153D Print-Scan Resilient Watermarking Using a Histogram-Based Circular Shift Coding Structure.
Jong-Uk Hou, Do-Gon Kim, Sunghee Choi, Heung-Kyu Lee
2015A Negative Number Vulnerability for Histogram-based Face Recognition Systems.
Alireza Farrokh Baroughi, Scott Craver, Mohammed Faizan Mohsin
2015Automated Firearm Identification: On using a novel Multiple-Slice-Shape (MSS) Approach for Comparison and Matching of Firing Pin Impression Topography.
Robert Fischer, Claus Vielhauer
2015Effect of Imprecise Knowledge of the Selection Channel on Steganalysis.
Vahid Sedighi, Jessica J. Fridrich
2015End-to-Display Encryption: A Pixel-Domain Encryption with Security Benefit.
Sebastian Matthias Burg, Dustin Peterson, Oliver Bringmann
2015Enhancing Sensor Pattern Noise for Source Camera Identification: An Empirical Evaluation.
Bei-Bei Liu, Xingjie Wei, Jeff Yan
2015Flicker Forensics for Pirate Device Identification.
Adi Hajj-Ahmad, Séverine Baudry, Bertrand Chupeau, Gwenaël J. Doërr
2015ForeMan, a Versatile and Extensible Database System for Digitized Forensics Based on Benchmarking Properties.
Christian Arndt, Stefan Kiltz, Jana Dittmann, Robert Fischer
2015Implications of Cyber Warfare.
David Aucsmith
2015Improving Steganographic Security by Synchronizing the Selection Channel.
Tomás Denemark, Jessica J. Fridrich
2015IoT Privacy: Can We Regain Control?
Richard Chow
2015LiHB: Lost in HTTP Behaviors - A Behavior-Based Covert Channel in HTTP.
Yao Shen, Liusheng Huang, Fei Wang, Xiaorong Lu, Wei Yang, Lu Li
2015On Characterizing and Measuring Out-of-Band Covert Channels.
Brent C. Carrara, Carlisle M. Adams
2015On Elliptic Curve Based Untraceable RFID Authentication Protocols.
Eun-Kyung Ryu, Dae-Soo Kim, Kee-Young Yoo
2015Optimal Sequential Fingerprinting: Wald vs. Tardos.
Thijs Laarhoven
2015Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2015, Portland, OR, USA, June 17 - 19, 2015
Adnan M. Alattar, Jessica J. Fridrich, Ned M. Smith, Pedro Comesaña Alfaro
2015SATTVA: SpArsiTy inspired classificaTion of malware VAriants.
Lakshmanan Nataraj, S. Karthikeyan, B. S. Manjunath
2015Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters.
Xiaofeng Song, Fenlin Liu, Chunfang Yang, Xiangyang Luo, Yi Zhang
2015Thumbnail-Preserving Encryption for JPEG.
Charles V. Wright, Wu-chi Feng, Feng Liu
2015Touch-based Static Authentication Using a Virtual Grid.
William F. Bond, Ahmed Awad E. A.
2015Universal Threshold Calculation for Fingerprinting Decoders using Mixture Models.
Marcel Schäfer, Sebastian Mair, Waldemar Berchtold, Martin Steinebach
2015Video Steganography Based on Optimized Motion Estimation Perturbation.
Yun Cao, Hong Zhang, Xianfeng Zhao, Haibo Yu
2015Visual Honey Encryption: Application to Steganography.
Ji Won Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee, Kwangsu Lee