Exportar 36 resultados:
[ Autor] Título Tipo Año Filtros: First Letter Of Last Name es C [Elimina todos los filtros]
«Adam and the Ants: On the Influence of the Optimization Algorithm on the Detectability of DNN Watermarks», vol. 22, n.º 12, p. 36, 2020.
, «Forensic detection of processing operator chains: recovering the history of filtered JPEG images», IEEE Transactions on Information Forensics and Security, 2015. tifs.pdf (2.46 MB)
, «Forensic analysis of full-frame linearly filtered JPEG images», in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4517-4521. conotter.pdf (780.94 KB)
, «Joint detection of full-frame linear filtering and JPEG compression in digital images», in IEEE International Workshop on Information Forensics and Security, Guangzhou, China, 2013. wifs13_jpeg.pdf (1.02 MB)
, «Multimedia operator chain topology and ordering estimation based on detection and information theoretic tools», in International Workshop on Digital-forensics and Watermarking, Shanghai, China, 2012. iwdw12.pdf (326.11 KB)
, «The impact of the cropping attack on scalar STDM data hiding», IEEE Signal Processing Letters, vol. 13, pp. 353-356, 2006. ieee-spl06_cropping.ps (243.75 KB)
, «Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks», EURASIP Journal on Information Security, vol. 2007, 2007. jis07bows.pdf (436.69 KB) Source code available here. (8.51 MB)
, «Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601. spie05_dpc.pdf (165.56 KB)
, «A Novel Interpretation of Content Authentication», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007. spie07authentication.pdf (179.34 KB)
, «Witsenhausen's counterexample and its links with multimedia security problems», in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011. iwdw11_witsenhausen.pdf (152.97 KB)
, «The optimal attack to histogram-based forensic detectors is simple(x)», in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014, pp. 137-142. wifs14.pdf (265.04 KB)
, «The blind Newton senstivity attack», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601. spie06_sensitivity.ps (1.62 MB)
, «Dither modulation in the logarithmic domain», in International Workshop on Digital Watermarking (IWDW), Guangzhou, China, 2007, pp. 1261-1264. iwdw07.pdf (183.38 KB)
, «Optimal counterforensics for histogram-based forensics», in IEEE International Conference on Audio, Speech and Signal Processing, Vancouver, Canada, 2013, pp. 3048-3052. icassp13.pdf (84.89 KB) Source code (5.47 MB)
, «Quantifying Security Leaks in Spread Spectrum Data Hiding: A Game Theoretic Approach», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 592-601. spie04.ps (572.73 KB)
, «Two different approaches for attacking BOWS», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007. spie07bows.pdf (416.45 KB)
, «Weber's law-based side-informed data hiding», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic, 2011, pp. 1840-1843. comesanaicassp11.pdf (119.42 KB)
, «The return of the sensitivity attack», in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274. iwdw05.pdf (190.47 KB)
, «On the capacity of stegosystems», in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264. acm07stego.pdf (198.41 KB)
, «Optimal Strategies for Spread-Spectrum and Quantized-Projection image data hiding games with BER Payoffs», in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003. icip03b.pdf (142.96 KB)
, «Side-informed data hiding: robustness and security analysis», University of Vigo, Spain, 2006. thesis_pedro.pdf (2.18 MB)
, «Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime», IEEE Transactions on Information Theory, vol. 56, pp. 2804-2815, 2010. tit-2010.pdf (240.81 KB)
, «Taking advantage of source correlation in forensic analysis», in IEEE International Workshop on Multimedia Signal Processing, Pula (Sardinia), Italy, 2013, pp. 159-164. mmsp13.pdf (167.27 KB)
, «Fundamentals of data hiding security and their application to spread-spectrum analysis», in International Workshop on Information Hiding (IH), Barcelona, Spain, 2005, vol. 3727, pp. 131-145. ih05_fundamentals.pdf (222.99 KB)
, «On a watermarking scheme in the logarithmic domain and its perceptual advantages», in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264. icip07logwat.pdf (77.03 KB)
,