Abstract is missing.
- Secret dither estimation in lattice-quantization data hiding: a set membership approachLuis Pérez-Freire, Fernando Pérez-González, Pedro Comesaña. [doi]
- Face biometrics with renewable templatesMichiel van der Veen, Tom A. M. Kevenaar, Geert Jan Schrijen, Ton H. Akkermans, Fei Zuo. [doi]
- The Watermark Evaluation Testbed (WET): new functionalitiesOriol Guitart, Hyung Cook Kim, Edward J. Delp. [doi]
- Reducing the processing time of the hierarchical watermark detector when applied to unmarked imagesAdnan M. Alattar, Osama M. Alattar. [doi]
- A framework for the design of good watermark identification codesPierre Moulin, Ralf Koetter. [doi]
- Quality assessment of watermarked 3D polygonal modelsWolfgang Funk, Jennifer Prasiswa. [doi]
- Rotation/scale insensitive spread spectrum image watermarking gameMaxime Ossonce, Gaëtan Le Guelvouit, Claude Delpha, Pierre Duhamel. [doi]
- On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacksMaha El Choubassi, Pierre Moulin. [doi]
- The blind Newton sensitivity attackPedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González. [doi]
- Asymmetrically informed data-hiding optimization of achievable rate for Laplacian hostJosé-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Emre Topak, Thierry Pun. [doi]
- Protection and governance of MPEG-21 music player MAF contents using MPEG-21 IPMP toolsHendry, Munchurl Kim. [doi]
- Profiles for evaluation: the usage of audio WETAndreas Lang, Jana Dittmann. [doi]
- Selective video encryption of a distributed coded bitstream using LDPC codesHwa Young Um, Edward J. Delp. [doi]
- 3D face recognition by projection-based methodsHelin Dutagaci, Bülent Sankur, Yücel Yemez. [doi]
- Joint data hiding and source coding with partially available side informationÇagatay Dikici, Khalid Idrissi, Atilla Baskurt. [doi]
- Watermarking of 3D objects based on 2D apparent contoursJihane Bennour, Jean-Luc Dugelay. [doi]
- Countermeasure for collusion attacks against digital watermarkingMartin Steinebach, Sascha Zmudzinski. [doi]
- Transparency benchmarking on audio watermarks and steganographyChristian Kraetzer, Jana Dittmann, Andreas Lang. [doi]
- Fingerprinting digital elevation mapsHongmei Gou, Min Wu 0001. [doi]
- Towards robust compressed-domain video watermarking for H.264Maneli Noorkami, Russell M. Mersereau. [doi]
- Fingerprinting with WowEugene Yu, Scott Craver. [doi]
- Multi-class blind steganalysis for JPEG imagesTomás Pevný, Jessica J. Fridrich. [doi]
- New detector for spread-spectrum based image watermarking using underdetermined ICAHafiz Malik, Ashfaq A. Khokhar, Rashid Ansari. [doi]
- A reliability engineering approach to digital watermark evaluationHyung Cook Kim, Edward J. Delp. [doi]
- MPsteg: hiding a message in the Matching Pursuit domainGiacomo Cancelli, Mauro Barni, Gloria Menegaz. [doi]
- A web oriented and interactive buyer-seller watermarking protocolFranco Frattolillo, Salvatore D'Onofrio. [doi]
- Optimal detector for an additive watermarking scheme based on human auditory systemMohsen Haddad, André Gilloire, Alain Le Guyader, Pierre Duhamel. [doi]
- Detecting digital image forgeries using sensor pattern noiseJan Lukás, Jessica J. Fridrich, Miroslav Goljan. [doi]
- A benchmark assessment of the WAUC watermarking audio algorithmDavid Megías, Jordi Herrera-Joancomartí, Jordi Serra-Ruiz, Julià Minguillón. [doi]
- Limited distortion in LSB steganographyYounhee Kim, Zoran Duric, Dana Richards. [doi]
- Safety of templates in biometric person authentication using error-correcting codeTetsushi Ohki, Shiro Akatsuka, Naohisa Komatsu, Masao Kasahara. [doi]
- Perceptual hashing of sheet music based on graphical representationGert Kremser, Martin Schmucker. [doi]
- Information-theoretic analysis of electronic and printed document authenticationSviatoslav Voloshynovskiy, Oleksiy J. Koval, Renato Villán, Emre Topak, José-Emilio Vila-Forcén, Frédéric Deguillaume, Yuriy B. Rytsar, Thierry Pun. [doi]
- Stego sensitivity measure and multibit plane based steganography using different color modelsSos S. Agaian, Benjamin M. Rodriguez, Juan P. Perez. [doi]
- Matrix embedding for large payloadsJessica J. Fridrich, David Soukal. [doi]
- Shape quality measurement for 3D watermarking schemesPatrice Rondao-Alface, Benoît Macq. [doi]
- Scale estimation in two-band filter attacks on QIM watermarksJinshen Wang, Ivo D. Shterev, Reginald L. Lagendijk. [doi]
- Zero-knowledge ST-DM watermarkingAlessandro Piva, Vito Cappellini, Daniele Corazzi, Alessia De Rosa, Claudio Orlandi, Mauro Barni. [doi]
- High-rate quantization data hiding robust to arbitrary linear filtering attacksFernando Pérez-González, Carlos Mosquera, Marcos Álvarez-Díaz, Reginald L. Lagendijk. [doi]
- Some theoretical aspects of watermarking detectionTeddy Furon, Julie Josse, Sandrine Le Squin. [doi]
- Achieving non-ambiguity of quantization-based watermarkingXiangui Kang, Yun Q. Shi, Jiwu Huang. [doi]
- Analyzing handwriting biometrics in metadata contextTobias Scheidat, Franziska Wolf, Claus Vielhauer. [doi]
- Exploring QIM-based anti-collusion fingerprinting for multimediaAshwin Swaminathan, Shan He 0002, Min Wu 0001. [doi]
- Compression and rotation resistant watermark using a circular chirp structureChristopher E. Fleming, Bijan G. Mobasseri. [doi]
- VLC pair tree: a paradigm for MPEG-2 watermarkingMichael P. Marcinak, Bijan G. Mobasseri. [doi]
- Natural language watermarking: Challenges in building a practical systemMercan Topkara, Giuseppe Riccardi, Dilek Hakkani-Tür, Mikhail J. Atallah. [doi]
- Sphere-hardening dither modulationFélix Balado, Neil Hurley, Guénolé C. M. Silvestre. [doi]
- On the comparison of audio fingerprints for extracting quality parameters of compressed audioPeter Jan O. Doets, M. Menor Gisbert, Reginald L. Lagendijk. [doi]
- Performance analysis of nonuniform quantization-based data hidingJosé-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun. [doi]
- New results on robustness of secure steganographyMark T. Hogan, Félix Balado, Neil J. Hurley, Guénolé C. M. Silvestre. [doi]
- Reference point detection for improved fingerprint matchingTanya Ignatenko, Ton Kalker, Michiel van der Veen, Asker M. Bazen. [doi]
- Simple reversible watermarking schemes: further resultsDinu Coltuc, Jean-Marc Chassery. [doi]
- New blind steganalysis and its implicationsMiroslav Goljan, Jessica J. Fridrich, Taras Holotyak. 607201 [doi]
- Statistical modelling and steganalysis of DFT-based image steganographyYing Wang, Pierre Moulin. 607202 [doi]
- Fourth-order structural steganalysis and analysis of cover assumptionsAndrew D. Ker. 607203 [doi]
- Application of conditional entropy measures to steganalysisJohn Marsh, Timothy Knapik, Ephraim Lo, Chad Heitzenrater. 607204 [doi]
- Improving steganalysis by fusion techniques: a case study with image steganographyMehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon. 607205 [doi]
- A two-factor error model for quantitative steganalysisRainer Böhme, Andrew D. Ker. 607206 [doi]
- Compression-based steganalysis of LSB embedded imagesCharles G. Boncelet Jr., Lisa M. Marvel, Adrienne Jeanisha Raglin. 607207 [doi]
- Linguistically informed digital fingerprints for textÖzlem Uzuner. 607208 [doi]
- Attacks on lexical natural language steganography systemsCüneyt M. Taskiran, Umut Topkara, Mercan Topkara, Edward J. Delp. 607209 [doi]
- Information embedding and extraction for electrophotographic printing processesAravind K. Mikkilineni, Pei-Ju Chiang, Sungjoo Suh, George T.-C. Chiu, Jan P. Allebach, Edward J. Delp. 607210 [doi]
- An online system for classifying computer graphics images from natural photographsTian-Tsong Ng, Shih-Fu Chang. 607211 [doi]
- Text data-hiding for digital and printed documents: theoretical and practical considerationsRenato Villán, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, José-Emilio Vila-Forcén, Emre Topak, Frédéric Deguillaume, Yuriy B. Rytsar, Thierry Pun. 607212 [doi]
- E-capacity analysis of data-hiding channels with geometrical attacksEmre Topak, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Mariam E. Haroutunian, José-Emilio Vila-Forcén, Thierry Pun. 607213 [doi]
- Image data hiding based on capacity-approaching dirty-paper codingYang Yang 0003, Yong Sun, Vladimir Stankovic, Zixiang Xiong. 607214 [doi]
- Wet paper codes with improved embedding efficiencyJessica J. Fridrich, Miroslav Goljan, David Soukal. 607215 [doi]
- New modulation-based watermarking technique for videoAweke N. Lemma, Michiel van der Veen, Mehmet Utku Celik. 607216 [doi]
- Selective encryption for H.264/AVC video codingTuo Shi, Brian King, Paul Salama. 607217 [doi]
- Using entropy for image and video authentication watermarksStefan Thiemert, Hichem Sahbi, Martin Steinebach. 607218 [doi]
- Temporal synchronization of marked MPEG video frames based on image hash systemEnrico Hauer, Martin Steinebach. 607219 [doi]
- A hypothesis testing approach for achieving semi-fragility in multimedia authenticationChuhong Fei, Deepa Kundur, Raymond H. Kwong. 607220 [doi]
- A DWT-based robust semi-blind image watermarking algorithm using two bandsErsin Elbasi, Ahmet M. Eskicioglu. 607221 [doi]
- Evaluating the visual quality of watermarked imagesAleksandr Shnayderman, Ahmet M. Eskicioglu. 607222 [doi]