default search action
4. MM&Sec 2001: Ottawa, Ontario, Canada
- Nicolas D. Georganas, Radu Popescu-Zeletin:
Proceedings of the 4th workshop on Multimedia & Security: New Challenges, MM&Sec 2001, Ottawa, Ontario, Canada, October 5, 2001. ACM 2001, ISBN 1-58113-393-6
Welcome and introduction to the workshop
- Jana Dittmann, Petra Wohlmacher, Klara Nahrstedt:
Introduction to multimedia and security: protecting the media of the future - securing the future of the media. 1-2
Digital watermarking approaches I
- Nicholas Paul Sheppard, Reihaneh Safavi-Naini, Philip Ogunbona:
On multiple watermarking. 3-6 - Dimitrios Koukopoulos, Yannis C. Stamatiou:
A compressed-domain watermarking algorithm for mpeg audio layer 3. 7-10 - Trista Pei-Chun Chen, Tsuhan Chen:
A framework for optimal blind watermark detection. 11-14
Digital watermarking approaches II
- M. A. Suhail, M. M. Dawoud:
Watermarking security enhancement using filter parametrization in feature domain. 15-18 - Hwan Il Kang, Kab Il Kim, Seung-Soo Han:
Watermarking techniques using the Drawing Exchange Format (DXF) file. 19-22 - Chih-Hsuan Tzeng, Wen-Hsiang Tsai:
A new technique for authentication of image/video for multimedia applications. 23-26
Steganographical approaches
- Jessica J. Fridrich, Miroslav Goljan, Rui Du:
Reliable detection of LSB steganography in color and grayscale images. 27-30 - Veena Sridhar, Xiaobo Li, Mario A. Nascimento:
Towards robust hidden watermarking using multiple quasi-circles. 31-35 - Klaus Hansen, Christian Hammer, Lars R. Randleff, Jens Damgaard Andersen:
Steganographic capacity of images, based on image equivalence classes. 36-39
Applications I
- Jörg Schwenk, Tobias Martin, Erik Neumann:
From pay-tv to pay-streaming: similarities and differences. 40-43 - Jana Dittmann, Martin Steinebach:
PlataJanus: an audio annotation watermarking framework. 44-47 - Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle:
Secure fingerprint-based authentication for Lotus Notes®. 48-51 - Sofia K. Tzelepi, Dimitrios K. Koukopoulos, George Pangalos:
A flexible content and context-based access control model for multimedia medical image database systems. 52-55
Applications II
- Rüdiger Grimm:
Security requirements for internet voting. 56-59 - Matthias Hollick:
Security awareness in service discovery for multimedia collaboration. 60-63 - J. R. Nickerson, S. T. Chow, H. J. Johnson:
Tamper resistant software: extending trust into a hostile environment. 64-67
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.