Academic Journals Database
Disseminating quality controlled scientific knowledge

EURASIP Journal on Information Security

ISSN: 1687--4161
Publisher: Hindawi Publishing Corporation


ADD TO MY LIST
 
Hierarchical Spread Spectrum Fingerprinting Scheme Based on the CDMA Technique

Author(s): Kuribayashi Minoru
Volume: 2011
Issue: 1
Year: 2011
Novel Attacks on Spread-Spectrum Fingerprinting

Author(s): Schaathun HansGeorg
Volume: 2008
Issue: 1
Year: 2008
Experimental Assessment of the Reliability for Watermarking and Fingerprinting Schemes

Author(s): Cérou Frédéric | Furon Teddy | Guyader Arnaud
Volume: 2008
Issue: 1
Year: 2008
Stochastic Image Warping for Improved Watermark Desynchronization

Author(s): D'Angelo Angela | Barni Mauro | Merhav Neri
Volume: 2008
Issue: 1
Year: 2008
Markov Modelling of Fingerprinting Systems for Collision Analysis

Author(s): Hurley NeilJ | Balado Félix | Silvestre GuénoléCM
Volume: 2008
Issue: 1
Year: 2008
Design and Analysis of the First BOWS Contest

Author(s): Piva A | Barni M
Volume: 2007
Issue: 1
Year: 2007
Broken Arrows

Author(s): Furon Teddy | Bas Patrick
Volume: 2008
Issue: 1
Year: 2008
Overview on Selective Encryption of Image and Video: Challenges and Perspectives

Author(s): Massoudi A | Lefebvre F | De Vleeschouwer C | Macq B | Quisquater J-J
Volume: 2008
Issue: 1
Year: 2008
A survey on biometric cryptosystems and cancelable biometrics

Author(s): Rathgeb Christian | Uhl Andreas
Volume: 2011
Issue: 1
Year: 2011
Reliable Steganalysis Using a Minimum Set of Samples and Features

Author(s): Miche Yoan | Bas Patrick | Lendasse Amaury | Jutten Christian | Simula Olli
Volume: 2009
Issue: 1
Year: 2009
An Efficient Watermarking Technique for the Protection of Fingerprint Images

Author(s): Zebbiche K | Khelifi F | Bouridane A
Volume: 2008
Issue: 1
Year: 2008
Key-Dependent JPEG2000-Based Robust Hashing for Secure Image Authentication

Author(s): Laimer Gerold | Uhl Andreas
Volume: 2008
Issue: 1
Year: 2008
Binary Biometric Representation through Pairwise Adaptive Phase Quantization

Author(s): Chen Chun | Veldhuis Raymond
Volume: 2011
Issue: 1
Year: 2011
Research of Spatial Domain Image Digital Watermarking Payload

Author(s): Jia-Fa Mao | Ru Zhang | Xin-Xin Niu | Yi-Xian Yang | Lin-Na Zhou
Volume: 2011
Issue: 1
Year: 2011
Intrusion detection model based on selective packet sampling

Author(s): Bakhoum Ezzat
Volume: 2011
Issue: 1
Year: 2011
Video-Object Oriented Biometrics Hiding for User Authentication under Error-Prone Transmissions

Author(s): Ntalianis Klimis | Tsapatsoulis Nicolas | Drigas Athanasios
Volume: 2011
Issue: 1
Year: 2011
Secure Steganography in Multimedia Content

Author(s): Goljan Miroslav | Westfeld Andreas
Volume: 2009
Issue: 1
Year: 2009
Video Data Hiding for Managing Privacy Information in Surveillance Systems

Author(s): Paruchuri JithendraK | Cheung Sen-chingS | Hail MichaelW
Volume: 2009
Issue: 1
Year: 2009
Improving the Security of CardSpace

Author(s): Alrodhan WaleedA | Mitchell ChrisJ
Volume: 2009
Issue: 1
Year: 2009
Logistic Map-Based Fragile Watermarking for Pixel Level Tamper Detection and Resistance

Author(s): Suthaharan Shan
Volume: 2010
Issue: 1
Year: 2010
A Simple Scheme for Constructing Fault-Tolerant Passwords from Biometric Data

