Worst case attacks against binary probabilistic traitor tracing codes (Englisch)
- Neue Suche nach: Furon, Teddy
- Neue Suche nach: Perez-Freire, Luis
- Neue Suche nach: Furon, Teddy
- Neue Suche nach: Perez-Freire, Luis
In:
2009 First IEEE International Workshop on Information Forensics and Security (WIFS)
;
56-60
;
2009
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:Worst case attacks against binary probabilistic traitor tracing codes
-
Beteiligte:Furon, Teddy ( Autor:in ) / Perez-Freire, Luis ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.12.2009
-
Format / Umfang:183869 byte
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Brief author index| 2009
- 1
-
Technical program committee| 2009
- 1
-
Secure and HVS-adaptive exhibition Spread Transform Dither Modulation watermarking for Digital CinemaDarazi, Rony / Callau, Pilar / Macq, Benoit et al. | 2009
- 1
-
Frequently asked questions| 2009
- 1
-
Keynote talks| 2009
- 1
-
Table of contents| 2009
- 1
-
The end of indexes| 2009
- 1
-
Organization committee| 2009
- 1
-
Hub page| 2009
- 1
-
Financial sponsors| 2009
- 1
-
Tutorials| 2009
- 1
-
Session list| 2009
- 1
-
PrefaceKalker, Ton / Naccache, David et al. | 2009
- 1
-
AboutCP| 2009
- 1
-
USB label| 2009
- 1
-
Detailed author index| 2009
- 6
-
A hierarchical spatially adaptive image model for perceptual mask design and multiplicative watermark detectionMairgiotis, Antonis / Galatsanos, Nikolaos et al. | 2009
- 11
-
QIM-DM watermarking optimization based on inter-frequency contrast masking in the DCT domainBattisti, Federica / Carli, Marco / Neri, Alessandro et al. | 2009
- 16
-
A system for forensic analysis of large image setsSimske, Steven J. / Sturgill, Margaret / Everest, Paul / Guillory, George et al. | 2009
- 21
-
On resampling detection in re-compressed imagesKirchner, Matthias / Gloe, Thomas et al. | 2009
- 26
-
Forensic characterization of RF devicesMikkilineni, Aravind K. / King-Smith, Deen / Gelfand, Saul B. / Delp, Edward J. et al. | 2009
- 31
-
Retention of micro-fragments in cluster slack - A first modelGarcia, Johan / Holleboom, Thijs et al. | 2009
- 36
-
A note on the equivalence of the traceability properties of Reed-Solomon codes for certain coalition sizesMoreira, Jose / Fernandez, Marcel / Soriano, Miguel et al. | 2009
- 41
-
Tardos fingerprinting codes in the combined digit modelSkoric, Boris / Katzenbeisser, Stefan / Schaathun, Hans Georg / Celik, Mehmet U. et al. | 2009
- 46
-
Blind decoder for binary probabilistic traitor tracing codesPerez-Freire, Luis / Furon, Teddy et al. | 2009
- 51
-
Capacity-achieving fingerprint decodingHuang, Yen-Wei / Moulin, Pierre et al. | 2009
- 56
-
Worst case attacks against binary probabilistic traitor tracing codesFuron, Teddy / Perez-Freire, Luis et al. | 2009
- 61
-
Heart sounds quality analysis for automatic cardiac biometry applicationsBeritelli, Francesco / Spadaccini, Andrea et al. | 2009
- 66
-
Accuracy improvement with high convenience in biometric identification using multihypothesis sequential probability ratio testMurakami, Takao / Takahashi, Kenta et al. | 2009
- 71
-
Leveraging reliable bits: ECC design considerations for practical secure biometric systemsWang, Yige / Rane, Shantanu / Vetro, Anthony et al. | 2009
- 76
-
Fast identification algorithms for forensic applicationsBeekhof, Fokko / Voloshynovskiy, Sviatoslav / Koval, Oleksiy / Holotyak, Taras et al. | 2009
