Sciweavers

262 search results - page 48 / 53
» DWT-DCT-SVD based watermarking
Sort
View
CVPR
2010
IEEE
15 years 5 months ago
Learning from Interpolated Images using Neural Networks for Digital Forensics
Interpolated images have data redundancy, and special correlation exists among neighboring pixels, which is a crucial clue in digital forensics. We design a neural network based f...
Yizhen Huang, Na Fan
ICC
2009
IEEE
135views Communications» more  ICC 2009»
15 years 4 months ago
Tracing Stateful Pirate Decoders
Abstract— Most traitor tracing schemes in the literature assume that pirate decoders are stateless. This stateless assumption, however, is unrealistic especially in case of hardw...
Yongdong Wu, Feng Bao, Ying Qiu
IH
2007
Springer
15 years 3 months ago
Exploiting Security Holes in Lattice Data Hiding
Abstract. This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works. The security is quantiï¬...
Luis Pérez-Freire, Fernando Pérez-Go...
SADFE
2005
IEEE
15 years 3 months ago
Detecting Digital Tampering by Blur Estimation
With powerful computer and mighty software, seasoned users could turn digital media into what they want. The detection of digital tampering has become a crucial problem. In most o...
Dun-Yu Hsiao, Soo-Chang Pei
ISW
2000
Springer
15 years 1 months ago
Towards a Practical Secure Framework for Mobile Code Commerce
Securing the mobile code commerce is not an easy task at all. We propose in this paper a framework to tackle this problem. In a first step, we analyse the general issues that must ...
Gaël Hachez, Laurent Den Hollander, Mehrdad J...