


default search action
IH&MMSec 2014: Salzburg, Austria
- Andreas Unterweger, Andreas Uhl, Stefan Katzenbeisser, Roland Kwitt, Alessandro Piva:

ACM Information Hiding and Multimedia Security Workshop, IH&MMSec '14, Salzburg, Austria, June 11-13, 2014. ACM 2014, ISBN 978-1-4503-2647-6
Keynote address
- Peter Schelkens:

Image security tools for JPEG standards. 1
Special session on HEVC, H.264, and JPEG security
- Tong Qiao, Cathel Zitzmann, Rémi Cogranne

, Florent Retraint:
Detection of JSteg algorithm using hypothesis testing theory and a statistical model with nuisance parameters. 3-13 - Andreas Unterweger, Andreas Uhl:

Slice groups for post-compression region of interest encryption in SVC. 15-22
Software security
- Sudeep Ghosh, Jason D. Hiser, Jack W. Davidson:

What's the PointiSA? 23-34
Watermarking
- Ioan-Catalin Dragoi

, Dinu Coltuc
, Ion Caciula
:
Gradient based prediction for reversible watermarking by difference expansion. 35-40 - Erwin Quiring

, Pascal Schöttle:
On the combination of randomized thresholds and non-parametric boundaries to protect digital watermarks against sensitivity attacks. 41-48 - Matthieu Urvoy, Florent Autrusseau:

Application of Grubbs' test for outliers to the detection of watermarks. 49-60
Keynote address
- Markus Clabian:

FastPass: automated border control as challenging combination of various security technologies. 61
Forensic and biometric challenges in information hiding and media security
- Kamlesh Tiwari, Phalguni Gupta:

Biometrics based observer free transferable E-cash. 63-70 - Mario Hildebrandt, Jana Dittmann:

From StirNark to StirTrace: benchmarking pattern recognition based printed fingerprint detection. 71-76 - Robert Fischer, Claus Vielhauer:

Digital crime scene analysis: automatic matching of firing pin impressions on cartridge bottoms using 2d and 3d spatial features. 77-82 - Yanzhen Ren, Liming Zhai

, Lina Wang, Tingting Zhu:
Video steganalysis based on subtractive probability of optimal matching feature. 83-90
Steganography
- Weixuan Tang, Haodong Li

, Weiqi Luo
, Jiwu Huang:
Adaptive steganalysis against WOW embedding algorithm. 91-96 - Matthias Carnein, Pascal Schöttle, Rainer Böhme:

Predictable rain?: steganalysis of public-key steganography using wet paper codes. 97-108 - Tomás Pevný

, Andrew D. Ker:
Steganographic key leakage through payload metadata. 109-114 - Hong Zhang

, Yun Cao, Xianfeng Zhao
, Weiming Zhang, Nenghai Yu:
Video steganography with perturbed macroblock partition. 115-122
Fingerprinting
- Thijs Laarhoven

:
Capacities and capacity-achieving decoders for various fingerprinting games. 123-134 - Matthias Schneider, Thomas Schneider

:
Notes on non-interactive secure comparison in "image feature extraction in the encrypted domain with privacy-preserving SIFT". 135-140
Security and privacy technologies for intelligent energy networks
- Márk Jelasity

, Kenneth P. Birman
:
Distributional differential privacy for large-scale smart metering. 141-146 - Günther Eibl

, Dominik Engel
:
Influence of data granularity on nonintrusive appliance load monitoring. 147-151 - Markus Kammerstetter, Lucie Langer, Florian Skopik

, Wolfgang Kastner
:
Architecture-driven smart grid security management. 153-158
Digital forensics
- Hong Zhao, Yifan Chen, Rui Wang, Hafiz Malik

:
Audio source authentication and splicing detection using acoustic environmental signature. 159-164 - Xiaoqing Qiu, Haodong Li

, Weiqi Luo
, Jiwu Huang:
A universal image forensic strategy based on steganalytic model. 165-170 - Chunhui Feng, Zhengquan Xu, Wenting Zhang, Yanyan Xu:

Automatic location of frame deletion point for digital video forensics. 171-179
Security and robustness in biometrics
- Ramachandra Raghavendra

, Christoph Busch:
Robust palmprint verification using sparse representation of binarized statistical features: a comprehensive study. 181-185 - Julien Bringer, Hervé Chabanne

, Mélanie Favre, Alain Patey, Thomas Schneider
, Michael Zohner:
GSHADE: faster privacy-preserving distance computation and biometric identification. 187-198

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














