The image authentication system SARI proposed by Lin and Chang passes JPEG compression and rejects other malicious manipulations. Some vulnerabilities of the system have been repo...
This work reduces the computational requirements of the additive noise steganalysis presented by Harmsen and Pearlman. The additive noise model assumes that the stegoimage is crea...
Jeremiah J. Harmsen, Kevin D. Bowers, William A. P...
Digital fingerprints are unique labels inserted in different copies of the same content before distribution. Each digital fingerprint is assigned to an intended recipient, and can...
We give initial results from a new project which performs statistically accurate evaluation of the reliability of image steganalysis algorithms. The focus here is on the Pairs and...
A technique for watermarking duplex printed pages is presented. The technique produces visible watermark patterns like conventional watermarks embedded in paper fabric. Watermark ...