Sciweavers

MMSEC
2005
ACM
132views Multimedia» more  MMSEC 2005»
13 years 10 months ago
Resolution and quality scalable spread spectrum image watermarking
If digital watermarking is to adequately protect content in systems which provide both resolution and quality scalability, then the watermarking algorithms used must provide both ...
Angela Piper, Reihaneh Safavi-Naini, Alfred Mertin...
MMSEC
2005
ACM
114views Multimedia» more  MMSEC 2005»
13 years 10 months ago
Watermarking of MPEG-2 video in compressed domain using VLC mapping
In this work we propose a new algorithm for fragile, high capacity yet file-size preserving watermarking of MPEG-2 streams. Watermarking is done entirely in the compressed domain,...
Bijan G. Mobasseri, Michael P. Marcinak
MMSEC
2005
ACM
129views Multimedia» more  MMSEC 2005»
13 years 10 months ago
Exposing digital forgeries by detecting inconsistencies in lighting
When creating a digital composite of, for example, two people standing side-by-side, it is often difficult to match the lighting conditions from the individual photographs. Lighti...
Micah K. Johnson, Hany Farid
MMSEC
2005
ACM
101views Multimedia» more  MMSEC 2005»
13 years 10 months ago
Watermill: an optimized fingerprinting system for highly constrained data
Camélia Constantin, David Gross-Amblard, Me...
MMSEC
2005
ACM
116views Multimedia» more  MMSEC 2005»
13 years 10 months ago
An SVD-based audio watermarking technique
We present a non-oblivious, extremely robust watermarking scheme for audio signals. The watermarking algorithm is based on the SVD of the spectrogram of the signal. The SVD of the...
Hamza Özer, Bülent Sankur, Nasir D. Memo...
MMSEC
2005
ACM
147views Multimedia» more  MMSEC 2005»
13 years 10 months ago
A Bayesian image steganalysis approach to estimate the embedded secret message
Image steganalysis so far has dealt only with detection of a hidden message and estimation of some of its parameters (e.g., message length and secret key). To our knowledge, so fa...
Aruna Ambalavanan, Rajarathnam Chandramouli
MMSEC
2005
ACM
137views Multimedia» more  MMSEC 2005»
13 years 10 months ago
A fragile watermarking scheme for 3D meshes
In this paper, we propose a new fragile watermarking scheme for 3D meshes. Firstly, the watermark information is adaptively embedded into the mesh geometry by slightly adjusting t...
Hao-Tian Wu, Yiu-ming Cheung
MMSEC
2005
ACM
131views Multimedia» more  MMSEC 2005»
13 years 10 months ago
Capacity of steganographic channels
—This work investigates a central problem in steganography, that is: How much data can safely be hidden without being detected? To answer this question a formal definition of st...
Jeremiah J. Harmsen, William A. Pearlman
MMSEC
2005
ACM
274views Multimedia» more  MMSEC 2005»
13 years 10 months ago
LSB steganalysis based on high-order statistics
We propose a general framework for the detection of the LSB steganography using digital media files as cover objects. The new framework exploits high-order statistics of the samp...
Sorina Dumitrescu, Xiaolin Wu
MMSEC
2005
ACM
210views Multimedia» more  MMSEC 2005»
13 years 10 months ago
Composite signature based watermarking for fingerprint authentication
Digital watermarking is a technology to hide information in digital media. We extend the digital watermarking technique Phasemark™, originally developed solely for image authent...
Farid Ahmed, Ira S. Moskowitz