Author(s): Balakirsky VladimirB | Vinck AJHan
Volume: 2010
Issue: 1
Year: 2010
On the Implementation of Spread Spectrum Fingerprinting in Asymmetric Cryptographic Protocol

Author(s): Kuribayashi Minoru
Volume: 2010
Issue: 1
Year: 2010
Secure Arithmetic Coding with Error Detection Capability

Author(s): Sinaie Mahnaz | Vakili VahidTabataba
Volume: 2010
Issue: 1
Year: 2010
GUC100 Multisensor Fingerprint Database for In-House (Semipublic) Performance Test

Author(s): Gafurov Davrondzhon | Bours Patrick | Yang Bian | Busch Christoph
Volume: 2010
Issue: 1
Year: 2010
Reversible Watermarking Techniques: An Overview and a Classification

Author(s): Caldelli Roberto | Filippini Francesco | Becarelli Rudy
Volume: 2010
Issue: 1
Year: 2010
High-Rate Data-Hiding Robust to Linear Filtering for Colored Hosts

Author(s): Scagliola Michele | Pérez-González Fernando | Guccione Pietro
Volume: 2009
Issue: 1
Year: 2009
Anonymous Biometric Access Control

Author(s): Ye Shuiming | Luo Ying | Zhao Jian | Cheung Sen-ChingS
Volume: 2009
Issue: 1
Year: 2009
An Extended Image Hashing Concept: Content-Based Fingerprinting Using FJLT

Author(s): Lv Xudong | Wang ZJane
Volume: 2009
Issue: 1
Year: 2009
One-Time Key Based Phase Scrambling for Phase-Only Correlation between Visually Protected Images

Author(s): Ito Izumi | Kiya Hitoshi
Volume: 2009
Issue: 1
Year: 2009
Encrypted Domain DCT Based on Homomorphic Cryptosystems

Author(s): Bianchi Tiziano | Piva Alessandro | Barni Mauro
Volume: 2009
Issue: 1
Year: 2009
Enhancing Privacy Protection in Multimedia Systems

Author(s): Cheung Sen-chingSamson | Kundur Deepa | Senior Andrew
Volume: 2009
Issue: 1
Year: 2009
A Novel Image Data Hiding Scheme with Diamond Encoding

Author(s): Chao Ruey-Ming | Wu Hsien-Chu | Lee Chih-Chiang | Chu Yen-Ping
Volume: 2009
Issue: 1
Year: 2009
Compression Independent Reversible Encryption for Privacy in Video Surveillance

Author(s): Carrillo Paula | Kalva Hari | Magliveras Spyros
Volume: 2009
Issue: 1
Year: 2009
Peak-Shaped-Based Steganographic Technique for JPEG Images

Author(s): Rossi Lorenzo | Garzia Fabio | Cusani Roberto
Volume: 2009
Issue: 1
Year: 2009
Steganography in 3D Geometries and Images by Adjacent Bin Mapping

Author(s): Wu Hao-Tian | Dugelay Jean-Luc
Volume: 2009
Issue: 1
Year: 2009
Recoverable Privacy Protection for Video Content Distribution

Author(s): Li Guangzhen | Ito Yoshimichi | Yu Xiaoyi | Nitta Naoko | Babaguchi Noboru
Volume: 2009
Issue: 1
Year: 2009
How Reed-Solomon Codes Can Improve Steganographic Schemes

Author(s): Fontaine Caroline | Galand Fabien
Volume: 2009
Issue: 1
Year: 2009
Joint Encryption and Compression of Correlated Sources with Side Information

Author(s): Haleem MA | Subbalakshmi KP | Chandramouli R
Volume: 2007
Issue: 1
Year: 2007
Format-Compliant JPEG2000 Encryption in JPSEC: Security, Applicability, and the Impact of Compression Parameters

Author(s): Engel Dominik | Stütz Thomas | Uhl Andreas
Volume: 2007
Issue: 1
Year: 2007
Signal Processing in the Encrypted Domain

Author(s): Piva Alessandro | Katzenbeisser Stefan
Volume: 2007
Issue: 1
Year: 2007
Joint Source, Channel Coding, and Secrecy

Author(s): Magli Enrico | Grangetto Marco | Olmo Gabriella
Volume: 2007
Issue: 1
Year: 2007
Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing

