Sciweavers

TIFS
2016
58views more  TIFS 2016»
10 years 14 days ago
Content-Adaptive Steganography by Minimizing Statistical Detectability
Abstract—Most current steganographic schemes embed the secret payload by minimizing a heuristically defined distortion. Similarly, their security is evaluated empirically using ...
Vahid Sedighi, Rémi Cogranne, Jessica J. Fr...
TIFS
2016
70views more  TIFS 2016»
10 years 14 days ago
Game Theory and Adaptive Steganography
—According to conventional wisdom, content-adaptive embedding offers more steganographic security than random uniform embedding. We scrutinize this view and note that it is barel...
Pascal Schöttle, Rainer Böhme
TIFS
2016
75views more  TIFS 2016»
10 years 14 days ago
What Else Does Your Biometric Data Reveal? A Survey on Soft Biometrics
—Recent research has explored the possibility of extracting ancillary information from primary biometric traits, viz., face, fingerprints, hand geometry and iris. This ancillary...
Antitza Dantcheva, Petros Elia, Arun Ross
TIFS
2016
246views more  TIFS 2016»
10 years 14 days ago
Fast Detection of Transformed Data Leaks
—The leak of sensitive data on computer systems poses a serious threat to organizational security. Statistics show that the lack of proper encryption on files and communications...
Xiaokui Shu, Jing Zhang, Danfeng (Daphne) Yao, Wu-...
TIFS
2016
67views more  TIFS 2016»
10 years 14 days ago
Information Theoretical Limit of Media Forensics: The Forensicability
—While more and more forensic techniques have been proposed to detect the processing history of multimedia content, one starts to wonder if there exists a fundamental limit on th...
Xiaoyu Chu, Yan Chen, Matthew C. Stamm, K. J. Ray ...