PROCEEDINGS VOLUME 7541
IS&T/SPIE ELECTRONIC IMAGING | 17-21 JANUARY 2010
Media Forensics and Security II
IN THIS VOLUME

0 Sessions, 40 Papers, 0 Presentations
Front Matter  (1)
Forensics I  (4)
Forensics II  (3)
Proceedings Volume 7541 is from: Logo
IS&T/SPIE ELECTRONIC IMAGING
17-21 January 2010
San Jose, California, United States
Front Matter
Proc. SPIE 7541, Front Matter: Volume 7541, 754101 (16 February 2010); doi: 10.1117/12.858653
Steganography
Proc. SPIE 7541, Modern steganalysis can detect YASS, 754102 (28 January 2010); doi: 10.1117/12.838768
Proc. SPIE 7541, Subset selection circumvents the square root law, 754103 (28 January 2010); doi: 10.1117/12.839168
Proc. SPIE 7541, Feature selection for steganalysis using the Mahalanobis distance, 754104 (28 January 2010); doi: 10.1117/12.841074
Proc. SPIE 7541, Minimizing embedding impact in steganography using trellis-coded quantization, 754105 (28 January 2010); doi: 10.1117/12.838002
Forensics I
Proc. SPIE 7541, Image forensic analyses that elude the human visual system, 754106 (28 January 2010); doi: 10.1117/12.837788
Proc. SPIE 7541, Efficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics, 754107 (28 January 2010); doi: 10.1117/12.839034
Proc. SPIE 7541, Managing a large database of camera fingerprints, 754108 (28 January 2010); doi: 10.1117/12.838378
Proc. SPIE 7541, Efficient techniques for sensor fingerprint matching in large image and video databases, 754109 (28 January 2010); doi: 10.1117/12.845737
Watermark Embedding
Proc. SPIE 7541, Feature point based image watermarking with insertions, deletions, and substitution codes, 75410A (28 January 2010); doi: 10.1117/12.838598
Proc. SPIE 7541, SIFT features in semi-fragile video watermarks, 75410B (28 January 2010); doi: 10.1117/12.838892
Proc. SPIE 7541, Reversible transformations may improve the quality of reversible watermarking, 75410C (28 January 2010); doi: 10.1117/12.845993
Authentication
Proc. SPIE 7541, Multimodal object authentication with random projections: a worst-case approach, 75410D (28 January 2010); doi: 10.1117/12.838825
Proc. SPIE 7541, Digital image authentication from thumbnails, 75410E (28 January 2010); doi: 10.1117/12.838834
Proc. SPIE 7541, Automatic counterfeit protection system code classification, 75410F (28 January 2010); doi: 10.1117/12.840253
Watermark Security
Proc. SPIE 7541, Audio watermarking forensics: detecting malicious re-embedding, 75410G (28 January 2010); doi: 10.1117/12.838881
Proc. SPIE 7541, Better security levels for broken arrows, 75410H (28 January 2010); doi: 10.1117/12.838895
Forensics II
Proc. SPIE 7541, Improving re-sampling detection by adding noise, 75410I (28 January 2010); doi: 10.1117/12.839086
Proc. SPIE 7541, JPEG recompression detection, 75410J (28 January 2010); doi: 10.1117/12.838888
Proc. SPIE 7541, Detecting double compression of audio signal, 75410K (28 January 2010); doi: 10.1117/12.838695
Biometric Security
Proc. SPIE 7541, IT and SLT characterizations of secured biometric authentication systems, 75410M (29 January 2010); doi: 10.1117/12.839129
Proc. SPIE 7541, Alignment and bit extraction for secure fingerprint biometrics, 75410N (28 January 2010); doi: 10.1117/12.839130
Proc. SPIE 7541, Biometric template transformation: a security analysis, 75410O (28 January 2010); doi: 10.1117/12.839976
Proc. SPIE 7541, On information leakage in fuzzy commitment, 75410P (28 January 2010); doi: 10.1117/12.839408
Proc. SPIE 7541, On the security of biohashing, 75410Q (28 January 2010); doi: 10.1117/12.839165
Proc. SPIE 7541, Robust minutiae hash for fingerprint template protection, 75410R (28 January 2010); doi: 10.1117/12.838998
Counter Forensics
Proc. SPIE 7541, Sensor noise camera identification: countering counter-forensics, 75410S (28 January 2010); doi: 10.1117/12.839055
Proc. SPIE 7541, Texture based attacks on intrinsic signature based printer identification, 75410T (28 January 2010); doi: 10.1117/12.845377
Watermarking Quality
Proc. SPIE 7541, Human visual system based color image steganography using the contourlet transform, 75410U (28 January 2010); doi: 10.1117/12.838899
Proc. SPIE 7541, Joint reversible data hiding and image encryption, 75410V (28 January 2010); doi: 10.1117/12.840363
Proc. SPIE 7541, Audio annotation watermarking with robustness against DA/AD conversion, 75410W (28 January 2010); doi: 10.1117/12.838863
Forensics III
Proc. SPIE 7541, Exploring image dependencies: a new challenge in image forensics, 75410X (28 January 2010); doi: 10.1117/12.840235
Proc. SPIE 7541, Forensic hash for multimedia information, 75410Y (28 January 2010); doi: 10.1117/12.838745
Proc. SPIE 7541, Detecting content adaptive scaling of images for forensic applications, 75410Z (28 January 2010); doi: 10.1117/12.838647
Proc. SPIE 7541, On detection of median filtering in digital images, 754110 (28 January 2010); doi: 10.1117/12.839100
Proc. SPIE 7541, Efficient estimation of CFA pattern configuration in digital camera images, 754111 (28 January 2010); doi: 10.1117/12.839102
Miscellaneous
Proc. SPIE 7541, A framework for theoretical analysis of content fingerprinting, 754112 (28 January 2010); doi: 10.1117/12.845265
Proc. SPIE 7541, Image dependent log-likelihood ratio allocation for repeat accumulate code-based decoding in data hiding channels, 754113 (28 January 2010); doi: 10.1117/12.840174
Proc. SPIE 7541, On the embedding capacity of DNA strands under substitution, insertion, and deletion mutations, 754114 (28 January 2010); doi: 10.1117/12.838537
Proc. SPIE 7541, Fast identification of highly distorted images, 754116 (28 January 2010); doi: 10.1117/12.838962
Back to Top