Sign in
Media Forensics and Security
2009
2010
2011
2009
2011
Keyphrases
Publications
2011
Jan Kodovský
,
Jessica J. Fridrich
Steganalysis in high dimensions: fusing classifiers built on random subspaces.
Media Forensics and Security
(2011)
Mireia Montañola Sales
,
Rony Darazi
,
Joachim Giard
,
Patrice Rondao-Alface
,
Benoît Macq
Feature point-based 3D mesh watermarking that withstands the cropping attack.
Media Forensics and Security
(2011)
Ventsislav Chonev
,
Andrew D. Ker
Feature restoration and distortion metrics.
Media Forensics and Security
(2011)
Ivans Lubenko
,
Andrew D. Ker
Steganalysis using logistic regression.
Media Forensics and Security
(2011)
Jessica J. Fridrich
,
Miroslav Goljan
Determining approximate age of digital images using sensor defects.
Media Forensics and Security
(2011)
Aparna Gurijala
,
Alastair Reed
,
Eric Evans
Assessment of camera phone distortion and implications for watermarking.
Media Forensics and Security
(2011)
Bruce Davis
Signal rich art: enabling the vision of ubiquitous computing.
Media Forensics and Security
(2011)
Sviatoslav Voloshynovskiy
,
Taras Holotyak
,
Oleksiy J. Koval
,
Fokko Beekhof
,
Farzad Farhadzadeh
Private content identification based on soft fingerprinting.
Media Forensics and Security
(2011)
Emi Myodo
,
Koichi Takagi
,
Ryoichi Kawada
Contrast-enhancing and deterministic tone mapping method in natural image hiding scheme using halftone images.
Media Forensics and Security
(2011)
Mathieu Desoubeaux
,
Gaëtan Le Guelvouit
,
William Puech
Probabilistic fingerprinting codes used to detect traitor zero-bit watermark.
Media Forensics and Security
(2011)
Mehdi Fallahpour
,
David Megías
,
Yun Q. Shi
Lossless image data embedding in plain areas.
Media Forensics and Security
(2011)
Christoph Zauner
,
Martin Steinebach
,
Eckehard Hermann
Rihamark: perceptual image hash benchmarking.
Media Forensics and Security
(2011)
Taras Holotyak
,
Svyatoslav Voloshynovskiy
,
Oleksiy J. Koval
,
Fokko Beekhof
Trading-off performance and complexity in identification problem.
Media Forensics and Security
(2011)
Marcus Leich
,
Stefan Kiltz
,
Jana Dittmann
,
Claus Vielhauer
Non-destructive forensic latent fingerprint acquisition with chromatic white light sensors.
Media Forensics and Security
(2011)
Babak Mahdian
,
Stanislav Saic
Identifying image forgeries using change points detection.
Media Forensics and Security
(2011)
Naveed Islam
,
William Puech
,
Robert Brouzet
Comparison of three solutions to correct erroneous blocks to extract an image of a multiplicative homomorphic cryptosystem.
Media Forensics and Security
(2011)
Chao-Yung Hsu
,
Chun-Shien Lu
,
Soo-Chang Pei
Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction.
Media Forensics and Security
(2011)
Tomás Filler
,
Jessica J. Fridrich
Design of adaptive steganographic schemes for digital images.
Media Forensics and Security
(2011)
Jun Yu
,
Scott Craver
,
Enping Li
Toward the identification of DSLR lenses by chromatic aberration.
Media Forensics and Security
(2011)
Waldemar Berchtold
,
Sascha Zmudzinski
,
Marcel Schäfer
,
Martin Steinebach
Collusion-secure patchwork embedding for transaction watermarking.
Media Forensics and Security
(2011)
Tu-Thach Quach
On locating steganographic payload using residuals.
Media Forensics and Security
(2011)
Xiangui Kang
,
Yinxiang Li
,
Zhenhua Qu
,
Jiwu Huang
Enhancing ROC performance of trustworthy camera source identification.
Media Forensics and Security
(2011)
Andrew D. Ker
A curiosity regarding steganographic capacity of pathologically nonstationary sources.
Media Forensics and Security
(2011)
Florent Autrusseau
,
Sylvain David
,
Vinod Pankajakshan
,
Patrizio Campisi
A perceptually driven hybrid additive-multiplicative watermarking technique in the wavelet domain.
