MA-P5: Security I: Authentication and Steganography |
Session Type: Poster |
Time: Monday, September 17, 09:50 - 12:50 |
Location: Regency Ballroom: Poster Area 5 |
Chair: Ton Kalker, Hewlett Packard |
MA-P5.1: BINARY IMAGE AUTHENTICATION USING ZERNIKE MOMENTS |
Hongmei Liu; Sun Yat-Sen University |
Wei Rui; Sun Yat-Sen University |
Jiwu Huang; Sun Yat-Sen University |
MA-P5.2: A GREY-LEVEL IMAGE EMBEDDING ITS COLOR PALETTE |
Marc Chaumont; Laboratory LIRMM, UMR CNRS 5506, University of Montpellier II |
William Puech; Laboratory LIRMM, UMR CNRS 5506, University of Montpellier II |
MA-P5.3: COMPENSATED SIGNATURE EMBEDDING BASED MULTIMEDIA CONTENT AUTHENTICATION SYSTEM |
Sufyan Ababneh; University of Illinois at Chicago |
Ashfaq Khokhar; University of Illinois at Chicago |
Rashid Ansari; University of Illinois at Chicago |
MA-P5.4: TAMPER DETECTION BASED ON REGULARITY OF WAVELET TRANSFORM COEFFICIENTS |
Yagiz Sutcu; Polytechnic University |
Baris Coskun; Polytechnic University |
Husrev Taha Sencar; Polytechnic University |
Nasir Memon; Polytechnic University |
MA-P5.5: ATTACK LSB MATCHING STEGANOGRAPHY BY COUNTING ALTERATION RATE OF THE NUMBER OF NEIGHBOURHOOD GRAY LEVELS |
Fangjun Huang; Sun Yat-Sen University |
Bin Li; Sun Yat-Sen University |
Jiwu Huang; Sun Yat-Sen University |
MA-P5.6: BENFORD'S LAW IN IMAGE PROCESSING |
Fernando Perez-Gonzalez; University of Vigo |
Greg Heileman; University of New Mexico |
Chaouki Abdallah; University of New Mexico |
MA-P5.7: ESTIMATING STEGANOGRAPHIC CAPACITY FOR ODD-EVEN BASED EMBEDDING AND ITS USE IN INDIVIDUAL COMPENSATION |
Anindya Sarkar; University of California, Santa Barbara |
Bangalore S. Manjunath; University of California, Santa Barbara |
MA-P5.8: STEGANALYSIS OF LSB GREEDY EMBEDDING ALGORITHM FOR JPEG IMAGES USING COEFFICIENT SYMMETRY |
Bin Li; Sun Yat-Sen University |
Fangjun Huang; Sun Yat-Sen University |
Jiwu Huang; Sun Yat-Sen University |
MA-P5.9: STEGANALYSIS USING NOISE VARIANCE ESTIMATION |
Christopher Smith; Southwest Research Institute |
MA-P5.10: DETECTING HIDDEN MESSAGES USING IMAGE POWER SPECTRUM |
Palak Amin; Stevens Institute of Technology |
K. P. Subbalakshmi; Stevens Institute of Technology |