PROCEEDINGS VOLUME 6505
ELECTRONIC IMAGING 2007 | 28 JANUARY - 1 FEBRUARY 2007
Security, Steganography, and Watermarking of Multimedia Contents IX
IN THIS VOLUME

0 Sessions, 65 Papers, 0 Presentations
Front Matter  (1)
Steganalysis  (6)
Audio  (3)
Attacks  (4)
Benchmarking  (4)
Forensics I  (3)
Forensics II  (3)
Biometrics  (5)
BOWS  (7)
Video  (3)
Embedding I  (2)
Embedding II  (1)
Proceedings Volume 6505 is from: Logo
ELECTRONIC IMAGING 2007
28 January - 1 February 2007
San Jose, CA, United States
Front Matter
Proc. SPIE 6505, Front Matter: Volume 6505, 650501 (5 March 2007); doi: 10.1117/12.731272
Steganalysis
Proc. SPIE 6505, Practical methods for minimizing embedding impact in steganography, 650502 (26 February 2007); doi: 10.1117/12.697471
Proc. SPIE 6505, Merging Markov and DCT features for multi-class JPEG steganalysis, 650503 (2 March 2007); doi: 10.1117/12.696774
Proc. SPIE 6505, Batch steganography and the threshold game, 650504 (2 March 2007); doi: 10.1117/12.703334
Proc. SPIE 6505, Mel-cepstrum based steganalysis for VoIP steganography, 650505 (1 March 2007); doi: 10.1117/12.704040
Proc. SPIE 6505, Optimally weighted least-squares steganalysis, 650506 (2 March 2007); doi: 10.1117/12.704606
Proc. SPIE 6505, Blind source separation for steganalytic secret message estimation, 650507 (27 February 2007); doi: 10.1117/12.704726
Audio
Proc. SPIE 6505, Robust message authentication code algorithm for digital audio recordings, 650508 (27 February 2007); doi: 10.1117/12.704539
Proc. SPIE 6505, Blind audio watermark synchronization by passive audio fingerprinting, 650509 (27 February 2007); doi: 10.1117/12.703311
Proc. SPIE 6505, Audio watermarking robust to geometrical distortions based on dyadic wavelet transform, 65050A (1 March 2007); doi: 10.1117/12.698495
Attacks
Proc. SPIE 6505, Efficient non-interactive zero-knowledge watermark detector robust to sensitivity attacks, 65050B (27 February 2007); doi: 10.1117/12.704171
Proc. SPIE 6505, Reverse-engineering a detector with false alarms, 65050C (27 February 2007); doi: 10.1117/12.704389
Proc. SPIE 6505, On distortion measures associated to random desynchronization attacks, 65050D (1 March 2007); doi: 10.1117/12.705808
Proc. SPIE 6505, Fast and automatic watermark resynchronization based on Zernike moments, 65050E (27 February 2007); doi: 10.1117/12.703839
Theoretical Methods
Proc. SPIE 6505, Security of spread-spectrum-based data hiding, 65050F (27 February 2007); doi: 10.1117/12.704176
Proc. SPIE 6505, Trellis coded modulation to improve dirty paper trellis watermarking, 65050G (27 February 2007); doi: 10.1117/12.704379
Proc. SPIE 6505, Cramer-Rao bound on watermark desynchronization parameter estimation accuracy, 65050H (2 March 2007); doi: 10.1117/12.705481
Proc. SPIE 6505, A novel interpretation of content authentication, 65050I (1 March 2007); doi: 10.1117/12.704271
Proc. SPIE 6505, Capacity and optimal collusion attack channels for Gaussian fingerprinting games, 65050J (2 March 2007); doi: 10.1117/12.706575
Proc. SPIE 6505, Sphere packing lower bound on fingerprinting error probability, 65050K (2 March 2007); doi: 10.1117/12.705664
Benchmarking
Proc. SPIE 6505, Nested object watermarking: comparison of block-luminance and blue channel LSB wet paper code image watermarking, 65050L (27 February 2007); doi: 10.1117/12.703848
Proc. SPIE 6505, Deterring watermark collusion attacks using signal processing techniques, 65050M (27 February 2007); doi: 10.1117/12.704106
Proc. SPIE 6505, Experimental study on watermark interference in multiple re-watermarking, 65050N (27 February 2007); doi: 10.1117/12.699167
Proc. SPIE 6505, Evaluation of standard watermarking techniques, 65050O (27 February 2007); doi: 10.1117/12.704359
Forensics I
Proc. SPIE 6505, Digital imaging sensor identification (further study), 65050P (27 February 2007); doi: 10.1117/12.703370
Proc. SPIE 6505, Joint forensics and watermarking approach for video authentication, 65050Q (27 February 2007); doi: 10.1117/12.704107
Proc. SPIE 6505, Image splicing detection using 2D phase congruency and statistical moments of characteristic function, 65050R (27 February 2007); doi: 10.1117/12.704321
