Abstract is missing.
- How we broke the BOWS watermarkScott Craver, Idris M. Atakli, Jun Yu. [doi]
- Efficient non-interactive zero-knowledge watermark detector robust to sensitivity attacksJuan Ramón Troncoso-Pastoriza, Fernando Pérez-González. [doi]
- Joint forensics and watermarking approach for video authenticationStefan Thiemert, Huajian Liu, Martin Steinebach, Lucilla Croce Ferri. [doi]
- Framework for combined video frame synchronization and watermark detectionEnrico Hauer, Torsten Bölke, Martin Steinebach. [doi]
- Statistically-constrained shallow text marking: techniques, evaluation paradigm and resultsBrian Murphy, Carl Vogel. [doi]
- Trellis coded modulation to improve dirty paper trellis watermarkingChin Kiong Wang, Gwenaël J. Doërr, Ingemar J. Cox. [doi]
- Image splicing detection using 2-D phase congruency and statistical moments of characteristic functionWen Chen 0002, Yun Q. Shi, Wei Su. [doi]
- Scanner identification using sensor pattern noiseNitin Khanna, Aravind K. Mikkilineni, George T.-C. Chiu, Jan P. Allebach, Edward J. Delp. [doi]
- The syntax of concealment: reliable methods for plain text information hidingBrian Murphy, Carl Vogel. [doi]
- Information hiding through errors: a confusing approachMercan Topkara, Umut Topkara, Mikhail J. Atallah. [doi]
- Distortion-free robust watermarking: a case studyDinu Coltuc, Jean-Marc Chassery. [doi]
- A method of text watermarking using presuppositionsOlga Vybornova, Benoît Macq. [doi]
- Two different approaches for attacking BOWSPedro Comesaña, Fernando Pérez-González. [doi]
- Cramer-Rao bound on watermark desynchronization parameter estimation accuracyShankar Sadasivam, Pierre Moulin. [doi]
- Sphere packing lower bound on fingerprinting error probabilityNegar Kiyavash, Pierre Moulin. [doi]
- Syntactic tools for text watermarkingHasan Mesut Meral, Emre Sevinç, Ersin Ünkar, Bülent Sankur, A. Sumru Özsoy, Tunga Güngör. [doi]
- A generalized Benford's law for JPEG coefficients and its applications in image forensicsDongdong Fu, Yun Q. Shi, Wei Su. [doi]
- Adaptive MPEG-2 video data hiding schemeAnindya Sarkar, Upamanyu Madhow, Shivkumar Chandrasekaran, Bangalore S. Manjunath. [doi]
- Perceptual data hiding in Tree Structured Haar transform domainMichela Cancellaro, Marco Carli, Karen O. Egiazarian, Jaakko Astola. [doi]
- On distortion measures associated to random desynchronization attacksFélix Balado, Fernando Pérez-González. [doi]
- Robust scanner identification based on noise featuresHongmei Gou, Ashwin Swaminathan, Min Wu 0001. [doi]
- Tamper-proofing of electronic and printed text documents via robust hashing and data-hidingRenato Villán, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Frédéric Deguillaume, Thierry Pun. [doi]
- Nested object watermarking: comparison of block-luminance and blue channel LSB wet paper code image watermarkingClaus Vielhauer, Jana Dittmann. [doi]
- Fast and automatic watermark resynchronization based on zernike momentsXiangui Kang, Chunhui Liu, Wenjun Zeng, Jiwu Huang, Congbai Liu. [doi]
- A novel interpretation of content authenticationPedro Comesaña, Félix Balado, Fernando Pérez-González. [doi]
- Hidden context highlighting with JPEG2000-imageryRené Rosenbaum, Heidrun Schumann. [doi]
- Experimental study on watermark interference in multiple re-watermarkingDaniel Mark, Andreas Uhl, Hartmut Wernisch. [doi]
- Digital video watermarking in P-framesManeli Noorkami, Russell M. Mersereau. [doi]
- Source digital camcorder identification using sensor photo response non-uniformityMo Chen, Jessica J. Fridrich, Miroslav Goljan, Jan Lukás. [doi]
- Deterring watermark collusion attacks using signal processing techniquesAweke N. Lemma, Michiel van der Veen. [doi]
- Capacity and optimal collusion attack channels for Gaussian fingerprinting gamesYing Wang, Pierre Moulin. [doi]