- 81
-
On the security of non-invertible fingerprint template transformsNagar, Abhishek / Jain, Anil K. et al. | 2009
- 86
-
Privacy enhancement of common randomness based authentication: Key rate maximized caseVoloshynovskiy, Sviatoslav / Koval, Oleksiy / Holotyak, Taras / Beekhof, Fokko et al. | 2009
- 91
-
Efficient privacy-preserving classification of ECG signalsBarni, Mauro / Failla, Pierluigi / Lazzeretti, Riccardo / Paus, Annika / Sadeghi, Ahmad-Reza / Schneider, Thomas / Kolesnikov, Vladimir et al. | 2009
- 96
-
Privacy-preserving user clustering in a social networkErkin, Zekeriya / Veugen, Thijs / Toft, Tomas / Lagendijk, Reginald L. et al. | 2009
- 101
-
Extracting social networks from seized smartphones and web dataDellutri, Fabio / Laura, Luigi / Ottaviani, Vittorio / Italiano, Giuseppe F. et al. | 2009
- 106
-
Efficient implementation of anonymous credentials on Java Card smart cardsSterckx, Michael / Gierlichs, Benedikt / Preneel, Bart / Verbauwhede, Ingrid et al. | 2009
- 111
-
Modeling content fingerprints using markov random fieldsVarna, Avinash L. / Wu, Min et al. | 2009
- 116
-
Modeling and analysis of ordinal ranking in content fingerprintingChuang, Wei-Hong / Varna, Avinash L. / Wu, Min et al. | 2009
- 121
-
Towards automated image hashing based on the Fast Johnson-Lindenstrauss Transform (FJLT)Fatourechi, Mehrdad / Lv, Xudong / Wang, Z. Jane / Ward, Rabab K. et al. | 2009
- 126
-
Security of robust audio hashesThiemert, Stefan / Nurnberger, Stefan / Steinebach, Martin / Zmudzinski, Sascha et al. | 2009
- 131
-
Wet ZZW construction for steganographyFiller, Tomas / Fridrich, Jessica et al. | 2009
- 136
-
Using forms for information hiding and coding in electrophotographic documentsOrtiz Segovia, Maria V. / Chiu, George T.-C. / Allebach, Jan P. et al. | 2009
- 141
-
Secure semi-fragilewatermarking for image authenticationFei, Chuhong / Kwong, Raymond / Kundur, Deepa et al. | 2009
- 146
-
An extended analysis of discrete fourier tranform - rational dither modulation for non-white hostsScagliola, Michele / Perez-Gonzalez, Fernando / Guccione, Pietro et al. | 2009
- 151
-
Printer-scanner identification via analysis of structured security deterrentsGaubatz, Matthew D. / Simske, Steven J. et al. | 2009
- 156
-
Camera response function signature for digital forensics - Part I: Theory and data selectionNg, Tian-Tsong / Tsui, Mao-Pei et al. | 2009
- 161
-
Camera response function signature for digital forensics - Part II: Signature extractionNg, Tian-Tsong et al. | 2009
- 166
-
Source scanner identification for scanned documentsKhanna, Nitin / Delp, Edward J. et al. | 2009
- 171
-
Source cell phone camera identification based on singular value decompositionGul, Gokhan / Avcibas, Ismail et al. | 2009
- 176
-
Processing in the encrypted domain using a composite signal representation: Pros and consBianchi, Tiziano / Veugen, Thijs / Piva, Alessandro / Barni, Mauro et al. | 2009
- 181
-
BitStalker: Accurately and efficiently monitoring bittorrent trafficBauer, Kevin / McCoy, Damon / Grunwald, Dirk / Sicker, Douglas et al. | 2009
- 186
-
RFID key establishment against active adversariesBringer, J. / Chabanne, H. / Cohen, G. / Kindarji, B. et al. | 2009
- 191
-
Practical DPA attacks on MDPLDe Mulder, Elke / Gierlichs, Benedikt / Preneel, Bart / Verbauwhede, Ingrid et al. | 2009
- c1
-
Cover| 2009