Export 36 results:
[ Author
Filters: First Letter Of Last Name is C [Clear All Filters]
“Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains”, in IEEE Workshop on Information Forensics and Security, Tenerife, Spain, 2012.
wifs12_distinguishability.pdf (265.05 KB)
, 
“Optimal Data-Hiding Strategies for Games with BER Payoffs”, in International Workshop on Digital Watermarking (IWDW), 2003, vol. 2939 / 2004, pp. 101-116.
iwdw03.ps (499.03 KB)
, 
“Blind Newton Sensitivity Attack”, IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006.
iee-06bnsa.ps (1.67 MB)
, 
“Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819.
spie08one-bit-wm.pdf (277.85 KB)
, 
“Quantization lattice estimation for multimedia forensics”, in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4452-4456.
icip13.pdf (88.9 KB)
, 
“On distortion-compensated Dither Modulation data-hiding with repetition coding”, IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006.
dcdm_uvigo05.pdf (311.95 KB)
, 
“An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios”, in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Montreux, Switzerland, 2005.
wiamis05.pdf (119.47 KB)
, 
“Forensic detection of processing operator chains: recovering the history of filtered JPEG images”, IEEE Transactions on Information Forensics and Security, 2015.
tifs.pdf (2.46 MB)
, 
“Forensic analysis of full-frame linearly filtered JPEG images”, in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4517-4521.
conotter.pdf (780.94 KB)
, 
“Joint detection of full-frame linear filtering and JPEG compression in digital images”, in IEEE International Workshop on Information Forensics and Security, Guangzhou, China, 2013.
wifs13_jpeg.pdf (1.02 MB)
, 
“Adam and the Ants: On the Influence of the Optimization Algorithm on the Detectability of DNN Watermarks”, vol. 22, no. 12, p. 36, 2020.
,