Sciweavers

SSWMC
2004
13 years 8 months ago
The Watermark Evaluation Testbed (WET)
While Digital Watermarking has received much attention in recent years, it is still a relatively young technology. There are few accepted tools/metrics that can be used to evaluat...
Hyung Cook Kim, Hakeem Ogunleye, Oriol Guitart, Ed...
SSWMC
2004
13 years 8 months ago
Biometric verification based on grip-pattern recognition
This paper describes the design, implementation and evaluation of a user-verification system for a smart gun, which is based on grip-pattern recognition. An existing pressure sens...
Raymond N. J. Veldhuis, Asker M. Bazen, Joost A. K...
SSWMC
2004
13 years 8 months ago
Attacks on biometric systems: a case study in fingerprints
In spite of numerous advantages of biometrics-based personal authentication systems over traditional security systems based on token or knowledge, they are vulnerable to attacks t...
Umut Uludag, Anil K. Jain
SSWMC
2004
13 years 8 months ago
Kernel Fisher discriminant for steganalysis of JPEG hiding methods
The use of kernel Fisher discriminants is used to detect the presence of JPEG based hiding methods. The feature vector for the kernel discriminant is constructed from the quantize...
Jeremiah J. Harmsen, William A. Pearlman
SSWMC
2004
13 years 8 months ago
Fast additive noise steganalysis
This work reduces the computational requirements of the additive noise steganalysis presented by Harmsen and Pearlman. The additive noise model assumes that the stegoimage is crea...
Jeremiah J. Harmsen, Kevin D. Bowers, William A. P...
SSWMC
2004
13 years 8 months ago
Statistical amplitude scale estimation for quantization-based watermarking
Quantization-based watermarking schemes are vulnerable to amplitude scaling. Therefore the scaling factor has to be accounted for either at the encoder, or at the decoder, prior t...
Ivo D. Shterev, Reginald L. Lagendijk, Richard Heu...
SSWMC
2004
13 years 8 months ago
Searching for the stego-key
Steganalysis in the wide sense consists of first identifying suspicious objects and then further analysis during which we try to identify the steganographic scheme used for embedd...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
SSWMC
2004
13 years 8 months ago
Show-through watermarking of duplex printed documents
A technique for watermarking duplex printed pages is presented. The technique produces visible watermark patterns like conventional watermarks embedded in paper fabric. Watermark ...
Gaurav Sharma, Shen-ge Wang
SSWMC
2004
13 years 8 months ago
Lossless data embedding with file size preservation
In lossless watermarking, it is possible to completely remove the embedding distortion from the watermarked image and recover an exact copy of the original unwatermarked image. Lo...
Jessica J. Fridrich, Miroslav Goljan, Qing Chen, V...
SSWMC
2004
13 years 8 months ago
Human perception of geometric distortions in images
We present in this paper the results of our study on the human perception of geometric distortions in images. The ultimate goal of this study is to devise an objective measurement...
Iwan Setyawan, Reginald L. Lagendijk