Exportar 110 resultados:
Autor Título [ Tipo
Filtros: Clave es watermarking [Elimina todos los filtros]
«On achievable security levels for lattice data hiding in the Known Message Attack scenario», in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 68-79.
, «Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
spie05_dpc.pdf (165.56 KB)
, 
«Are you threatening me? Towards smart detectors in watermarking», in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014.
spie14_2.0.pdf (430.73 KB)
, 
«Blind decoder for binary probabilistic traitor tracing codes», in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 56-60.
, «Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 805-815.
spie04em.pdf (434.03 KB)
, 
«The blind Newton senstivity attack», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.
spie06_sensitivity.ps (1.62 MB)
, 
«Blind Turbo Decoding of Side-Informed Data Hiding Using Iterative Channel Estimation», in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Lisboa, 2004.
, «On the capacity of stegosystems», in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264.
acm07stego.pdf (198.41 KB)
, 
«Coding and Synchronization: A Boost and a Bottleneck for the Development of Image Watermarking», in COST #254 Int. Workshop on Intelligent Communications, L'Aquila, Italy, 1998, pp. 77–82.
, «Coding at the Sample Level for Data Hiding: Turbo and Concatenated Codes», in Security and Watermarking of Multimedia Contents, San José, USA, 2001, vol. 4314, pp. 532–543.
, «CryptoDSPs for Cloud Privacy», in International Workshop on Cloud Information System Engineering (CISE), Hong Kong, China, 2010, vol. 6724.
, «Data Hiding for Copyright Protection of Still Images», in Emerging Techniques for Communication Terminals, Tolouse, France, 1997, pp. 285–289.
, «Detection in quantization-based watermarking: performance and security issues», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
spie05_secur.pdf (401.96 KB)
, 
«A Dirty Paper Scheme for Hierarchical OFDM», in IEEE International Conference on Communications (ICC), Kioto, Japan, 2011.
, «Disclosing secrets in watermarking and data hiding», in Third Wavila Challenge (WaCha), Saint-Malo, France, 2007.
, «On Distortion Measures Associated to Random Desynchronization Attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, «Dither modulation in the logarithmic domain», in International Workshop on Digital Watermarking (IWDW), Guangzhou, China, 2007, pp. 1261-1264.
iwdw07.pdf (183.38 KB)
, 
«Dither-Modulation Data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks.», in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003.
icip03a.pdf (145.04 KB)
, 
«Efficient Non-Interactive Zero-Knowledge Watermark Detector Robust to Sensitivity Attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, «Efficient Protocols for Secure Adaptive Filtering», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prage, Czech Republic, 2011, pp. 5860-5863.
secure_adaptive_filteringICASSP2011.pdf (115.55 KB)
, 
«EM decoding of Tardos traitor tracing codes», in ACM Workshop on Multimedia and Security (MMSEC), Princeton, NJ, USA, 2009.
, «Encrypted Domain Processing for Cloud Privacy: Concept and Practical Experience», in International Conference on Cloud Computing and Services Science (CLOSER), Noordwijkerhout, The Netherlands, 2011.
, «Ensuring Gain Invariance in High-Rate Data-Hiding», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, «Estimating the minimal length of Tardos code», in International Workshop on Information Hiding (IH), Darmstadt, Germany, 2009.
, «Exploiting security holes in lattice data hiding», in International Workshop on Information Hiding (IH), Saint-Malo, France, 2007.
,