Sciweavers

17 search results - page 2 / 4
» mmsec 2006
Sort
View
MMSEC
2006
ACM
115views Multimedia» more  MMSEC 2006»
13 years 10 months ago
An improvement to a biometric.based multimedia content protection scheme
A biometric-based method for multimedia content protection was recently proposed. The method relies on biometric data of the user and a layered encryption mechanism to achieve con...
Daniel Socek, Michal Sramka, Oge Marques, Dubravko...
MMSEC
2006
ACM
216views Multimedia» more  MMSEC 2006»
13 years 10 months ago
Exposing digital forgeries in video by detecting double MPEG compression
With the advent of sophisticated and low-cost video editing software, it is becoming increasingly easier to tamper with digital video. In addition, an ever-growing number of video...
Weihong Wang, Hany Farid
MMSEC
2006
ACM
167views Multimedia» more  MMSEC 2006»
13 years 10 months ago
Hermite polynomials as provably good functions to watermark white gaussian hosts
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the pr...
Teddy Furon
MMSEC
2006
ACM
148views Multimedia» more  MMSEC 2006»
13 years 10 months ago
Minimizing the embedding impact in steganography
In this paper, we study the trade-off in steganography between the number of embedding changes and their amplitude. We assume that each element of the cover image is assigned a sc...
Jessica J. Fridrich
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
13 years 10 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...