Author(s): Erkin Zekeriya | Piva Alessandro | Katzenbeisser Stefan | Lagendijk RL | Shokrollahi Jamshid | Neven Gregory | Barni Mauro
Volume: 2007
Issue: 1
Year: 2007
Audio Watermarking through Deterministic plus Stochastic Signal Decomposition

Author(s): Liu Yi-Wen | Smith JuliusO
Volume: 2007
Issue: 1
Year: 2007
A Workbench for the BOWS Contest

Author(s): Westfeld Andreas
Volume: 2007
Issue: 1
Year: 2007
Efficient and Syntax-Compliant JPEG 2000 Encryption Preserving Original Fine Granularity of Scalability

Author(s): Yang Yang | Zhu BinB | Li Shipeng | Yu Nenghai
Volume: 2007
Issue: 1
Year: 2007
Digital Video Encryption Algorithms Based on Correlation-Preserving Permutations

Author(s): Socek Daniel | Magliveras Spyros | Ćulibrk Dubravko | Marques Oge | Kalva Hari | Furht Borko
Volume: 2007
Issue: 1
Year: 2007
Secure Multiparty Computation between Distrusted Networks Terminals

Author(s): Cheung S-CS | Nguyen Thinh
Volume: 2007
Issue: 1
Year: 2007
Transmission Error and Compression Robustness of 2D Chaotic Map Image Encryption Schemes

Author(s): Gschwandtner Michael | Uhl Andreas | Wild Peter
Volume: 2007
Issue: 1
Year: 2007
Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks

Author(s): Troncoso-Pastoriza JuanRamón | Pérez-González Fernando
Volume: 2007
Issue: 1
Year: 2007
Reverse-Engineering a Watermark Detector Using an Oracle

Author(s): Craver Scott | Atakli Idris | Yu Jun
Volume: 2007
Issue: 1
Year: 2007
Oblivious Neural Network Computing via Homomorphic Encryption

Author(s): Orlandi C | Piva A | Barni M
Volume: 2007
Issue: 1
Year: 2007
Multimedia Encryption with Joint Randomized Entropy Coding and Rotation in Partitioned Bitstream

Author(s): Xie Dahua | Kuo C-CJay
Volume: 2007
Issue: 1
Year: 2007
An Efficient Objective Intelligibility Measure for Frequency Domain Scramblers

Author(s): Borzino AMCR | Apolinário JA | da Silva DG
Volume: 2007
Issue: 1
Year: 2007
Anonymous Fingerprinting with Robust QIM Watermarking Techniques

Author(s): Prins JP | Erkin Z | Lagendijk RL
Volume: 2007
Issue: 1
Year: 2007
Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks

Author(s): Comesaña Pedro | Pérez-González Fernando
Volume: 2007
Issue: 1
Year: 2007
A Survey of Homomorphic Encryption for Nonspecialists

Author(s): Fontaine Caroline | Galand Fabien
Volume: 2007
Issue: 1
Year: 2007
2DPCA fractal features and genetic algorithm for efficient face representation and recognition

Author(s): Ben Jemaa Yousra | Derbel Ahmed | Ben Jmaa Ahmed
Volume: 2011
Issue: 1
Year: 2011
Design and Evaluation of a Pressure-Based Typing Biometric Authentication System

Author(s): Eltahir WasilElsadig | Salami MJE | Ismail AhmadFaris | Lai WengKin
Volume: 2008
Issue: 1
Year: 2008
Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing

Author(s): Zekeriya Erkin | Alessandro Piva | Stefan Katzenbeisser | R. L. Lagendijk | Jamshid Shokrollahi | Gregory Neven | Mauro Barni
Volume: 2007
Year: 2008
Stochastic Image Warping for Improved Watermark Desynchronization

Author(s): Angela D'Angelo | Mauro Barni | Neri Merhav
Volume: 2008
Year: 2008
Markov Modelling of Fingerprinting Systems for Collision Analysis

Author(s): Neil J. Hurley | Félix Balado | Guénolé C. M. Silvestre
Volume: 2008
Year: 2008
Joint Encryption and Compression of Correlated Sources with Side Information