Media Forensics and Security
(2011)
Oleksiy J. Koval
,
Svyatoslav Voloshynovskiy
,
Farzad Farhadzadeh
,
Taras Holotyak
,
Fokko Beekhof
Geometrically robust perceptual fingerprinting: an asymmetric case.
Media Forensics and Security
(2011)
Christian Kraetzer
,
Kun Qian
,
Maik Schott
,
Jana Dittmann
A context model for microphone forensics and its application in evaluations.
Media Forensics and Security
(2011)
Daniel Trick
,
Stefan Thiemert
A new metric for measuring the visual quality of video watermarks.
Media Forensics and Security
(2011)
Martin Steinebach
,
Sascha Zmudzinski
,
Stefan Nürnberger
Re-synchronizing audio watermarking after non-linear time stretching.
Media Forensics and Security
(2011)
Andrew D. Ker
,
Tomás Pevný
A new paradigm for steganalysis via clustering.
Media Forensics and Security
(2011)
Aravind K. Mikkilineni
,
Nitin Khanna
,
Edward J. Delp
Forensic printer detection using intrinsic signatures.
Media Forensics and Security
(2011)
Dandan Liao
,
Rui Yang
,
Hongmei Liu
,
Jian Li
,
Jiwu Huang
Double H.264/AVC compression detection using quantized nonzero AC coefficients.
Media Forensics and Security
(2011)
Tomás Pevný
Detecting messages of unknown length.
Media Forensics and Security
(2011)
Andrea Cortiana
,
Valentina Conotter
,
Giulia Boato
,
Francesco G. B. De Natale
Performance comparison of denoising filters for source camera identification.
Media Forensics and Security
(2011)
volume 7880, 2011
Media Forensics and Security III, San Francisco Airport, CA, USA, January 24-26, 2011, Proceedings
Media Forensics and Security
7880 (2011)
2010
Scott Craver
,
Jun Yu
Subset selection circumvents the square root law.
Media Forensics and Security
(2010)
Lakshmanan Nataraj
,
Anindya Sarkar
,
B. S. Manjunath
Improving re-sampling detection by adding noise.
Media Forensics and Security
(2010)
Wadood Abdul
,
Philippe Carré
,
Philippe Gaborit
Human visual system-based color image steganography using the contourlet transform.
Media Forensics and Security
(2010)
Fuchun Xie
,
Teddy Furon
,
Caroline Fontaine
Better security levels for broken arrows.
Media Forensics and Security
(2010)
Miroslav Goljan
,
Jessica J. Fridrich
,
Mo Chen
Sensor noise camera identification: countering counter-forensics.
Media Forensics and Security
(2010)
Bian Yang
,
Christoph Busch
,
Patrick Bours
,
Davrondzhon Gafurov
Robust minutiae hash for fingerprint template protection.
Media Forensics and Security
(2010)
Bian Yang
,
Christoph Busch
,
Xiamu Niu
Joint reversible data hiding and image encryption.
Media Forensics and Security
(2010)
Rui Yang
,
Yun Q. Shi
,
Jiwu Huang
Detecting double compression of audio signal.
Media Forensics and Security
(2010)
Xiaoying Feng
,
Gwenaël J. Doërr
JPEG recompression detection.
Media Forensics and Security
(2010)
Aravind K. Mikkilineni
,
Nitin Khanna
,
Edward J. Delp
Texture based attacks on intrinsic signature based printer identification.
Media Forensics and Security
(2010)
Stefan Thiemert
,
Martin Steinebach
SIFT features in semi-fragile video watermarks.
Media Forensics and Security
(2010)
Tomás Filler
,
Jan Judas
,
Jessica J. Fridrich
Minimizing embedding impact in steganography using trellis-coded quantization.
Media Forensics and Security
(2010)
Jennifer L. Davidson
,
Jaikishan Jalan
Feature selection for steganalysis using the Mahalanobis distance.
Media Forensics and Security
(2010)
Hany Farid
,
Mary J. Bravo
Image forensic analyses that elude the human visual system.
Media Forensics and Security
(2010)
Sevinc Bayram
,
Husrev T. Sencar
,
Nasir D. Memon
Efficient techniques for sensor fingerprint matching in large image and video databases.
Media Forensics and Security
(2010)
volume 7541, 2010
Media Forensics and Security II, part of the IS&T-SPIE Electronic Imaging Symposium, San Jose, CA, USA, January 18-20, 2010, Proceedings
Media Forensics and Security
7541 (2010)