Sciweavers

SSWMC
2004
13 years 8 months ago
On estimation of secret message length in LSB steganography in spatial domain
In this paper, we present a new method for estimating the secret message length of bit-streams embedded using the Least Significant Bit embedding (LSB) at random pixel positions. ...
Jessica J. Fridrich, Miroslav Goljan
SSWMC
2004
13 years 8 months ago
Image watermarking based on scale-space representation
This paper proposes a novel method for content-based watermarking based on feature points of an image. At each feature point, watermark is embedded after affine normalization acco...
Jin S. Seo, Chang D. Yoo
SSWMC
2004
13 years 8 months ago
Towards fraud-proof ID documents using multiple data hiding technologies and biometrics
Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric ...
Justin Picard, Claus Vielhauer, Niels J. Thorwirth
SSWMC
2004
13 years 8 months ago
Advanced audio watermarking benchmarking
Digital watermarking is envisaged as a potential technology for copyright protection and manipulation recognition. A key issue in the usage of robust watermarking is the evaluatio...
Jana Dittmann, Martin Steinebach, Andreas Lang, Sa...
SSWMC
2004
13 years 8 months ago
Multimedia document authentication using on-line signatures as watermarks
Authentication of digital documents is an important concern as digital documents are replacing the traditional paper-based documents for official and legal purposes. This is espec...
Anoop M. Namboodiri, Anil K. Jain
SSWMC
2004
13 years 8 months ago
On the complexity and hardness of the steganography embedding problem
We analyze the complexity of the steganography problem and show that the decision version of the problem is NP-complete through transformation from the Knapsack problem. We also g...
Rajarathnam Chandramouli, Shalin P. Trivedi, R. N....
SSWMC
2004
13 years 8 months ago
Universal image steganalysis using rate-distortion curves
The goal of image steganography is to embed information in a cover image using modifications that are undetectable. In actual practice, however, most techniques produce stego imag...
Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp
SSWMC
2004
13 years 8 months ago
Signature-embedding in printed documents for security and forensic applications
Despite the increase in email and other forms of digital communication, the use of printed documents continues to increase every year. Many types of printed documents need to be &...
Aravind K. Mikkilineni, Gazi N. Ali, Pei-Ju Chiang...
SSWMC
2004
13 years 8 months ago
Steganalysis using color wavelet statistics and one-class support vector machines
Steganographic messages can be embedded into digital images in ways that are imperceptible to the human eye. These messages, however, alter the underlying statistics of an image. ...
Siwei Lyu, Hany Farid
SSWMC
2004
13 years 8 months ago
An informed synchronization scheme for audio data hiding
This paper deals with the problem of synchronization in the particular case of audio data hiding. In this kind of application the goal is to increase the information of an audio d...
Alejandro LoboGuerrero, Patrick Bas, Joel Lienard