Author(s): M. A. Haleem | K. P. Subbalakshmi | R. Chandramouli
Volume: 2007
Year: 2008
Efficient and Syntax-Compliant JPEG 2000 Encryption Preserving Original Fine Granularity of Scalability

Author(s): Yang Yang | Bin B. Zhu | Shipeng Li | Nenghai Yu
Volume: 2007
Year: 2008
Format-Compliant JPEG2000 Encryption in JPSEC: Security, Applicability, and the Impact of Compression Parameters

Author(s): Dominik Engel | Thomas Stütz | Andreas Uhl
Volume: 2007
Year: 2008
Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks

Author(s): Juan Ramón Troncoso-Pastoriza | Fernando Pérez-González
Volume: 2007
Year: 2008
Anonymous Fingerprinting with Robust QIM Watermarking Techniques

Author(s): J. P. Prins | Z. Erkin | R. L. Lagendijk
Volume: 2007
Year: 2007
Audio Watermarking through Deterministic plus Stochastic Signal Decomposition

Author(s): Yi-Wen Liu | Julius O. Smith
Volume: 2007
Year: 2007
Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks

Author(s): Pedro Comesaña | Fernando Pérez-González
Volume: 2007
Year: 2007
A Workbench for the BOWS Contest

Author(s): Andreas Westfeld
Volume: 2007
Year: 2008
Transmission Error and Compression Robustness of 2D Chaotic Map Image Encryption Schemes

Author(s): Michael Gschwandtner | Andreas Uhl | Peter Wild
Volume: 2007
Year: 2007
Oblivious Neural Network Computing via Homomorphic Encryption

Author(s): C. Orlandi | A. Piva | M. Barni
Volume: 2007
Year: 2007
Design and Analysis of the First BOWS Contest

Author(s): A. Piva | M. Barni
Volume: 2007
Year: 2007
Recoverable Privacy Protection for Video Content Distribution

Author(s): Guangzhen Li | Yoshimichi Ito | Xiaoyi Yu | Naoko Nitta | Noboru Babaguchi
Volume: 2009
Year: 2009
Anonymous Biometric Access Control

Author(s): Shuiming Ye | Ying Luo | Jian Zhao | Sen-Ching S. Cheung
Volume: 2009
Year: 2009
Encrypted Domain DCT Based on Homomorphic Cryptosystems

Author(s): Tiziano Bianchi | Alessandro Piva | Mauro Barni
Volume: 2009
Year: 2009
High-Rate Data-Hiding Robust to Linear Filtering for Colored Hosts

Author(s): Michele Scagliola | Fernando Pérez-González | Pietro Guccione
Volume: 2009
Year: 2009
An Extended Image Hashing Concept: Content-Based Fingerprinting Using FJLT

Author(s): Xudong Lv | Z. Jane Wang
Volume: 2009
Year: 2009
Video Data Hiding for Managing Privacy Information in Surveillance Systems

Author(s): Jithendra K. Paruchuri | Sen-ching S. Cheung | Michael W. Hail
Volume: 2009
Year: 2009
Reliable Steganalysis Using a Minimum Set of Samples and Features

Author(s): Yoan Miche | Patrick Bas | Amaury Lendasse | Christian Jutten | Olli Simula
Volume: 2009
Year: 2009
A Novel Image Data Hiding Scheme with Diamond Encoding

Author(s): Ruey-Ming Chao | Hsien-Chu Wu | Chih-Chiang Lee | Yen-Ping Chu
Volume: 2009
Year: 2009
Steganography in 3D Geometries and Images by Adjacent Bin Mapping

Author(s): Hao-Tian Wu | Jean-Luc Dugelay
Volume: 2009
Year: 2009
Overview on Selective Encryption of Image and Video: Challenges and Perspectives

Author(s): A. Massoudi | F. Lefebvre | C. De Vleeschouwer | B. Macq | J.-J. Quisquater
Volume: 2008
Year: 2009
Broken Arrows

Author(s): Teddy Furon | Patrick Bas
Volume: 2008
Year: 2008
Binary Biometric Representation through Pairwise Adaptive Phase Quantization

Author(s): Chun Chen | Raymond Veldhuis
Volume: 2011
Year: 2011
Hierarchical Spread Spectrum Fingerprinting Scheme Based on the CDMA Technique

Author(s): Minoru Kuribayashi
Volume: 2011
Year: 2011
Research of Spatial Domain Image Digital Watermarking Payload

Author(s): Mao Jia-Fa | Zhang Ru | Niu Xin-Xin | Yang Yi-Xian | Zhou Lin-Na
Volume: 2011
Year: 2011
Video-Object Oriented Biometrics Hiding for User Authentication under Error-Prone Transmissions

Author(s): Klimis Ntalianis | Nicolas Tsapatsoulis | Athanasios Drigas
Volume: 2011
Year: 2011
A Simple Scheme for Constructing Fault-Tolerant Passwords from Biometric Data

Author(s): Vladimir B. Balakirsky | A. J. Han Vinck
Volume: 2010
Year: 2010
Secure Arithmetic Coding with Error Detection Capability

Author(s): Mahnaz Sinaie | Vahid Tabataba Vakili
Volume: 2010
Year: 2010
GUC100 Multisensor Fingerprint Database for In-House (Semipublic) Performance Test

Author(s): Davrondzhon Gafurov | Patrick Bours | Bian Yang | Christoph Busch
Volume: 2010
Year: 2010
Reversible Watermarking Techniques: An Overview and a Classification

Author(s): Roberto Caldelli | Francesco Filippini | Rudy Becarelli
Volume: 2010
Year: 2010
Experimental Assessment of the Reliability for Watermarking and Fingerprinting Schemes

Author(s): Frédéric Cérou | Teddy Furon | Arnaud Guyader
Volume: 2008
Year: 2009
How Reed-Solomon Codes Can Improve Steganographic Schemes

Author(s): Caroline Fontaine | Fabien Galand
Volume: 2009
Year: 2009
Novel Attacks on Spread-Spectrum Fingerprinting

Author(s): Hans Georg Schaathun
Volume: 2008
Year: 2008
Key-Dependent JPEG2000-Based Robust Hashing for Secure Image Authentication

Author(s): Gerold Laimer | Andreas Uhl
Volume: 2008
Year: 2008
Secure Multiparty Computation between Distrusted Networks Terminals

Author(s): S.-C. S. Cheung | Thinh Nguyen
Volume: 2007
Year: 2007
Reverse-Engineering a Watermark Detector Using an Oracle

Author(s): Scott Craver | Idris Atakli | Jun Yu
Volume: 2007
Year: 2007
Joint Source, Channel Coding, and Secrecy

Author(s): Enrico Magli | Marco Grangetto | Gabriella Olmo
Volume: 2007
Year: 2007
Digital Video Encryption Algorithms Based on Correlation-Preserving Permutations

Author(s): Daniel Socek | Spyros Magliveras | Dubravko Ćulibrk | Oge Marques | Hari Kalva | Borko Furht
Volume: 2007
Year: 2007
Compression Independent Reversible Encryption for Privacy in Video Surveillance

Author(s): Paula Carrillo | Hari Kalva | Spyros Magliveras
Volume: 2009
Year: 2009
Peak-Shaped-Based Steganographic Technique for JPEG Images

Author(s): Lorenzo Rossi | Fabio Garzia | Roberto Cusani
Volume: 2009
Year: 2009
Improving the Security of CardSpace

Author(s): Waleed A. Alrodhan | Chris J. Mitchell
Volume: 2009
Year: 2009
Enhancing Privacy Protection in Multimedia Systems

Author(s): Sen-ching Samson Cheung | Deepa Kundur | Andrew Senior
Volume: 2009
Year: 2009
Secure Steganography in Multimedia Content

Author(s): Miroslav Goljan | Andreas Westfeld
Volume: 2009
Year: 2009
Signal Processing in the Encrypted Domain

Author(s): Alessandro Piva | Stefan Katzenbeisser
Volume: 2007
Year: 2008
A Survey of Homomorphic Encryption for Nonspecialists

Author(s): Caroline Fontaine | Fabien Galand
Volume: 2007
Year: 2007
An Efficient Objective Intelligibility Measure for Frequency Domain Scramblers

Author(s): A. M. C. R. Borzino | J. A. Apolinário | D. G. da Silva
Volume: 2007
Year: 2008
Save time & money - Smart Internet Solutions     Free Forms + CRM