Sciweavers

Share
SSWMC
2004
9 years 11 months ago
A hybrid scheme for encryption and watermarking
Encryption and watermarking are complementary lines of defense in protecting multimedia content. Recent watermarking techniques have therefore been developed independent from encr...
Xiaowei Xu, Scott D. Dexter, Ahmet M. Eskicioglu
SSWMC
2004
9 years 11 months ago
New attacks on SARI image authentication system
The image authentication system SARI proposed by Lin and Chang passes JPEG compression and rejects other malicious manipulations. Some vulnerabilities of the system have been repo...
Jinhai Wu, Bin B. Zhu, Shipeng Li, Fuzong Lin
SSWMC
2004
9 years 11 months ago
Collusion-resistant multimedia fingerprinting: a unified framework
Digital fingerprints are unique labels inserted in different copies of the same content before distribution. Each digital fingerprint is assigned to an intended recipient, and can...
Min Wu, Wade Trappe, Z. Jane Wang, K. J. Ray Liu
SSWMC
2004
9 years 11 months ago
Steganalysis of block-structured stegotext
We study a detection-theoretic approach to steganalysis. The relative entropy between covertext and stegotext determines the steganalyzer's difficulty in discriminating them,...
Ying Wang, Pierre Moulin
SSWMC
2004
9 years 11 months ago
Hiding correlation-based watermark templates using secret modulation
A possible solution to the difficult problem of geometrical distortion of watermarked images in a blind watermarking scenario is to use a template grid in the autocorrelation func...
Jeroen Lichtenauer, Iwan Setyawan, Reginald L. Lag...
SSWMC
2004
9 years 11 months ago
Security for biometric data
Biometric authentication, i.e. verifying the claimed identity of a person based on physiological characteristics or behavioral traits, has the potential to contribute to both priv...
Claus Vielhauer, Ton Kalker
SSWMC
2004
9 years 11 months ago
The Watermark Evaluation Testbed (WET)
While Digital Watermarking has received much attention in recent years, it is still a relatively young technology. There are few accepted tools/metrics that can be used to evaluat...
Hyung Cook Kim, Hakeem Ogunleye, Oriol Guitart, Ed...
SSWMC
2004
9 years 11 months ago
Biometric verification based on grip-pattern recognition
This paper describes the design, implementation and evaluation of a user-verification system for a smart gun, which is based on grip-pattern recognition. An existing pressure sens...
Raymond N. J. Veldhuis, Asker M. Bazen, Joost A. K...
SSWMC
2004
9 years 11 months ago
Attacks on biometric systems: a case study in fingerprints
In spite of numerous advantages of biometrics-based personal authentication systems over traditional security systems based on token or knowledge, they are vulnerable to attacks t...
Umut Uludag, Anil K. Jain
SSWMC
2004
9 years 11 months ago
Kernel Fisher discriminant for steganalysis of JPEG hiding methods
The use of kernel Fisher discriminants is used to detect the presence of JPEG based hiding methods. The feature vector for the kernel discriminant is constructed from the quantize...
Jeremiah J. Harmsen, William A. Pearlman
books