Abstract is missing.
- Processing encrypted signals: a new frontier for multimedia securityMauro Barni. 1 [doi]
- Minimizing the embedding impact in steganographyJessica J. Fridrich. 2-10 [doi]
- Information-theoretic analysis of steganalysis in real imagesOleksiy J. Koval, Sviatoslav Voloshynovskiy, Taras Holotyak, Thierry Pun. 11-16 [doi]
- WLAN steganography: a first practical reviewChristian Krätzer, Jana Dittmann, Andreas Lang, Tobias Kühne. 17-22 [doi]
- Digital invisible ink and its applications in steganographyChun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu. 23-28 [doi]
- Exposing digital forgeries in scientific imagesHany Farid. 29-36 [doi]
- Exposing digital forgeries in video by detecting double MPEG compressionWeihong Wang, Hany Farid. 37-47 [doi]
- Exposing digital forgeries through chromatic aberrationMicah K. Johnson, Hany Farid. 48-55 [doi]
- Robust, short and sensitive authentication tags using secure sketchQiming Li, Ee-Chien Chang. 56-61 [doi]
- JPEG2000-based secure image authenticationMathias Schlauweg, Dima Pröfrock, Erika Müller. 62-67 [doi]
- On achievable security levels for lattice data hiding in the known message attack scenarioLuis Pérez-Freire, Fernando Pérez-González, Teddy Furon. 68-79 [doi]
- Achieving subspace or key security for WOA using natural or circular watermarkingPatrick Bas, François Cayre. 80-88 [doi]
- On reversibility of random binning based data-hiding techniques: security perspectivesSviatoslav Voloshynovskiy, Oleksiy J. Koval, Emre Topak, José-Emilio Vila-Forcén, Thierry Pun. 89-96 [doi]
- Zero-knowledge watermark detector robust to sensitivity attacksJuan Ramón Troncoso-Pastoriza, Fernando Pérez-González. 97-107 [doi]
- Estimation of recording location using audio watermarkingYuta Nakashima, Ryuki Tachibana, Masafumi Nishimura, Noboru Babaguchi. 108-113 [doi]
- Assessing motion-coherency in video watermarkingP. Vinod, Gwenaël J. Doërr, P. K. Bora. 114-119 [doi]
- A digital watermark for vector-based fontsStefan Thiemert, Martin Steinebach, Patrick Wolf. 120-123 [doi]
- Implementation of real-time watermarking scheme for high-quality videoIn Koo Kang, Dong-Hyuck Im, Heung-Kyu Lee, Young-Ho Suh. 124-129 [doi]
- Parameter optimization for biometric fingerprint recognition using genetic algorithmsTobias Scheidat, Andreas Engel, Claus Vielhauer. 130-134 [doi]
- An improvement to a biometric.based multimedia content protection schemeDaniel Socek, Michal Sramka, Oge Marques, Dubravko Culibrk. 135-139 [doi]
- Robustness and security of a wavelet-based CBIR hashing algorithmAlbert Meixner, Andreas Uhl. 140-145 [doi]
- A privacy-preserving protocol for neural-network-based computationMauro Barni, Claudio Orlandi, Alessandro Piva. 146-151 [doi]
- Digital watermarking security considerationsRade Petrovic, Babak Tehranchi, Joseph M. Winograd. 152-157 [doi]
- Zero-knowledge watermark detection resistant to ambiguity attacksQiming Li, Ee-Chien Chang. 158-163 [doi]
- The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutionsUmut Topkara, Mercan Topkara, Mikhail J. Atallah. 164-174 [doi]
- Extraction in software watermarkingWilliam Zhu, Clark D. Thomborson. 175-181 [doi]
- Image annotation watermarking: nested object embedding using hypergraph modelClaus Vielhauer, Maik Schott. 182-189 [doi]
- Transparency and complexity benchmarking of audio watermarking algorithms issuesAndreas Lang, Jana Dittmann. 190-201 [doi]
- A symbolic transform attack on lightweight encryption based on wavelet filter parameterizationDominik Engel, Rade Kutil, Andreas Uhl. 202-207 [doi]
- Lessons from the BOWS contestAndreas Westfeld. 208-213 [doi]
- Hermite polynomials as provably good functions to watermark white gaussian hostsTeddy Furon. 224-229 [doi]
- Robust blind watermarking mechanism for motion data streamsParag Agarwal, Ketaki Adi, B. Prabhakaran. 230-235 [doi]