Sciweavers

45 search results - page 2 / 9
» tifs 2008
Sort
View
TIFS
2008
105views more  TIFS 2008»
13 years 4 months ago
On the Assumption of Equal Contributions in Fingerprinting
With a digital fingerprinting scheme a vendor of digital copies of copyrighted material marks each individual copy with a unique fingerprint. If an illegal copy appears, it can be ...
Hans Georg Schaathun
TIFS
2008
194views more  TIFS 2008»
13 years 4 months ago
Detection of Double-Compression in JPEG Images for Applications in Steganography
This paper presents a method for detection of double JPEG compression and a maximum likelihood estimator of the primary quality factor. These methods are essential for construction...
Tomás Pevný, Jessica J. Fridrich
TIFS
2010
123views more  TIFS 2010»
13 years 3 months ago
A new framework for adaptive multimodal biometrics management
This paper presents a new evolutionary approach for adaptive combination of multiple biometrics to ensure the optimal performance for the desired level of security. The adaptive c...
Ajay Kumar, Vivek Kanhangad, David Zhang
TIFS
2010
97views more  TIFS 2010»
13 years 3 months ago
On the location of an eavesdropper in multiterminal networks
—We study the optimum location of an eavesdropper from a secrecy capacity perspective in multiterminal networks with power control. We determine the logical location of an eavesd...
S. Anand, R. Chandramouli
TIFS
2008
152views more  TIFS 2008»
13 years 4 months ago
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works to a more general scenario. The se...
Luis Pérez-Freire, Fernando Pérez-Go...