Abstract is missing.
- Locally most-powerful detector for secret key estimation in spread spectrum image steganographyShalin P. Trivedi, Rajarathnam Chandramouli. 1-12
- Kernel Fisher discriminant for steganalysis of JPEG hiding methodsJeremiah J. Harmsen, William A. Pearlman. 13-22
- On estimation of secret message length in LSB steganography in spatial domainJessica J. Fridrich, Miroslav Goljan. 23-34
- Steganalysis using color wavelet statistics and one-class support vector machinesSiwei Lyu, Hany Farid. 35-45
- Steganalysis using modified pixel comparison and complexity measureSos S. Agaian, Benjamin M. Rodriguez, Glenn B. Dietrich. 46-57
- Performance evaluation of blind steganalysis classifiersMark T. Hogan, Guenole C. M. Silvestre, Neil J. Hurley. 58-69
- Searching for the stego-keyJessica J. Fridrich, Miroslav Goljan, David Soukal. 70-82
- Quantitative evaluation of pairs and RS steganalysisAndrew D. Ker. 83-97
- Steganalysis with JPEG and GIF imagesRui Du, Larry E. Guthrie, Doug Buchy. 98-104
- Fast audio watermarking: concepts and realizationsMichael Arnold, Zongwei Huang. 105-115
- An informed synchronization scheme for audio data hidingAlejandro LoboGuerrero, Patrick Bas, Joel Lienard. 116-126
- Digital watermarking based on process of speech productionToshiyuki Sakai, Naohisa Komatsu. 127-138
- Two-dimensional audio watermark for MPEG AAC audioRyuki Tachibana. 139-150
- Cepstral domain modification of audio signals for data embedding: preliminary resultsKaliappan Gopalan. 151-161
- ICA-based robust logo image watermarkingThai Duy Hien, Zensho Nakao, Yen-Wei Chen. 162-172
- Collocated Dataglyphs for large-message storage and retrievalRakhi C. Motwani, Jeff Breidenbach, John R. Black. 173-183
- Machine vision applications of digital watermarkingJohn Stach. 184-191
- Fingerprinting of music scoresJonathan Irons, Martin Schmucker. 192-199
- Watermarking and fingerprinting for electronic music deliveryMichiel van der Veen, Aweke N. Lemma, Ton Kalker. 200-211
- Improvement to CDF grounded lattice codesBrett A. Bradley. 212-223
- Advanced audio watermarking benchmarkingJana Dittmann, Martin Steinebach, Andreas Lang, Sascha Zmudzinski. 224-235
- The Watermark Evaluation Testbed (WET)Hyung Cook Kim, Hakeem Ogunleye, Oriol Guitart, Edward J. Delp. 236-247
- Thread-based benchmarking deploymentSebastien Lugan, Benoit M. Macq. 248-255
- Human perception of geometric distortions in imagesIwan Setyawan, Reginald L. Lagendijk. 256-267
- Rate-distortion analysis of steganography for conveying stereovision disparity mapsToshiyuki Umeda, Ana B. Batolomeu, Filipe A. Francob, Damien Delannay, Benoit M. Macq. 268-273
- Orthogonal dirty paper coding for informed data hidingAndrea Abrardo, Mauro Barni. 274-285
- Capacity of data-hiding system subject to desynchronizationStéphane Pateux, Gaëtan Le Guelvouit, Jonathan Delhumeau. 286-295
- Adaptive quantization watermarkingJob Oostveen, Ton Kalker, Marius Staring. 296-303
- Secure background watermarking based on video mosaicingGwenaël J. Doërr, Jean-Luc Dugelay. 304-314
- Synchronization technique to detect MPEG video frames for watermark retrievalEnrico Hauer, Stefan Thiemert. 315-324
- Feature-based watermarking scheme for MPEG-I/II video authenticationYuewei Dai, Stefan Thiemert, Martin Steinebach. 325-335
- Impact of MPEG-4 3D mesh coding on watermarking algorithms for polygonal 3D meshesWolfgang Funk. 336-344
- Video steganography based on bit-plane decomposition of wavelet-transformed videoHideki Noda, Tomofumi Furuta, Michiharu Niimi, Eiji Kawaguchi. 345-353
- Lossless data embedding with file size preservationJessica J. Fridrich, Miroslav Goljan, Qing Chen, Vivek Pathak. 354-365
- Reversible compressed domain watermarking by exploiting code space inefficiencyBijan G. Mobasseri, Robert J. Berger II. 366-373
- Reversible watermarking for imagesArno J. van Leest, Michiel van der Veen, Fons Bruekers. 374-385
- A high-capacity invertible data-hiding algorithm using a generalized reversible integer transformJohn Stach, Adnan M. Alattar. 386-396
- Reversible watermarking using two-way decodable codesBijan G. Mobasseri, Domenick Cinalli. 397-404
- Integer DCT-based reversible watermarking for images using companding techniqueBian Yang, Martin Schmucker, Wolfgang Funk, Christoph Busch, Sheng-He Sun. 405-415
- Towards fraud-proof ID documents using multiple data hiding technologies and biometricsJustin Picard, Claus Vielhauer, Niels J. Thorwirth. 416-427
- Visual communications with side information via distributed printing channels: extended multimedia and security perspectivesSviatoslav Voloshynovskiy, Oleksiy J. Koval, Frédéric Deguillaume, Thierry Pun. 428-445
- Print protection using high-frequency fractal noiseKhaled W. Mahmoud, Jonathon M. Blackledge, Sekharjit Datta, James A. Flint. 446-454
