Abstract is missing.
- Introduction to the ACM multimedia and security workshopJana Dittmann, Jessica J. Fridrich. 1-3 [doi]
- Perturbed quantization steganography with wet paper codesJessica J. Fridrich, Miroslav Goljan, David Soukal. 4-15 [doi]
- A hierarchical protocol for increasing the stealthiness of steganographic methodsMercan Topkara, Umut Topkara, Mikhail J. Atallah, Cüneyt M. Taskiran, Eugene T. Lin, Edward J. Delp. 16-24 [doi]
- Statistical characterisation of MP3 encoders for steganalysisRainer Böhme, Andreas Westfeld. 25-34 [doi]
- Quantization-based watermarking performance improvement using host statistics: AWGN attack caseOleksiy J. Koval, Sviatoslav Voloshynovskiy, Fernando Pérez-González, Frédéric Deguillaume, Thierry Pun. 35-39 [doi]
- An improved attack analysis on a public-key spread spectrum watermarkingMustafa Kesal, Mehmet Kivanç Mihçak, Ramarathnam Venkatesan. 41-45 [doi]
- Overcoming the obstacles of zero-knowledge watermark detectionAndré Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi. 46-55 [doi]
- Adaptive steganography based on ditheringElke Franz, Antje Schneidewind. 56-62 [doi]
- Hidden Markov models and steganalysisMaxim Sidorov. 63-67 [doi]
- Data hiding on 3D polygonal meshesYannick Maret, Touradj Ebrahimi. 68-74 [doi]
- Improving LSB steganalysis using marginal and joint probabilistic distributionsBenoit Roue, Patrick Bas, Jean-Marc Chassery. 75-80 [doi]
- Geometric distortion-resilient image hashing system and its application scalabilityChao-Yong Hsu, Chun-Shien Lu. 81-92 [doi]
- Privacy protection for signed media files: a separation-of-duty approach to the lightweight DRM (LWDRM) systemRüdiger Grimm, Patrick Aichroth. 93-99 [doi]
- Are parameterised biorthogonal wavelet filters suited (better) for selective encryption?Andreas Uhl, Andreas Pommer. 100-106 [doi]
- Key-assignment strategies for CPPMAndré Adelsbach, Jörg Schwenk. 107-115 [doi]
- Multimedia security: the 22nd century approach!Edward J. Delp. 116 [doi]
- Informed detection of audio watermark for resolving playback speed modificationsSylvain Beauget, Michiel van der Veen, Aweke N. Lemma. 117-123 [doi]
- Scale-invariant image watermarking via optimization algorithms for quantizing randomized statisticsTie Liu, Ramarathnam Venkatesan, Mehmet Kivanç Mihçak. 124-132 [doi]
- Exploiting self-similarities to defeat digital watermarking systems: a case study on still imagesGwenaël J. Doërr, Jean-Luc Dugelay, Lucas Grangé. 133-142 [doi]
- Wavelet-based blind watermarking of 3D modelsF. Uccheddu, Massimiliano Corsini, Mauro Barni. 143-154 [doi]
- Multimedia authentication with sensor-based watermarkingZheng Liu, Xue Li, Zhaoyang Dong. 155-159 [doi]
- Reversible watermarking of 2D-vector dataMichael Voigt, Bian Yang, Christoph Busch. 160-165 [doi]
- Robust DWT-SVD domain image watermarking: embedding data in all frequenciesEmir Ganic, Ahmet M. Eskicioglu. 166-174 [doi]
- Key-dependency for a wavelet-based blind watermarking algorithmMichael Brachtl, Andreas Uhl, Werner Dietl. 175-179 [doi]
- A high capacity watermarking system for digital mapsGerrit Schulz, Michael Voigt. 180-186 [doi]
- Counteracting Oracle attacksIlaria Venturini. 187-192 [doi]
- Digital image watermarking using complex wavelet transformNatasa Terzija, Walter Geisselhardt. 193-198 [doi]
- The digital watermarking container: secure and efficient embeddingMartin Steinebach, Sascha Zmudzinski, Fan Chen. 199-205 [doi]
- An audio watermarking scheme robust against stereo attacksDavid Megías, Jordi Herrera-Joancomartí, Julià Minguillón. 206-213 [doi]
- Fragile watermarking scheme based on the block-wise dependence in the wavelet domainHuayin Si, Chang-Tsun Li. 214-219 [doi]
- Audio watermarking algorithm for real-time speech integrity and authenticationSong Yuan, Sorin A. Huss. 220-226 [doi]