default search action
Media Watermarking, Security, and Forensics 2016: San Francisco, CA, USA
- Adnan M. Alattar, Nasir D. Memon:
Media Watermarking, Security, and Forensics 2016, San Francisco, California, USA, February 14-18, 2016. Society for Imaging Science and Technology 2016
Forensics
- Jun Yu, Enping Li, Scott Craver:
Ambiguity Attack on the Integrity of a Genuine Picture by Producing Another Picture Immune to Generic Digital Forensic Test. 1-3 - Sujoy Chakraborty, Matthias Kirchner:
Compression Forensics Beyond The First Significant Digit. 1-7 - Svetlana Abramova, Rainer Böhme:
Detecting Copy-Move Forgeries in Scanned Text Documents. 1-9
Watermarking
- Keizo Kato, Kensuke Kuraki, Ryuta Tanaka:
Improvement of trade-off between compression tolerance and perceptibility of video watermark for broadcasting. 1-9 - Kohei Oshita, Hiroshi Unno, Kazutake Uehira:
Optically written watermarking technology using temporally and spatially luminance-modulated light. 1-6 - Waldemar Berchtold, Marcel Schäfer, Martin Steinebach:
Maximal stable extremal regions for robust video watermarking. 1-8 - Matthias Carnein, Pascal Schöttle, Rainer Böhme:
Telltale Watermarks for Counting JPEG Compressions. 1-10
Identification
- Alireza Farrokh Baroughi, Scott Craver, Daniel Douglas:
Attacks on Speaker Identification Systems Constrained to Speech-to-Text Decoding. 1-7
Steganography
- Alex Wilson, Andrew D. Ker:
Avoiding detection on twitter: embedding strategies for linguistic steganography. 1-9 - Tu-Thach Quach:
Separating Steganographic Images by Embedding Key. 1-6 - Vahid Sedighi, Jessica J. Fridrich, Rémi Cogranne:
Toss that BOSSbase, Alice! 1-9
Steganalysis
- Chao Xia, Qingxiao Guan, Xianfeng Zhao, Yong Deng:
Accelerating the DCTR Features Extraction for JPEG Steganalysis Based on CUDA. 1-6 - Lionel Pibre, Jérôme Pasquet, Dino Ienco, Marc Chaumont:
Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch. 1-11 - Tomás Pevný, Martin Kopp, Jakub Kroustek, Andrew D. Ker:
Malicons: Detecting Payload in Favicons. 1-9 - Tomás Denemark, Jessica J. Fridrich, Pedro Comesaña Alfaro:
Improving Selection-Channel-Aware Steganalysis Features. 1-8
Banknote Security
- Reinhold Huber-Mörk, Johannes Ruisz:
Banknote crease detection and banknote fitness classification. 1-6 - Thomas Dewaele, Maurits Diephuis, Taras Holotyak, Sviatoslav Voloshynovskiy:
Forensic authentication of banknotes on mobile phones. 1-8 - Manabu Yamakoshi, Junichi Tanaka, Hiroshi Iwasaki:
Security Evaluation based on the Analytic Hierarchy Process for First-line Anti-counterfeit Elements. 1-6
Fingerprinting
- Marcel Schäfer, Waldemar Berchtold, Teetje Stark, Nils Reimers, Martin Steinebach:
A Novel Attack Model for Collusion Secure Fingerprinting Codes. 1-11 - Miroslav Goljan, Mo Chen, Pedro Comesaña, Jessica J. Fridrich:
Effect of Compression on Sensor-Fingerprint Based Camera Identification. 1-10 - John Entrieri, Matthias Kirchner:
Patch-Based Desynchronization of Digital Camera Sensor Fingerprints. 1-9 - Irene Amerini, Paolo Bestagini, Luca Bondi, Roberto Caldelli, Matteo Casini, Stefano Tubaro:
Robust smartphone fingerprint by mixing device sensors features for mobile strong authentication. 1-8
Noise & Quality
- Iuliia Tkachenko, William Puech, Olivier Strauss, Christophe Destruel:
Experimental study of Print-and-Scan impact as random process. 1-11 - Waldemar Berchtold, Marcel Schäfer, Sascha Wombacher, Martin Steinebach:
Quality Metric for 2D Textures on 3D Objects. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.