- Signature-embedding in printed documents for security and forensic applicationsAravind K. Mikkilineni, Gazi N. Ali, Pei-Ju Chiang, George T.-C. Chiu, Jan P. Allebach, Edward J. Delp. 455-466
- Universal image steganalysis using rate-distortion curvesMehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp. 467-476
- Steganalysis of block-structured stegotextYing Wang, Pierre Moulin. 477-488
- Fast additive noise steganalysisJeremiah J. Harmsen, Kevin D. Bowers, William A. Pearlman. 489-495
- On the complexity and hardness of the steganography embedding problemRajarathnam Chandramouli, Shalin P. Trivedi, R. N. Uma. 496-500
- Hiding correlation-based watermark templates using secret modulationJeroen Lichtenauer, Iwan Setyawan, Reginald L. Lagendijk. 501-512
- LOT-based adaptive image watermarkingYuxin Liu, Bin Ni, Xiaojun Feng, Edward J. Delp. 513-523
- Error correction coding of nonlinear side-informed watermarking schemesKevin M. Whelan, Guenole C. M. Silvestre, Neil J. Hurley. 524-535
- Spatial synchronization using watermark key structureEugene T. Lin, Edward J. Delp. 536-547
- Vector-quantization-based scheme for data embedding for imagesNing Liu, Koduvayur P. Subbalakshmi. 548-559
- Image watermarking based on scale-space representationJin S. Seo, Chang D. Yoo. 560-570
- A wavelet watermarking algorithm based on a tree structureOriol Guitart Pla, Eugene T. Lin, Edward J. Delp. 571-580
- Classification of watermarking schemes robust against loss of synchronizationDamien Delannay, Benoit M. Macq. 581-591
- Quantifying security leaks in spread spectrum data hiding: a game-theoretic approachPedro Comesaña, Fernando Pérez-González. 592-601
- New attacks on SARI image authentication systemJinhai Wu, Bin B. Zhu, Shipeng Li, Fuzong Lin. 602-609
- Distortion compensated lookup-table embedding: joint security and robustness enhancement for quantization-based data hidingMin Wu. 610-621
- Attacks on biometric systems: a case study in fingerprintsUmut Uludag, Anil K. Jain. 622-633
- Biometric verification based on grip-pattern recognitionRaymond N. J. Veldhuis, Asker M. Bazen, Joost A. Kauffman, Pieter H. Hartel. 634-641
- Security for biometric dataClaus Vielhauer, Ton Kalker. 642-652
- Multimedia document authentication using on-line signatures as watermarksAnoop M. Namboodiri, Anil K. Jain. 653-662
- Application of invisible image watermarks to previously half-toned imagesGordon W. Braudaway, Fred Mintzer. 663-669
- Show-through watermarking of duplex printed documentsGaurav Sharma, Shen-ge Wang. 670-684
- Watermarking electronic text documents containing justified paragraphs and irregular line spacingAdnan M. Alattar, Osama M. Alattar. 685-695
- Efficient multimedia data encryption based on flexible QM coderDahua Xie, C. C. Jay Kuo. 696-704
- Multilayer multicast key management with threshold cryptographyScott D. Dexter, Roman Belostotskiy, Ahmet M. Eskicioglu. 705-715
- Securing display of grayscale and multicolored images by use of visual cryptographyHirotsugu Yamamoto, Yoshio Hayasaki, Nobuo Nishida. 716-724
- A hybrid scheme for encryption and watermarkingXiaowei Xu, Scott D. Dexter, Ahmet M. Eskicioglu. 725-736
- Near-lossless image authentication transparent to near-lossless codingRoberto Caldelli, Giovanni Macaluso, Franco Bartolini, Mauro Barni. 737-747
- Collusion-resistant multimedia fingerprinting: a unified frameworkMin Wu, Wade Trappe, Z. Jane Wang, K. J. Ray Liu. 748-759
- Analysis and design of authentication watermarkingChuhong Fei, Deepa Kundur, Raymond H. Kwong. 760-771
- Analysis of a wavelet-based robust hash algorithmAlbert Meixner, Andreas Uhl. 772-783
- Geometric soft hash functions for 2D and 3D objectsEmmanuel Fernandes, Jean-François Delaigle. 784-795
- Statistical amplitude scale estimation for quantization-based watermarkingIvo D. Shterev, Reginald L. Lagendijk, Richard Heusdens. 796-804
- Blind iterative decoding of side-informed data hiding using the expectation-maximization algorithmFélix Balado, Fernando Pérez-González, Pedro Comesaña. 805-815
- Wavelet domain watermarking using maximum-likelihood detectionNg Tek Ming, Hari Krishna Garg. 816-826
- Performance bounds on optimal watermark synchronizersVinicius Licks, Fabrício Ourique, Ramiro Jordan. 827-837
- Malicious attacks on media authentication schemes based on invertible watermarksStefan Katzenbeisser, Jana Dittmann. 838-847
- Attacking digital watermarksRadu Sion, Mikhail J. Atallah. 848-858
- Evaluating the performance of ST-DM watermarking in nonadditive channelsMauro Barni, Attilio Borello, Franco Bartolini, Alessandro Piva. 859-869
- Characterization of geometric distortions attacks in robust watermarkingXavier Desurmont, Jean-François Delaigle, Benoit M. Macq. 870