default search action
IH&MMSec 2013: Montpellier, France
- William Puech, Marc Chaumont, Jana Dittmann, Patrizio Campisi:
ACM Information Hiding and Multimedia Security Workshop, IH&MMSec '13, Montpellier, France, June 17-19, 2013. ACM 2013, ISBN 978-1-4503-2081-8
Invited talk
- Carmela Troncoso:
Bayesian inference to evaluate information leakage in complex scenarios. 1-2
Tracing
- Minoru Kuribayashi:
A simple tracing algorithm for binary fingerprinting code under averaging attack. 3-12 - Thijs Laarhoven, Benne de Weger:
Discrete distributions in the tardos scheme, revisited. 13-18 - Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen:
Optimal suspicion functions for tardos traitor tracing schemes. 19-28 - Waldemar Berchtold, Marcel Schäfer, Martin Steinebach:
Leakage detection and tracing for databases. 29-34 - Serdar Pehlivanoglu:
An asymmetric fingerprinting code for collusion-resistant buyer-seller watermarking. 35-44
Moving steganography and steganalysis from the laboratory to the real world
- Andrew D. Ker, Patrick Bas, Rainer Böhme, Rémi Cogranne, Scott Craver, Tomás Filler, Jessica J. Fridrich, Tomás Pevný:
Moving steganography and steganalysis from the laboratory into the real world. 45-58 - Vojtech Holub, Jessica J. Fridrich:
Digital image steganography using universal distortion. 59-68 - Fangjun Huang, Weiqi Luo, Jiwu Huang, Yun-Qing Shi:
Distortion function designing for JPEG steganography with uncompressed side-image. 69-76 - Zhenyu Li, Zongyun Hu, Xiangyang Luo, Bin Lu:
Embedding change rate estimation based on ensemble learning. 77-84
Invited talk
- Dominik Engel:
Privacy and security challenges in the smart grid user domain. 85-86
From biometric to forensics
- Anh Thu Phan Ho, Bao An Mai Hoang, Wadih Sawaya, Patrick Bas:
Document authentication using graphical codes: impacts of the channel model. 87-94 - Ronny Merkel, Karen Otte, Robert Clausing, Jana Dittmann, Claus Vielhauer, Anja Bräutigam:
First investigation of latent fingerprints long-term aging using chromatic white light sensors. 95-104 - Jutta Hämmerle-Uhl, Elias Pschernig, Andreas Uhl:
Non-invertible and revocable iris templates using key-dependent wavelet transforms. 105-110 - Jutta Hämmerle-Uhl, Michael Pober, Andreas Uhl:
Towards standardised fingerprint matching robustness assessment: the StirMark toolkit - cross-database comparisons with minutiae-based matching. 111-116
End user and signal processing: a successful synergy towards the assessment of forensic tools
- Wei Fan, Kai Wang, François Cayre, Zhang Xiong:
JPEG anti-forensics using non-parametric DCT quantization noise estimation and natural image statistics. 117-122 - Irene Amerini, Mauro Barni, Roberto Caldelli, Andrea Costanzo:
SIFT keypoint removal and injection for countering matching-based image forensics. 123-130 - Jakob Hasse, Thomas Gloe, Martin Beck:
Forensic identification of GSM mobile phones. 131-140 - Cemal Hanilçi, Figen Ertas:
Optimizing acoustic features for source cell-phone recognition using speech signals. 141-148 - Jiaorong Chen, Shijun Xiang, Weiping Liu, Hongbin Huang:
Exposing digital audio forgeries in time domain by using singularity analysis with wavelets. 149-158 - Tiziano Bianchi, Alessia De Rosa, Marco Fontani, Giovanni Rocciolo, Alessandro Piva:
Detection and classification of double compressed MP3 audio tracks. 159-164
Media encryption
- Dominik Engel, Andreas Uhl, Andreas Unterweger:
Region of interest signalling for encrypted JPEG images. 165-174 - Benjamin Mathon, Teddy Furon, Laurent Amsaleg, Julien Bringer:
Secure and efficient approximate nearest neighbors search. 175-180 - Xiaotian Wu, Duanhao Ou, Lu Dai, Wei Sun:
XOR-based meaningful visual secret sharing by generalized random grids. 181-190
Invited talk
- Anthony T. S. Ho:
On the intertwining of information hiding and multimedia security: a personal perspective. 191-192
Watermarking
- Oren Halvani, Martin Steinebach, Patrick Wolf, Ralf Zimmermann:
Natural language watermarking for german texts. 193-202 - Babak Moussakhani, Mohammad Ali Sedaghat, John T. Flåm, Tor A. Ramstad:
On optimal detection for matrix multiplicative data hiding. 203-208 - Ines Bouzidi, Azza Ouled Zaid, Meha Hachani, William Puech:
Joint watermarking and progressive geometric compression of 3D meshes. 209-214 - Dinu Coltuc, Ioan-Catalin Dragoi:
Context embedding for raster-scan rhombus based reversible watermarking. 215-220 - Kai Jiang, Kenny Q. Zhu, Yan Huang, Xiaobin Ma:
Watermarking road maps against crop and merge attacks. 221-230
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.