Forensics II
Proc. SPIE 6505, Robust scanner identification based on noise features, 65050S (27 February 2007); doi: 10.1117/12.704688
Proc. SPIE 6505, Detection of malevolent changes in digital video for forensic applications, 65050T (27 February 2007); doi: 10.1117/12.704924
Proc. SPIE 6505, Forensic classification of imaging sensor types, 65050U (1 March 2007); doi: 10.1117/12.705849
Natural Language Watermarking
Proc. SPIE 6505, Information hiding through errors: a confusing approach, 65050V (27 February 2007); doi: 10.1117/12.706980
Proc. SPIE 6505, A comprehensive bibliography of linguistic steganography, 65050W (2 March 2007); doi: 10.1117/12.711325
Proc. SPIE 6505, Syntactic tools for text watermarking, 65050X (2 March 2007); doi: 10.1117/12.708111
Proc. SPIE 6505, The syntax of concealment: reliable methods for plain text information hiding, 65050Y (27 February 2007); doi: 10.1117/12.713357
Proc. SPIE 6505, Statistically constrained shallow text marking: techniques, evaluation paradigm, and results, 65050Z (27 February 2007); doi: 10.1117/12.713355
Biometrics
Proc. SPIE 6505, Adaptive and distributed cryptography for signature biometrics protection, 650510 (27 February 2007); doi: 10.1117/12.703940
Proc. SPIE 6505, Analyzing a multimodal biometric system using real and virtual users, 650512 (27 February 2007); doi: 10.1117/12.703873
Proc. SPIE 6505, Digital watermarking of biometric speech references: impact to the EER system performance, 650513 (27 February 2007); doi: 10.1117/12.703890
Proc. SPIE 6505, How to protect biometric templates, 650514 (27 February 2007); doi: 10.1117/12.705896
Proc. SPIE 6505, Error exponent analysis of person identification based on fusion of dependent/independent modalities, 650515 (27 February 2007); doi: 10.1117/12.704138
BOWS
Proc. SPIE 6505, The first BOWS contest (Break Our Watermarking System), 650516 (27 February 2007); doi: 10.1117/12.704969
Proc. SPIE 6505, The good, the bad, and the ugly: three different approaches to break their watermarking system, 650517 (27 February 2007); doi: 10.1117/12.703968
Proc. SPIE 6505, Watermarking attack: BOWS contest, 650518 (27 February 2007); doi: 10.1117/12.705561
Proc. SPIE 6505, Tangential sensitivity analysis of watermarks using prior information, 650519 (1 March 2007); doi: 10.1117/12.704704
Proc. SPIE 6505, Tackling BOWS with the sensitivity attack, 65051A (27 February 2007); doi: 10.1117/12.704706
Proc. SPIE 6505, Two different approaches for attacking BOWS, 65051B (27 February 2007); doi: 10.1117/12.704233
Proc. SPIE 6505, How we broke the BOWS watermark, 65051C (27 February 2007); doi: 10.1117/12.704376
Video
Proc. SPIE 6505, Adaptive MPEG-2 video data hiding scheme, 65051D (27 February 2007); doi: 10.1117/12.703563
Proc. SPIE 6505, Digital video watermarking in P-frames, 65051E (27 February 2007); doi: 10.1117/12.703709
Proc. SPIE 6505, Framework for combined video frame synchronization and watermark detection, 65051F (27 February 2007); doi: 10.1117/12.704133
Forensics III
Proc. SPIE 6505, Source digital camcorder identification using sensor photo response non-uniformity, 65051G (1 March 2007); doi: 10.1117/12.696519
Proc. SPIE 6505, Blind identification of cellular phone cameras, 65051H (27 February 2007); doi: 10.1117/12.703920
Proc. SPIE 6505, Forensics for flatbed scanners, 65051I (27 February 2007); doi: 10.1117/12.704165
Proc. SPIE 6505, Intrinsic fingerprints for image authentication and steganalysis, 65051J (27 February 2007); doi: 10.1117/12.704696
Proc. SPIE 6505, Scanner identification using sensor pattern noise, 65051K (1 March 2007); doi: 10.1117/12.705837
Proc. SPIE 6505, A generalized Benford’s law for JPEG coefficients and its applications in image forensics, 65051L (27 February 2007); doi: 10.1117/12.704723
Embedding I
Proc. SPIE 6505, Distortion-free robust watermarking: a case study, 65051N (27 February 2007); doi: 10.1117/12.702445
Proc. SPIE 6505, Hidden context highlighting with JPEG2000 imagery, 65051O (27 February 2007); doi: 10.1117/12.703999
Embedding II
Proc. SPIE 6505, Perceptual data hiding in tree structured Haar transform domain, 65051Q (27 February 2007); doi: 10.1117/12.704521