default search action
Scott Craver
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c36]Scott Craver, Nicholas Rosbrook:
Applying a Zero-Knowledge Watermarking Protocol to Secure Elections. IH&MMSec 2023: 115-120 - 2022
- [c35]Scott Craver, Gurinder Bal:
A video auditing system for display-based voting machines. Media Watermarking, Security, and Forensics 2022: 1-4
2010 – 2019
- 2019
- [c34]Scott Craver, Enshirah Altarawneh:
Nondestructive ciphertext injection in document files. Media Watermarking, Security, and Forensics 2019 - 2016
- [c33]Alireza Farrokh Baroughi, Scott Craver, Daniel Douglas:
Attacks on Speaker Identification Systems Constrained to Speech-to-Text Decoding. Media Watermarking, Security, and Forensics 2016: 1-7 - [c32]Jun Yu, Enping Li, Scott Craver:
Ambiguity Attack on the Integrity of a Genuine Picture by Producing Another Picture Immune to Generic Digital Forensic Test. Media Watermarking, Security, and Forensics 2016: 1-3 - 2015
- [j4]Enping Li, Scott Craver, Jun Yu:
Capacity Limits of Pseudorandom Channels in Deception Problems. IEEE Trans. Inf. Forensics Secur. 10(9): 1824-1834 (2015) - [c31]Alireza Farrokh Baroughi, Scott Craver, Mohammed Faizan Mohsin:
A Negative Number Vulnerability for Histogram-based Face Recognition Systems. IH&MMSec 2015: 155-160 - [c30]Elan Ashendorf, Scott Craver:
Design of a steganographic virtual operating system. Media Watermarking, Security, and Forensics 2015: 94090G - [c29]Alireza Farrokh Baroughi, Scott Craver:
The non-trusty clown attack on model-based speaker recognition systems. Media Watermarking, Security, and Forensics 2015: 940904 - 2014
- [c28]Alireza Farrokh Baroughi, Scott Craver:
Additive attacks on speaker recognition. Media Watermarking, Security, and Forensics 2014: 90280Q - 2013
- [c27]Andrew D. Ker, Patrick Bas, Rainer Böhme, Rémi Cogranne, Scott Craver, Tomás Filler, Jessica J. Fridrich, Tomás Pevný:
Moving steganography and steganalysis from the laboratory into the real world. IH&MMSec 2013: 45-58 - 2012
- [c26]Jun Yu, Scott Craver:
A fast, automatic camera image stabilization benchmarking scheme. IQSP 2012: 829308 - [e5]Chang-Tsun Li, Jana Dittmann, Stefan Katzenbeisser, Scott Craver:
Multimedia and Security Workshop, MM&Sec 2012, Coventry, United Kingdom, September 6-7, 2012. ACM 2012, ISBN 978-1-4503-1417-6 [contents] - 2011
- [c25]Jun Yu, Scott Craver, Enping Li:
Toward the identification of DSLR lenses by chromatic aberration. Media Forensics and Security 2011: 788010 - [c24]Enping Li, Scott Craver:
A square-root law for active wardens. MM&Sec 2011: 87-92 - [e4]Tomás Filler, Tomás Pevný, Scott Craver, Andrew D. Ker:
Information Hiding - 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers. Lecture Notes in Computer Science 6958, Springer 2011, ISBN 978-3-642-24177-2 [contents] - [e3]Chad Heitzenrater, Scott Craver, Jana Dittmann:
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, MM&Sec '11, Buffalo, New York, USA, September 29-30, 2011. ACM 2011, ISBN 978-1-4503-0806-9 [contents] - 2010
- [c23]Scott Craver, Jun Yu:
Subset selection circumvents the square root law. Media Forensics and Security 2010: 754103 - [e2]Patrizio Campisi, Jana Dittmann, Scott Craver:
Multimedia and Security Workshop, MM&Sec 2010, Roma, Italy, September 9-10, 2010. ACM 2010, ISBN 978-1-4503-0286-9 [contents]
2000 – 2009
- 2009
- [c22]Scott Craver, Yu Chen, Hao Chen, Jun Yu, Idris M. Atakli:
BLINK: Securing Information to the Last Connection. CCNC 2009: 1-2 - [c21]Scott Craver, Enping Li, Jun Yu:
Protocols for data hiding in pseudo-random state. Media Forensics and Security 2009: 72540W - [c20]Enping Li, Scott Craver:
A supraliminal channel in a wireless phone application. MM&Sec 2009: 151-154 - [c19]Idris M. Atakli, Yu Chen, Qing Wu, Scott Craver:
BLINK: pixel-domain encryption for secure document management. MM&Sec 2009: 171-176 - [e1]Edward W. Felten, Jana Dittmann, Jessica J. Fridrich, Scott Craver:
Multimedia and Security Workshop, MM&Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009. ACM 2009, ISBN 978-1-60558-492-8 [contents] - 2008
- [c18]Scott Craver, Enping Li, Jun Yu, Idris M. Atakli:
A Supraliminal Channel in a Videoconferencing Application. Information Hiding 2008: 283-293 - 2007
- [j3]Scott Craver, Idris M. Atakli, Jun Yu:
Reverse-Engineering a Watermark Detector Using an Oracle. EURASIP J. Inf. Secur. 2007 (2007) - [c17]Scott Craver, Jun Yu:
Reverse-engineering a detector with false alarms. Security, Steganography, and Watermarking of Multimedia Contents 2007: 65050C - [c16]Scott Craver, Idris M. Atakli, Jun Yu:
How we broke the BOWS watermark. Security, Steganography, and Watermarking of Multimedia Contents 2007: 65051C - 2006
- [c15]Janice Y. Tsai, Lorrie Faith Cranor, Scott Craver:
Vicarious infringement creates a privacy ceiling. Digital Rights Management Workshop 2006: 9-18 - [c14]Scott Craver:
An Improved Asymmetric Watermarking System Using Matrix Embedding. Information Hiding 2006: 15-25 - [c13]Eugene Yu, Scott Craver:
Fingerprinting with Wow. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60720M - 2004
- [c12]Scott Craver, Bede Liu, Wayne H. Wolf:
An Implementation of, and Attacks on, Zero-Knowledge Watermarking. Information Hiding 2004: 1-12 - 2002
- [c11]Scott Craver, Bede Liu, Wayne H. Wolf:
Detectors for Echo Hiding Systems. Information Hiding 2002: 247-257 - [c10]Scott Craver:
Return of ambiguity attacks. Security and Watermarking of Multimedia Contents 2002: 252-259 - 2001
- [c9]Stefan Katzenbeisser, Scott Craver:
Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept. Communications and Multimedia Security 2001 - [c8]Min Wu, Scott Craver, Edward W. Felten, Bede Liu:
Analysis of attacks on SDMI audio watermarks. ICASSP 2001: 1369-1372 - [c7]Scott Craver, Julien P. Stern:
Lessons learned from SDMI. MMSP 2001: 213-218 - [c6]Scott Craver, Min Wu, Bede Liu, Adam Stubblefield, Ben Swartzlander, Dan S. Wallach, Drew Dean, Edward W. Felten:
Reading Between the Lines: Lessons from the SDMI Challenge. USENIX Security Symposium 2001
1990 – 1999
- 1999
- [c5]Scott Craver:
Zero Knowledge Watermark Detection. Information Hiding 1999: 101-116 - [c4]Scott Craver, Boon-Lock Yeo, Minerva M. Yeung:
Multilinearization data structure for image browsing. Storage and Retrieval for Image and Video Databases (SPIE) 1999: 155-166 - 1998
- [j2]Scott Craver, Boon-Lock Yeo, Minerva M. Yeung:
Technical Trials and Legal Tribulations. Commun. ACM 41(7): 44-54 (1998) - [j1]Scott Craver, Nasir D. Memon, Boon-Lock Yeo, Minerva M. Yeung:
Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications. IEEE J. Sel. Areas Commun. 16(4): 573-586 (1998) - [c3]Scott Craver:
On Public-Key Steganography in the Presence of an Active Warden. Information Hiding 1998: 355-368 - 1997
- [c2]Scott Craver, Nasir D. Memon, Boon-Lock Yeo, Minerva M. Yeung:
On the Invertibility of Invisible Watermarking Techniques. ICIP (1) 1997: 540-543 - [c1]Scott Craver, Nasir D. Memon, Boon-Lock Yeo, Minerva M. Yeung:
Can Invisible Watermarks Resolve Rightful Ownerships? Storage and Retrieval for Image and Video Databases (SPIE) 1997: 310-321
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint