


default search action
13th MM&Sec 2011: Buffalo, NY, USA
- Chad Heitzenrater, Scott Craver, Jana Dittmann:

Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, MM&Sec '11, Buffalo, New York, USA, September 29-30, 2011. ACM 2011, ISBN 978-1-4503-0806-9
Forensics I
- Mario Hildebrandt, Stefan Kiltz, Ina Grossmann, Claus Vielhauer:

Convergence of digital and traditional forensic disciplines: a first exemplary study for digital dactyloscopy. 1-8 - Wenjun Lu, Min Wu:

Seam carving estimation using forensic hash. 9-14 - Xunyu Pan, Xing Zhang, Siwei Lyu:

Exposing image forgery with blind noise estimation. 15-20
Forensics II
- Changhee Choi

, Jung-Ho Choi, Heung-Kyu Lee:
CFA pattern identification of digital cameras using intermediate value counting. 21-26 - Tobias Kiertscher, Robert Fischer, Claus Vielhauer:

Latent fingerprint detection using a spectral texture feature. 27-32 - Mario Hildebrandt, Stefan Kiltz, Jana Dittmann, Claus Vielhauer:

Malicious fingerprint traces: a proposal for an automated analysis of printed amino acid dots using houghcircles. 33-40
Biometrics
- Ronny Merkel, Anja Bräutigam, Christian Kraetzer, Jana Dittmann, Claus Vielhauer:

Evaluation of binary pixel aging curves of latent fingerprint traces for different surfaces using a chromatic white light (CWL) sensor. 41-50 - Abdul Serwadda, Vir V. Phoha

, Ankunda R. Kiremire:
Using global knowledge of users' typing traits to attack keystroke biometrics templates. 51-60 - Tobias Scheidat, Claus Vielhauer, Robert Fischer:

Comparative study on fusion strategies for biometric handwriting. 61-68
Steganography
- Jan Kodovský, Jessica J. Fridrich, Vojtech Holub:

On dangers of overtraining steganography to incomplete cover model. 69-76 - Qingzhong Liu

:
Steganalysis of DCT-embedding based adaptive steganography and YASS. 77-86 - Enping Li, Scott Craver:

A square-root law for active wardens. 87-92
Protocols
- Christian Kraetzer, Ronny Merkel, Robert Altschaffel, Eric Clausing, Jana Dittmann:

Semi-automated communication protocol security verification for watermarking - pros and cons illustrated on a complex application scenario. 93-102 - Martin Franz, Stefan Katzenbeisser:

Processing encrypted floating point signals. 103-108 - Sanjay Ganesh Kanade, Dijana Petrovska-Delacrétaz

, Bernadette Dorizzi:
Multi-biometrics based crypto-biometric session key generation and sharing protocol. 109-114
Applications
- Kun Qian, Maik Schott, Christian Kraetzer, Matthias L. Hemmje:

Contextualizing security for digital long-term preservation. 115-120 - Junaid Jameel Ahmad, Shujun Li

, Ihab Amer, Marco Mattavelli:
Building multimedia security applications in the MPEG reconfigurable video coding (RVC) framework. 121-130

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














