PROCEEDINGS VOLUME 6819
ELECTRONIC IMAGING | 27-31 JANUARY 2008
Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
IN THIS VOLUME

0 Sessions, 52 Papers, 0 Presentations
Front Matter  (1)
Forensics  (5)
Biometrics  (6)
Applications  (4)
Steganalysis  (7)
Embedding  (9)
Proceedings Volume 6819 is from: Logo
ELECTRONIC IMAGING
27-31 January 2008
San Jose, California, United States
Front Matter
Proc. SPIE 6819, Front Matter: Volume, 681901 (24 March 2008); doi: 10.1117/12.793470
Steganography I
Proc. SPIE 6819, Influence of embedding strategies on security of steganographic methods in the JPEG domain, 681902 (18 March 2008); doi: 10.1117/12.759147
Proc. SPIE 6819, WLAN steganography revisited, 681903 (18 March 2008); doi: 10.1117/12.764557
Proc. SPIE 6819, Steganographic strategies for a square distortion function, 681904 (18 March 2008); doi: 10.1117/12.765913
Proc. SPIE 6819, Revisiting weighted stego-image steganalysis, 681905 (18 March 2008); doi: 10.1117/12.766820
Theoretical Methods
Proc. SPIE 6819, Security analysis of robust perceptual hashing, 681906 (18 March 2008); doi: 10.1117/12.764846
Proc. SPIE 6819, A low-rate fingerprinting code and its application to blind image fingerprinting, 681907 (18 March 2008); doi: 10.1117/12.767846
Proc. SPIE 6819, Improved lower bounds on embedding distortion in information hiding, 681908 (18 March 2008); doi: 10.1117/12.767937
Proc. SPIE 6819, Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks, 681909 (18 March 2008); doi: 10.1117/12.771991
Proc. SPIE 6819, A high-rate fingerprinting code, 68190A (18 March 2008); doi: 10.1117/12.767850
Physical Media
Proc. SPIE 6819, Analysis of physical unclonable identification based on reference list decoding, 68190B (18 March 2008); doi: 10.1117/12.764840
Proc. SPIE 6819, Data embedding in hardcopy images via halftone-dot orientation modulation, 68190C (18 March 2008); doi: 10.1117/12.767408
Proc. SPIE 6819, Secure surface identification codes, 68190D (18 March 2008); doi: 10.1117/12.765118
Forensics
Proc. SPIE 6819, Camera identification from cropped and scaled images, 68190E (18 March 2008); doi: 10.1117/12.766732
Proc. SPIE 6819, On the detectability of local resampling in digital images, 68190F (18 March 2008); doi: 10.1117/12.766902
Proc. SPIE 6819, Scanner identification with extension to forgery detection, 68190G (18 March 2008); doi: 10.1117/12.772048
Proc. SPIE 6819, Individuality evaluation for paper based artifact-metrics using transmitted light image, 68190H (18 March 2008); doi: 10.1117/12.765035
Proc. SPIE 6819, Camera identification from printed images, 68190I (18 March 2008); doi: 10.1117/12.766824
Audio and Video I
Proc. SPIE 6819, Toward robust watermarking of scalable video, 68190J (18 March 2008); doi: 10.1117/12.766444
Proc. SPIE 6819, The video watermarking container: efficient real-time transaction watermarking, 68190K (18 March 2008); doi: 10.1117/12.766544
Proc. SPIE 6819, Robust audio hashing for audio authentication watermarking, 68190L (18 March 2008); doi: 10.1117/12.767237
Biometrics
Proc. SPIE 6819, Comparison of compression algorithms' impact on iris recognition accuracy II: revisiting JPEG, 68190M (18 March 2008); doi: 10.1117/12.766360
Proc. SPIE 6819, Biometric hashing for handwriting: entropy-based feature selection and semantic fusion, 68190N (18 March 2008); doi: 10.1117/12.766378
Proc. SPIE 6819, Realization of correlation attack against the fuzzy vault scheme, 68190O (18 March 2008); doi: 10.1117/12.766861
Proc. SPIE 6819, Error exponent analysis of person identification based on fusion of dependent/independent modalities: multiple hypothesis testing case, 68190P (18 March 2008); doi: 10.1117/12.764849
