Sciweavers

15 search results - page 2 / 3
» mmsec 2004
Sort
View
MMSEC
2004
ACM
121views Multimedia» more  MMSEC 2004»
14 years 26 days ago
Counteracting Oracle attacks
In the paper, we address oracle attacks for integrity watermarking in a communication setting. We show how an integrity verification algorithm can be modified in order to counte...
Ilaria Venturini
MMSEC
2004
ACM
133views Multimedia» more  MMSEC 2004»
14 years 26 days ago
Data hiding on 3D polygonal meshes
This paper presents a high-capacity method to embed information into the geometry of a 3D polygonal mesh. The method extends a previously reported work, to which several improveme...
Yannick Maret, Touradj Ebrahimi
MMSEC
2004
ACM
145views Multimedia» more  MMSEC 2004»
14 years 26 days ago
Improving LSB steganalysis using marginal and joint probabilistic distributions
The goal of steganalysis is to search for the presence of hidden information in numerical contents. This paper is based on a previous LSB steganalysis scheme for digital images th...
Benoit Roue, Patrick Bas, Jean-Marc Chassery
MMSEC
2004
ACM
209views Multimedia» more  MMSEC 2004»
14 years 26 days ago
Robust DWT-SVD domain image watermarking: embedding data in all frequencies
Protection of digital multimedia content has become an increasingly important issue for content owners and service providers. As watermarking is identified as a major technology t...
Emir Ganic, Ahmet M. Eskicioglu
MMSEC
2004
ACM
126views Multimedia» more  MMSEC 2004»
14 years 26 days ago
Key-dependency for a wavelet-based blind watermarking algorithm
When a host image is watermarked multiple times by the same algorithm collisions can occur. This makes it difficult for an image to host multiple watermarks. But this hosting is n...
Michael Brachtl, Andreas Uhl, Werner Dietl