Sciweavers

SSWMC
2004
13 years 6 months ago
Fast additive noise steganalysis
This work reduces the computational requirements of the additive noise steganalysis presented by Harmsen and Pearlman. The additive noise model assumes that the stegoimage is crea...
Jeremiah J. Harmsen, Kevin D. Bowers, William A. P...
SSWMC
2004
13 years 6 months ago
Statistical amplitude scale estimation for quantization-based watermarking
Quantization-based watermarking schemes are vulnerable to amplitude scaling. Therefore the scaling factor has to be accounted for either at the encoder, or at the decoder, prior t...
Ivo D. Shterev, Reginald L. Lagendijk, Richard Heu...
SSWMC
2004
13 years 6 months ago
Searching for the stego-key
Steganalysis in the wide sense consists of first identifying suspicious objects and then further analysis during which we try to identify the steganographic scheme used for embedd...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
SSWMC
2004
13 years 6 months ago
Show-through watermarking of duplex printed documents
A technique for watermarking duplex printed pages is presented. The technique produces visible watermark patterns like conventional watermarks embedded in paper fabric. Watermark ...
Gaurav Sharma, Shen-ge Wang
SSWMC
2004
13 years 6 months ago
Lossless data embedding with file size preservation
In lossless watermarking, it is possible to completely remove the embedding distortion from the watermarked image and recover an exact copy of the original unwatermarked image. Lo...
Jessica J. Fridrich, Miroslav Goljan, Qing Chen, V...
SSWMC
2004
13 years 6 months ago
Human perception of geometric distortions in images
We present in this paper the results of our study on the human perception of geometric distortions in images. The ultimate goal of this study is to devise an objective measurement...
Iwan Setyawan, Reginald L. Lagendijk
SSWMC
2004
13 years 6 months ago
On estimation of secret message length in LSB steganography in spatial domain
In this paper, we present a new method for estimating the secret message length of bit-streams embedded using the Least Significant Bit embedding (LSB) at random pixel positions. ...
Jessica J. Fridrich, Miroslav Goljan
SSWMC
2004
13 years 6 months ago
Image watermarking based on scale-space representation
This paper proposes a novel method for content-based watermarking based on feature points of an image. At each feature point, watermark is embedded after affine normalization acco...
Jin S. Seo, Chang D. Yoo
SSWMC
2004
13 years 6 months ago
Towards fraud-proof ID documents using multiple data hiding technologies and biometrics
Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric ...
Justin Picard, Claus Vielhauer, Niels J. Thorwirth
SSWMC
2004
13 years 6 months ago
Advanced audio watermarking benchmarking
Digital watermarking is envisaged as a potential technology for copyright protection and manipulation recognition. A key issue in the usage of robust watermarking is the evaluatio...
Jana Dittmann, Martin Steinebach, Andreas Lang, Sa...