PROCEEDINGS VOLUME 7254
IS&T/SPIE ELECTRONIC IMAGING | 18-22 JANUARY 2009
Media Forensics and Security
Proceedings Volume 7254 is from: Logo
IS&T/SPIE ELECTRONIC IMAGING
18-22 January 2009
San Jose, California, United States
Front Matter
Proc. SPIE 7254, Front Matter: 7254, 725401 (5 February 2009); doi: 10.1117/12.824734
Media Fingerprinting
Proc. SPIE 7254, Video fingerprinting for copy identification: from research to industry applications, 725402 (4 February 2009); doi: 10.1117/12.805709
Proc. SPIE 7254, Video fingerprinting for live events, 725403 (4 February 2009); doi: 10.1117/12.805551
Proc. SPIE 7254, Machine-assisted editing of user-generated content, 725404 (4 February 2009); doi: 10.1117/12.807515
Proc. SPIE 7254, Image and video fingerprinting: forensic applications, 725405 (4 February 2009); doi: 10.1117/12.806580
Proc. SPIE 7254, Robust efficient video fingerprinting, 725406 (4 February 2009); doi: 10.1117/12.805997
Proc. SPIE 7254, A review of video fingerprints invariant to geometric attacks, 725407 (4 February 2009); doi: 10.1117/12.805627
Steganography and Steganalysis
Proc. SPIE 7254, The square root law of steganographic capacity for Markov covers, 725408 (4 February 2009); doi: 10.1117/12.805911
Proc. SPIE 7254, The impact of information fusion in steganalysis on the example of audio steganalysis, 725409 (4 February 2009); doi: 10.1117/12.805884
Proc. SPIE 7254, Feature reduction and payload location with WAM steganalysis, 72540A (4 February 2009); doi: 10.1117/12.805910
Proc. SPIE 7254, Model-based steganalysis using invariant features, 72540B (4 February 2009); doi: 10.1117/12.810507
Proc. SPIE 7254, From blind to quantitative steganalysis, 72540C (4 February 2009); doi: 10.1117/12.805601
Theoretical Foundations
Proc. SPIE 7254, Conception and limits of robust perceptual hashing: towards side information assisted hash functions, 72540D (4 February 2009); doi: 10.1117/12.805919
Proc. SPIE 7254, Expectation maximization decoding of Tardos probabilistic fingerprinting code, 72540E (4 February 2009); doi: 10.1117/12.806034
Proc. SPIE 7254, Joint detection-estimation games for sensitivity analysis attacks, 72540F (4 February 2009); doi: 10.1117/12.806111
Proc. SPIE 7254, On security threats for robust perceptual hashing, 72540H (4 February 2009); doi: 10.1117/12.807487
Media Forensics I
Proc. SPIE 7254, Large scale test of sensor fingerprint camera identification, 72540I (4 February 2009); doi: 10.1117/12.805701
Proc. SPIE 7254, Detection and description of geometrically transformed digital images, 72540J (4 February 2009); doi: 10.1117/12.805898
Proc. SPIE 7254, Synthesis of color filter array pattern in digital images, 72540K (4 February 2009); doi: 10.1117/12.805988
Media Forensics II
Proc. SPIE 7254, Lighting analysis of diffusely illuminated tableaus in realist paintings: an application to detecting "compositing" in the portraits of Garth Herrick, 72540L (4 February 2009); doi: 10.1117/12.806240
Proc. SPIE 7254, A study of the robustness of PRNU-based camera identification, 72540M (4 February 2009); doi: 10.1117/12.814705
Cryptographic Techniques for Content Protection
Proc. SPIE 7254, Robust fingerprinting codes and applications, 72540N (11 February 2009); doi: 10.1117/12.810749
Proc. SPIE 7254, Practical tracing traitors, 72540O (4 February 2009); doi: 10.1117/12.810937
Proc. SPIE 7254, Next generation DRM: cryptography or forensics?, 72540P (4 February 2009); doi: 10.1117/12.815047
Proc. SPIE 7254, Stream it to me! Why is it challenging?, 72540Q (4 February 2009); doi: 10.1117/12.815062
Proc. SPIE 7254, Broadcast encryption: paving the road to practical content protection systems, 72540S (4 February 2009); doi: 10.1117/12.815065
Video
Proc. SPIE 7254, Exhibition QIM-based watermarking for digital cinema, 72540U (4 February 2009); doi: 10.1117/12.816489
Proc. SPIE 7254, Digital watermarking for digital cinema, 72540V (4 February 2009); doi: 10.1117/12.816490
Data Hiding
Proc. SPIE 7254, Protocols for data hiding in pseudo-random state, 72540W (4 February 2009); doi: 10.1117/12.806254
Proc. SPIE 7254, High-capacity data hiding in text documents, 72540X (4 February 2009); doi: 10.1117/12.805960
Watermarking
Proc. SPIE 7254, Digital watermarking opportunities enabled by mobile media proliferation, 72540Y (4 February 2009); doi: 10.1117/12.813762
Proc. SPIE 7254, H.264/AVC substitution watermarking: a CAVLC example, 72540Z (4 February 2009); doi: 10.1117/12.824631
Proc. SPIE 7254, Real-time application of digital watermarking to embed tactical metadata into full motion video captured from unmanned aerial systems, 725410 (4 February 2009); doi: 10.1117/12.814319
Proc. SPIE 7254, Binary forensic code for multimedia signals: resisting minority collusion attacks, 725411 (4 February 2009); doi: 10.1117/12.816282
Authentication
Proc. SPIE 7254, Authenticating cropped and resized images using distributed source coding and expectation maximization, 725412 (4 February 2009); doi: 10.1117/12.805538
Proc. SPIE 7254, Random projections based item authentication, 725413 (4 February 2009); doi: 10.1117/12.805710
Proc. SPIE 7254, Perception-based authentication watermarking for digital audio data, 725414 (4 February 2009); doi: 10.1117/12.806041
Proc. SPIE 7254, Improvements on image authentication and recovery using distributed source coding, 725415 (4 February 2009); doi: 10.1117/12.807352
Miscellaneous
Proc. SPIE 7254, Nested object watermarking, 725416 (4 February 2009); doi: 10.1117/12.805862
Proc. SPIE 7254, High capacity color barcodes using dot orientation and color separability, 725417 (4 February 2009); doi: 10.1117/12.807742
Proc. SPIE 7254, Enabling search over encrypted multimedia databases, 725418 (4 February 2009); doi: 10.1117/12.806980
Proc. SPIE 7254, RF device forensics using passband filter analysis, 725419 (4 February 2009); doi: 10.1117/12.806056
Back to Top