Proc. SPIE 6819, Bridging biometrics and forensics, 68190Q (18 March 2008); doi: 10.1117/12.766810
Proc. SPIE 6819, Security issues of Internet-based biometric authentication systems: risks of Man-in-the-Middle and BioPhishing on the example of BioWebAuth, 68190R (18 March 2008); doi: 10.1117/12.767632
Applications
Proc. SPIE 6819, Anticollusion watermarking of 3D meshes by prewarping, 68190S (18 March 2008); doi: 10.1117/12.766480
Proc. SPIE 6819, In-theater piracy: finding where the pirate was, 68190T (18 March 2008); doi: 10.1117/12.762580
Proc. SPIE 6819, A theoretical analysis of spatial/temporal modulation-based systems for prevention of illegal recordings in movie theaters, 68190U (18 March 2008); doi: 10.1117/12.765430
Proc. SPIE 6819, Toward DRM for 3D geometry data, 68190V (18 March 2008); doi: 10.1117/12.766424
Audio and Video II
Proc. SPIE 6819, Establishing target track history by digital watermarking, 68190W (18 March 2008); doi: 10.1117/12.766676
Proc. SPIE 6819, MPEG recompression detection based on block artifacts, 68190X (18 March 2008); doi: 10.1117/12.767112
Proc. SPIE 6819, Cover signal specific steganalysis: the impact of training on the example of two selected audio steganalysis approaches, 68190Y (18 March 2008); doi: 10.1117/12.766419
Proc. SPIE 6819, Evaluation of robustness and transparency of multiple audio watermark embedding, 68190Z (18 March 2008); doi: 10.1117/12.766229
Proc. SPIE 6819, Forensic watermarking and bit-rate conversion of partially encrypted AAC bitstreams, 681910 (18 March 2008); doi: 10.1117/12.765340
Steganalysis
Proc. SPIE 6819, Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images, 681911 (18 March 2008); doi: 10.1117/12.759155
Proc. SPIE 6819, Textural features based universal steganalysis, 681912 (18 March 2008); doi: 10.1117/12.765817
Proc. SPIE 6819, Isotropy-based steganalysis in multiple least significant bits, 681913 (18 March 2008); doi: 10.1117/12.766005
Proc. SPIE 6819, Nonparametric steganalysis of QIM data hiding using approximate entropy, 681914 (18 March 2008); doi: 10.1117/12.767313
Proc. SPIE 6819, Steganalysis-aware steganography: statistical indistinguishability despite high distortion, 681915 (18 March 2008); doi: 10.1117/12.767402
Proc. SPIE 6819, Steganographic capacity estimation for the statistical restoration framework, 681916 (18 March 2008); doi: 10.1117/12.767841
Proc. SPIE 6819, Further study on YASS: steganography based on randomized embedding to resist blind steganalysis, 681917 (18 March 2008); doi: 10.1117/12.767893
Embedding
Proc. SPIE 6819, Nested object watermarking: transparency and capacity evaluation, 681918 (18 March 2008); doi: 10.1117/12.766370
Proc. SPIE 6819, Reduced embedding complexity using BP message passing for LDGM codes, 681919 (18 March 2008); doi: 10.1117/12.766649
Proc. SPIE 6819, A joint asymmetric watermarking and image encryption scheme, 68191A (18 March 2008); doi: 10.1117/12.765344
Proc. SPIE 6819, Robust digital image watermarking in curvelet domain, 68191B (18 March 2008); doi: 10.1117/12.765895
Proc. SPIE 6819, A joint digital watermarking and encryption method, 68191C (18 March 2008); doi: 10.1117/12.766650
Proc. SPIE 6819, Embedding considering dependencies between pixels, 68191D (18 March 2008); doi: 10.1117/12.766709
Proc. SPIE 6819, A reversible data hiding method for encrypted images, 68191E (18 March 2008); doi: 10.1117/12.766754
Proc. SPIE 6819, Improved embedding efficiency and AWGN robustness for SS watermarks via pre-coding, 68191F (18 March 2008); doi: 10.1117/12.767412
Proc. SPIE 6819, Perceptual hash based blind geometric synchronization of images for watermarking, 68191G (18 March 2008); doi: 10.1117/12.764994
Back to Top