Sciweavers

MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
14 years 5 months ago
WLAN steganography: a first practical review
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectab...
Christian Krätzer, Jana Dittmann, Andreas Lan...
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
14 years 5 months ago
Digital invisible ink and its applications in steganography
A novel information-hiding methodology denoted as digital invisible ink is introduced. The proposed approach is inspired by the invisible ink in the real world and can be regarded...
Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu
MMSEC
2006
ACM
167views Multimedia» more  MMSEC 2006»
14 years 5 months ago
Hermite polynomials as provably good functions to watermark white gaussian hosts
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the pr...
Teddy Furon
MMSEC
2006
ACM
148views Multimedia» more  MMSEC 2006»
14 years 5 months ago
Minimizing the embedding impact in steganography
In this paper, we study the trade-off in steganography between the number of embedding changes and their amplitude. We assume that each element of the cover image is assigned a sc...
Jessica J. Fridrich
MMSEC
2006
ACM
220views Multimedia» more  MMSEC 2006»
14 years 5 months ago
Robust blind watermarking mechanism for motion data streams
The commercial reuse of 3D motion capture (Mocap) data in animation and life sciences raises issues with respect to its copyright. In order to improvise content protection of Moca...
Parag Agarwal, Ketaki Adi, B. Prabhakaran
MMSEC
2006
ACM
160views Multimedia» more  MMSEC 2006»
14 years 5 months ago
Extraction in software watermarking
The widespread use of the Internet makes software piracy and unauthorized modification easier and more frequent. Among the many techniques developed for protecting software copyr...
William Zhu, Clark D. Thomborson
MMSEC
2006
ACM
102views Multimedia» more  MMSEC 2006»
14 years 5 months ago
Zero-knowledge watermark detector robust to sensitivity attacks
Current zero-knowledge watermark detectors are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of bein...
Juan Ramón Troncoso-Pastoriza, Fernando P&e...
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
14 years 5 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...