default search action
IH&MMSec 2014: Salzburg, Austria
- Andreas Unterweger, Andreas Uhl, Stefan Katzenbeisser, Roland Kwitt, Alessandro Piva:
ACM Information Hiding and Multimedia Security Workshop, IH&MMSec '14, Salzburg, Austria, June 11-13, 2014. ACM 2014, ISBN 978-1-4503-2647-6
Keynote address
- Peter Schelkens:
Image security tools for JPEG standards. 1
Special session on HEVC, H.264, and JPEG security
- Tong Qiao, Cathel Zitzmann, Rémi Cogranne, Florent Retraint:
Detection of JSteg algorithm using hypothesis testing theory and a statistical model with nuisance parameters. 3-13 - Andreas Unterweger, Andreas Uhl:
Slice groups for post-compression region of interest encryption in SVC. 15-22
Software security
- Sudeep Ghosh, Jason D. Hiser, Jack W. Davidson:
What's the PointiSA? 23-34
Watermarking
- Ioan-Catalin Dragoi, Dinu Coltuc, Ion Caciula:
Gradient based prediction for reversible watermarking by difference expansion. 35-40 - Erwin Quiring, Pascal Schöttle:
On the combination of randomized thresholds and non-parametric boundaries to protect digital watermarks against sensitivity attacks. 41-48 - Matthieu Urvoy, Florent Autrusseau:
Application of Grubbs' test for outliers to the detection of watermarks. 49-60
Keynote address
- Markus Clabian:
FastPass: automated border control as challenging combination of various security technologies. 61
Forensic and biometric challenges in information hiding and media security
- Kamlesh Tiwari, Phalguni Gupta:
Biometrics based observer free transferable E-cash. 63-70 - Mario Hildebrandt, Jana Dittmann:
From StirNark to StirTrace: benchmarking pattern recognition based printed fingerprint detection. 71-76 - Robert Fischer, Claus Vielhauer:
Digital crime scene analysis: automatic matching of firing pin impressions on cartridge bottoms using 2d and 3d spatial features. 77-82 - Yanzhen Ren, Liming Zhai, Lina Wang, Tingting Zhu:
Video steganalysis based on subtractive probability of optimal matching feature. 83-90
Steganography
- Weixuan Tang, Haodong Li, Weiqi Luo, Jiwu Huang:
Adaptive steganalysis against WOW embedding algorithm. 91-96 - Matthias Carnein, Pascal Schöttle, Rainer Böhme:
Predictable rain?: steganalysis of public-key steganography using wet paper codes. 97-108 - Tomás Pevný, Andrew D. Ker:
Steganographic key leakage through payload metadata. 109-114 - Hong Zhang, Yun Cao, Xianfeng Zhao, Weiming Zhang, Nenghai Yu:
Video steganography with perturbed macroblock partition. 115-122
Fingerprinting
- Thijs Laarhoven:
Capacities and capacity-achieving decoders for various fingerprinting games. 123-134 - Matthias Schneider, Thomas Schneider:
Notes on non-interactive secure comparison in "image feature extraction in the encrypted domain with privacy-preserving SIFT". 135-140
Security and privacy technologies for intelligent energy networks
- Márk Jelasity, Kenneth P. Birman:
Distributional differential privacy for large-scale smart metering. 141-146 - Günther Eibl, Dominik Engel:
Influence of data granularity on nonintrusive appliance load monitoring. 147-151 - Markus Kammerstetter, Lucie Langer, Florian Skopik, Wolfgang Kastner:
Architecture-driven smart grid security management. 153-158
Digital forensics
- Hong Zhao, Yifan Chen, Rui Wang, Hafiz Malik:
Audio source authentication and splicing detection using acoustic environmental signature. 159-164 - Xiaoqing Qiu, Haodong Li, Weiqi Luo, Jiwu Huang:
A universal image forensic strategy based on steganalytic model. 165-170 - Chunhui Feng, Zhengquan Xu, Wenting Zhang, Yanyan Xu:
Automatic location of frame deletion point for digital video forensics. 171-179
Security and robustness in biometrics
- Ramachandra Raghavendra, Christoph Busch:
Robust palmprint verification using sparse representation of binarized statistical features: a comprehensive study. 181-185 - Julien Bringer, Hervé Chabanne, Mélanie Favre, Alain Patey, Thomas Schneider, Michael Zohner:
GSHADE: faster privacy-preserving distance computation and biometric identification. 187-198
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.