Share Email Print


Media Forensics and Security II
For the purchase of this volume in printed format, please visit

Volume Details

Volume Number: 7541
Date Published: 27 January 2010

Table of Contents
show all abstracts | hide all abstracts
Front Matter: Volume 7541
Author(s): Proceedings of SPIE
Modern steganalysis can detect YASS
Author(s): Jan Kodovský; Tomáš Pevný; Jessica Fridrich
Show Abstract
Subset selection circumvents the square root law
Author(s): Scott Craver; Jun Yu
Show Abstract
Feature selection for steganalysis using the Mahalanobis distance
Author(s): Jennifer L. Davidson; Jaikishan Jalan
Show Abstract
Minimizing embedding impact in steganography using trellis-coded quantization
Author(s): Tomáš Filler; Jan Judas; Jessica Fridrich
Show Abstract
Image forensic analyses that elude the human visual system
Author(s): Hany Farid; Mary J. Bravo
Show Abstract
Efficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics
Author(s): Thomas Gloe; Karsten Borowka; Antje Winkler
Show Abstract
Managing a large database of camera fingerprints
Author(s): Miroslav Goljan; Jessica Fridrich; Tomáš Filler
Show Abstract
Efficient techniques for sensor fingerprint matching in large image and video databases
Author(s): Sevinc Bayram; H. Taha Sencar; Nasir Memon
Show Abstract
Feature point based image watermarking with insertions, deletions, and substitution codes
Author(s): Dieter Bardyn; Philippe Belet; Tim Dams; Ann Dooms; Peter Schelkens
Show Abstract
SIFT features in semi-fragile video watermarks
Author(s): Stefan Thiemert; Martin Steinebach
Show Abstract
Reversible transformations may improve the quality of reversible watermarking
Author(s): Ajith M. Kamath
Show Abstract
Multimodal object authentication with random projections: a worst-case approach
Author(s): Oleksiy Koval; Sviatoslav Voloshynovskiy
Show Abstract
Digital image authentication from thumbnails
Author(s): Eric Kee; Hany Farid
Show Abstract
Automatic counterfeit protection system code classification
Author(s): Joost Van Beusekom; Marco Schreyer; Thomas M. Breuel
Show Abstract
Audio watermarking forensics: detecting malicious re-embedding
Author(s): Sascha Zmudzinski; Martin Steinebach; Stefan Katzenbeisser; Ulrich Rührmair
Show Abstract
Better security levels for broken arrows
Author(s): Fuchun Xie; Teddy Furon; Caroline Fontaine
Show Abstract
Improving re-sampling detection by adding noise
Author(s): Lakshmanan Nataraj; Anindya Sarkar; B. S. Manjunath
Show Abstract
JPEG recompression detection
Author(s): Xiaoying Feng; Gwenaël Doërr
Show Abstract
Detecting double compression of audio signal
Author(s): Rui Yang; Yun Q. Shi; Jiwu Huang
Show Abstract
IT and SLT characterizations of secured biometric authentication systems
Author(s): Natalia A. Schmid; Harry Wechsler
Show Abstract
Alignment and bit extraction for secure fingerprint biometrics
Author(s): A. Nagar; S. Rane; A. Vetro
Show Abstract
Biometric template transformation: a security analysis
Author(s): Abhishek Nagar; Karthik Nandakumar; Anil K. Jain
Show Abstract
On information leakage in fuzzy commitment
Author(s): Tanya Ignatenko; Frans Willems
Show Abstract
On the security of biohashing
Author(s): Xuebing Zhou; Ton Kalker
Show Abstract
Robust minutiae hash for fingerprint template protection
Author(s): Bian Yang; Christoph Busch; Patrick Bours; Davrondzhon Gafurov
Show Abstract
Sensor noise camera identification: countering counter-forensics
Author(s): Miroslav Goljan; Jessica Fridrich; Mo Chen
Show Abstract
Texture based attacks on intrinsic signature based printer identification
Author(s): Aravind K. Mikkilineni; Nitin Khanna; Edward J. Delp
Show Abstract
Human visual system based color image steganography using the contourlet transform
Author(s): W. Abdul; P. Carré; P. Gaborit
Show Abstract
Joint reversible data hiding and image encryption
Author(s): Bian Yang; Christoph Busch; Xiamu Niu
Show Abstract
Audio annotation watermarking with robustness against DA/AD conversion
Author(s): Kun Qian; Christian Kraetzer; Michael Biermann; Jana Dittmann
Show Abstract
Exploring image dependencies: a new challenge in image forensics
Author(s): A. De Rosa; F. Uccheddu; A. Costanzo; A. Piva; M. Barni
Show Abstract
Forensic hash for multimedia information
Author(s): Wenjun Lu; Avinash L. Varna; Min Wu
Show Abstract
Detecting content adaptive scaling of images for forensic applications
Author(s): Claude Fillion; Gaurav Sharma
Show Abstract
On detection of median filtering in digital images
Author(s): Matthias Kirchner; Jessica Fridrich
Show Abstract
Efficient estimation of CFA pattern configuration in digital camera images
Author(s): Matthias Kirchner
Show Abstract
A framework for theoretical analysis of content fingerprinting
Author(s): Avinash L. Varna; Wei-Hong Chuang; Min Wu
Show Abstract
Image dependent log-likelihood ratio allocation for repeat accumulate code-based decoding in data hiding channels
Author(s): Anindya Sarkar; B. S. Manjunath
Show Abstract
On the embedding capacity of DNA strands under substitution, insertion, and deletion mutations
Author(s): Félix Balado
Show Abstract
Fast identification of highly distorted images
Author(s): Taras Holotyak; Sviatoslav Voloshynovskiy; Fokko Beekhof; Oleksiy Koval
Show Abstract

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?