- Security of spread-spectrum-based data hidingLuis Pérez-Freire, Pierre Moulin, Fernando Pérez-González. [doi]
- Channel model and operational capacity analysis of printed text documentsAravind K. Mikkilineni, Pei-Ju Chiang, George T.-C. Chiu, Jan P. Allebach, Edward J. Delp. [doi]
- An evaluation of lightweight JPEG2000 encryption with anisotropic wavelet packetsDominik Engel, Andreas Uhl. [doi]
- Authentication of H.264 streams by direct watermarking of CAVLC blocksBijan G. Mobasseri, Yatish Naik Raikar. [doi]
- A comprehensive bibliography of linguistic steganographyRichard Bergmair. [doi]
- Digital imaging sensor identification (further study)Mo Chen, Jessica J. Fridrich, Miroslav Goljan. [doi]
- Detection of malevolent changes in digital video for forensic applicationsN. Mondaini, Roberto Caldelli, Alessandro Piva, Mauro Barni, Vito Cappellini. [doi]
- Watermarking geographic vector-data using a variable strip-size schemeMichael Voigt. [doi]
- Reverse-engineering a detector with false alarmsScott Craver, Jun Yu. [doi]
- Blind identification of cellular phone camerasOya Çeliktutan, Ismail Avcibas, Bülent Sankur. [doi]
- Forensic classification of imaging sensor typesNitin Khanna, Aravind K. Mikkilineni, George T.-C. Chiu, Jan P. Allebach, Edward J. Delp. [doi]
- Audio watermarking robust to geometrical distortions based on dyadic wavelet transformYong Wang, Shaoquan Wu, Jiwu Huang. [doi]
- Forensics for flatbed scannersThomas Gloe, Elke Franz, Antje Winkler. [doi]
- Tackling BOWS with the sensitivity attackAndreas Westfeld. [doi]
- Intrinsic fingerprints for image authentication and steganalysisAshwin Swaminathan, Min Wu 0001, K. J. Ray Liu. [doi]
- Evaluation of standard watermarking techniquesEnrico Marini, Florent Autrusseau, Patrick Le Callet, Patrizio Campisi. [doi]
- Practical methods for minimizing embedding impact in steganographyJessica J. Fridrich, Tomás Filler. 650502 [doi]
- Merging Markov and DCT features for multi-class JPEG steganalysisTomás Pevný, Jessica J. Fridrich. 650503 [doi]
- Batch steganography and the threshold gameAndrew D. Ker. 650504 [doi]
- Mel-cepstrum-based steganalysis for VoIP steganographyChristian Kraetzer, Jana Dittmann. 650505 [doi]
- Optimally weighted least-squares steganalysisAndrew D. Ker. 650506 [doi]
- Blind source separation for steganalytic secret message estimationAruna Ambalavanan, Rajarathnam Chandramouli. 650507 [doi]
- Robust message authentication code algorithm for digital audio recordingsSascha Zmudzinski, Martin Steinebach. 650508 [doi]
- Blind audio watermark synchronization by passive audio fingerprintingMartin Steinebach, Sascha Zmudzinski. 650509 [doi]
- Adaptive and distributed cryptography for signature biometrics protectionPatrizio Campisi, Emanuele Maiorana, Miguel González Prats, Alessandro Neri. 650510 [doi]
- Analyzing a multimodal biometric system using real and virtual usersTobias Scheidat, Claus Vielhauer. 650512 [doi]
- Digital watermarking of biometric speech references: impact to the EER system performanceAndreas Lang, Jana Dittmann. 650513 [doi]
- How to protect biometric templatesYagiz Sutcu, Qiming Li, Nasir D. Memon. 650514 [doi]
- Error exponent analysis of person identification based on fusion of dependent/independent modalitiesOleksiy J. Koval, Sviatoslav Voloshynovskiy, Thierry Pun. 650515 [doi]
- The first BOWS contest: Break Our Watermarking SystemAlessandro Piva, Mauro Barni. 650516 [doi]
- The good, the bad, and the ugly: three different approaches to break their watermarking systemGaëtan Le Guelvouit, Teddy Furon, François Cayre. 650517 [doi]
- Watermarking attack: BOWS contestJihane Bennour, Jean-Luc Dugelay, Federico Matta. 650518 [doi]
- Tangential sensitivity analysis of watermarks using prior informationJohn W. Earl. 650519 [doi]