ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the 10th ACM workshop on Multimedia and security - MM&Sec '08
Latest Publications
TOTAL DOCUMENTS
29
(FIVE YEARS 0)
H-INDEX
12
(FIVE YEARS 0)
Published By ACM Press
9781605580586
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Vehicle systems
Proceedings of the 10th ACM workshop on Multimedia and security - MM&Sec '08
◽
10.1145/1411328.1411360
◽
2008
◽
Cited By ~ 2
Author(s):
Michael Biermann
◽
Tobias Hoppe
◽
Jana Dittmann
◽
Claus Vielhauer
Keyword(s):
Vehicle Systems
Download Full-text
Watermarking, steganography and content forensics
Proceedings of the 10th ACM workshop on Multimedia and security - MM&Sec '08
◽
10.1145/1411328.1411330
◽
2008
◽
Cited By ~ 1
Author(s):
Ingemar J. Cox
Download Full-text
Histogram-based reversible data hiding technique using subsampling
Proceedings of the 10th ACM workshop on Multimedia and security - MM&Sec '08
◽
10.1145/1411328.1411341
◽
2008
◽
Cited By ~ 15
Author(s):
Kyung-Su Kim
◽
Min-Jeong Lee
◽
Heung-Kyu Lee
◽
Young-Ho Suh
Keyword(s):
Data Hiding
◽
Reversible Data Hiding
Download Full-text
A key-recovery attack on authentication watermarking by li and yuan
Proceedings of the 10th ACM workshop on Multimedia and security - MM&Sec '08
◽
10.1145/1411328.1411365
◽
2008
◽
Author(s):
Hans Georg Schaathun
Keyword(s):
Key Recovery
◽
Key Recovery Attack
Download Full-text
Efficient pointwise and blockwise encrypted operations
Proceedings of the 10th ACM workshop on Multimedia and security - MM&Sec '08
◽
10.1145/1411328.1411344
◽
2008
◽
Cited By ~ 6
Author(s):
Tiziano Bianchi
◽
Alessandro Piva
◽
Mauro Barni
Download Full-text
Impact of feature selection in classification for hidden channel detection on the example of audio data hiding
Proceedings of the 10th ACM workshop on Multimedia and security - MM&Sec '08
◽
10.1145/1411328.1411356
◽
2008
◽
Cited By ~ 1
Author(s):
Christian Kraetzer
◽
Jana Dittmann
Keyword(s):
Feature Selection
◽
Data Hiding
◽
Channel Detection
◽
Audio Data
Download Full-text
Multiple re-watermarking using varying non-stationary mra with parameterized wavelet filters
Proceedings of the 10th ACM workshop on Multimedia and security - MM&Sec '08
◽
10.1145/1411328.1411340
◽
2008
◽
Cited By ~ 3
Author(s):
Jutta Hämmerle-Uhl
◽
Andreas Uhl
◽
Hartmut Wernisch
Keyword(s):
Wavelet Filters
Download Full-text
Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol
Proceedings of the 10th ACM workshop on Multimedia and security - MM&Sec '08
◽
10.1145/1411328.1411363
◽
2008
◽
Cited By ~ 1
Author(s):
David M. Williams
◽
Helen Treharne
◽
Anthony T.S. Ho
◽
Chris Culnane
Keyword(s):
Formal Analysis
◽
Watermarking Protocol
◽
Analysis Technique
Download Full-text
A robust spectral approach for blind watermarking of manifold surfaces
Proceedings of the 10th ACM workshop on Multimedia and security - MM&Sec '08
◽
10.1145/1411328.1411338
◽
2008
◽
Cited By ~ 22
Author(s):
Yang Liu
◽
Balakrishnan Prabhakaran
◽
Xiaohu Guo
Keyword(s):
Blind Watermarking
◽
Spectral Approach
Download Full-text
On completeness of feature spaces in blind steganalysis
Proceedings of the 10th ACM workshop on Multimedia and security - MM&Sec '08
◽
10.1145/1411328.1411352
◽
2008
◽
Cited By ~ 20
Author(s):
Jan Kodovský
◽
Jessica Fridrich
Keyword(s):
Feature Spaces
◽
Blind Steganalysis
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close