PROCEEDINGS VOLUME 7254
IS&T/SPIE ELECTRONIC IMAGING | 18-22 JANUARY 2009
Media Forensics and Security
Editor Affiliations +
Proceedings Volume 7254 is from: Logo
IS&T/SPIE ELECTRONIC IMAGING
18-22 January 2009
San Jose, California, United States
Front Matter: Volume 7254
Proceedings Volume Media Forensics and Security, 725401 (2009) https://doi.org/10.1117/12.824734
Media Fingerprinting
Proceedings Volume Media Forensics and Security, 725402 (2009) https://doi.org/10.1117/12.805709
Mehmet Celik, Jaap Haitsma, Pavlo Barvinko, Gerhard Langelaar, Martijn Maas
Proceedings Volume Media Forensics and Security, 725403 (2009) https://doi.org/10.1117/12.805551
Markus Cremer, Randall Cook
Proceedings Volume Media Forensics and Security, 725404 (2009) https://doi.org/10.1117/12.807515
Frédéric Lefebvre, Bertrand Chupeau, Ayoub Massoudi, Eric Diehl
Proceedings Volume Media Forensics and Security, 725405 (2009) https://doi.org/10.1117/12.806580
Manika Puri, Jeffrey Lubin
Proceedings Volume Media Forensics and Security, 725406 (2009) https://doi.org/10.1117/12.805997
Regunathan Radhakrishnan, Wenyu Jiang, Claus Bauer
Proceedings Volume Media Forensics and Security, 725407 (2009) https://doi.org/10.1117/12.805627
Steganography and Steganalysis
Proceedings Volume Media Forensics and Security, 725408 (2009) https://doi.org/10.1117/12.805911
Proceedings Volume Media Forensics and Security, 725409 (2009) https://doi.org/10.1117/12.805884
Andrew D. Ker, Ivans Lubenko
Proceedings Volume Media Forensics and Security, 72540A (2009) https://doi.org/10.1117/12.805910
Proceedings Volume Media Forensics and Security, 72540B (2009) https://doi.org/10.1117/12.810507
Proceedings Volume Media Forensics and Security, 72540C (2009) https://doi.org/10.1117/12.805601
Theoretical Foundations
Sviatoslav Voloshynovskiy, Oleksiy Koval, Fokko Beekhof, Thierry Pun
Proceedings Volume Media Forensics and Security, 72540D (2009) https://doi.org/10.1117/12.805919
Ana Charpentier, Fuchun Xie, Caroline Fontaine, Teddy Furon
Proceedings Volume Media Forensics and Security, 72540E (2009) https://doi.org/10.1117/12.806034
Proceedings Volume Media Forensics and Security, 72540F (2009) https://doi.org/10.1117/12.806111
O. Koval, S. Voloshynovskiy, P. Bas, F. Cayre
Proceedings Volume Media Forensics and Security, 72540H (2009) https://doi.org/10.1117/12.807487
Media Forensics I
Proceedings Volume Media Forensics and Security, 72540I (2009) https://doi.org/10.1117/12.805701
Babak Mahdian, Stanislav Saic
Proceedings Volume Media Forensics and Security, 72540J (2009) https://doi.org/10.1117/12.805898
Proceedings Volume Media Forensics and Security, 72540K (2009) https://doi.org/10.1117/12.805988
Media Forensics II
David G. Stork, Micah K. Johnson
Proceedings Volume Media Forensics and Security, 72540L (2009) https://doi.org/10.1117/12.806240
Proceedings Volume Media Forensics and Security, 72540M (2009) https://doi.org/10.1117/12.814705
Cryptographic Techniques for Content Protection
Proceedings Volume Media Forensics and Security, 72540N (2009) https://doi.org/10.1117/12.810749
Jeffrey Lotspiech, Hongxia Jin
Proceedings Volume Media Forensics and Security, 72540O (2009) https://doi.org/10.1117/12.810937
Proceedings Volume Media Forensics and Security, 72540P (2009) https://doi.org/10.1117/12.815047
Proceedings Volume Media Forensics and Security, 72540Q (2009) https://doi.org/10.1117/12.815062
G. Deen, D. Ponceleon, Donald Leake Jr.
Proceedings Volume Media Forensics and Security, 72540S (2009) https://doi.org/10.1117/12.815065
Video
Proceedings Volume Media Forensics and Security, 72540U (2009) https://doi.org/10.1117/12.816489
Proceedings Volume Media Forensics and Security, 72540V (2009) https://doi.org/10.1117/12.816490
Data Hiding
Proceedings Volume Media Forensics and Security, 72540W (2009) https://doi.org/10.1117/12.806254
Proceedings Volume Media Forensics and Security, 72540X (2009) https://doi.org/10.1117/12.805960
Watermarking
Sierra Modro, Ravi K. Sharma
Proceedings Volume Media Forensics and Security, 72540Y (2009) https://doi.org/10.1117/12.813762
Dekun Zou, Jeffrey A. Bloom
Proceedings Volume Media Forensics and Security, 72540Z (2009) https://doi.org/10.1117/12.824631
Proceedings Volume Media Forensics and Security, 725410 (2009) https://doi.org/10.1117/12.814319
Proceedings Volume Media Forensics and Security, 725411 (2009) https://doi.org/10.1117/12.816282
Authentication
Yao-Chung Lin, David Varodayan, Bernd Girod
Proceedings Volume Media Forensics and Security, 725412 (2009) https://doi.org/10.1117/12.805538
Sviatoslav Voloshynovskiy, Oleksiy Koval, Fokko Beekhof, Thierry Pun
Proceedings Volume Media Forensics and Security, 725413 (2009) https://doi.org/10.1117/12.805710
Sascha Zmudzinski, Martin Steinebach
Proceedings Volume Media Forensics and Security, 725414 (2009) https://doi.org/10.1117/12.806041
Proceedings Volume Media Forensics and Security, 725415 (2009) https://doi.org/10.1117/12.807352
Miscellaneous
Proceedings Volume Media Forensics and Security, 725416 (2009) https://doi.org/10.1117/12.805862
Proceedings Volume Media Forensics and Security, 725417 (2009) https://doi.org/10.1117/12.807742
Proceedings Volume Media Forensics and Security, 725418 (2009) https://doi.org/10.1117/12.806980
Proceedings Volume Media Forensics and Security, 725419 (2009) https://doi.org/10.1117/12.806056
Back to Top