2013 |
Jainsky, Julien; Kundur, Deepa Towards Preventative Steganalysis in Wireless Visual Sensor Networks Journal Article International Journal on Multimedia Technology, 2 (3), pp. 55-61, 2013. Links | BibTeX | Tags: forensics, mmsn @article{JaiKunIJMT12, title = {Towards Preventative Steganalysis in Wireless Visual Sensor Networks}, author = {Julien Jainsky and Deepa Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/JaiKunIJMT13.pdf http://www.ijmt.org/PaperInfo.aspx?ID=3647}, year = {2013}, date = {2013-06-01}, journal = {International Journal on Multimedia Technology}, volume = {2}, number = {3}, pages = {55-61}, keywords = {forensics, mmsn}, pubstate = {published}, tppubtype = {article} } |
2012 |
Jainsky, Julien Sebastien Defenses Against Covert-Communications in Multimedia and Sensor Networks PhD Thesis Texas A&M University, 2012. Abstract | BibTeX | Tags: forensics, mmsn, PhD thesis, thesis @phdthesis{JaiPhDThesis12, title = {Defenses Against Covert-Communications in Multimedia and Sensor Networks}, author = {Julien Sebastien Jainsky}, year = {2012}, date = {2012-12-01}, address = {College Station, TX}, school = {Texas A&M University}, abstract = {Steganography and covert-communications represent a great and real threat today more than ever due to the evolution of modern communications. This doctoral work proposes defenses against such covert-communication techniques in two threatening but underdeveloped domains. Indeed, this work focuses on the novel problem of visual sensor network steganalysis but also proposes one of the first solutions against video steganography. The first part of the thesis looks at covert-communications in videos. The contribution of this study resides in the combination of image processing using motion vector interpolation and non-traditional detection theory to obtain better results in identifying the presence of embedded messages in videos compared to what existing still-image steganalytic solutions would offer. The proposed algorithm called MoViSteg utilizes the specifics of video, as a whole and not as a series of images, to decide on the occurrence of steganography. Contrary to other solutions, MoViSteg is a video-specific algorithm, and not a repetitive still-image steganalysis, and allows for detection of embedding in partially corrupted sequences. This thesis also lays the foundation for the novel study of visual sensor network steganalysis. We develop three different steganalytic solutions to the problem of covert communications in visual sensor networks. Because of the inadequacy of the existing steganalytic solutions present in the current research literature, we introduce the novel concept of preventative steganalysis, which aims at discouraging potential steganographic attacks. We propose a set of solutions with active and passive warden scenarii using the material made available by the network. To quantify the efficiency of the preventative steganalysis, a new measure for evaluating the risk of steganography is proposed: the embedding potential which relies on the uncertainty of the image’s pixel values prone to corruption.}, keywords = {forensics, mmsn, PhD thesis, thesis}, pubstate = {published}, tppubtype = {phdthesis} } Steganography and covert-communications represent a great and real threat today more than ever due to the evolution of modern communications. This doctoral work proposes defenses against such covert-communication techniques in two threatening but underdeveloped domains. Indeed, this work focuses on the novel problem of visual sensor network steganalysis but also proposes one of the first solutions against video steganography. The first part of the thesis looks at covert-communications in videos. The contribution of this study resides in the combination of image processing using motion vector interpolation and non-traditional detection theory to obtain better results in identifying the presence of embedded messages in videos compared to what existing still-image steganalytic solutions would offer. The proposed algorithm called MoViSteg utilizes the specifics of video, as a whole and not as a series of images, to decide on the occurrence of steganography. Contrary to other solutions, MoViSteg is a video-specific algorithm, and not a repetitive still-image steganalysis, and allows for detection of embedding in partially corrupted sequences. This thesis also lays the foundation for the novel study of visual sensor network steganalysis. We develop three different steganalytic solutions to the problem of covert communications in visual sensor networks. Because of the inadequacy of the existing steganalytic solutions present in the current research literature, we introduce the novel concept of preventative steganalysis, which aims at discouraging potential steganographic attacks. We propose a set of solutions with active and passive warden scenarii using the material made available by the network. To quantify the efficiency of the preventative steganalysis, a new measure for evaluating the risk of steganography is proposed: the embedding potential which relies on the uncertainty of the image’s pixel values prone to corruption. |
2011 |
Jainsky, J S; Kundur, D Ang, L -M; Seng, K P (Ed.): pp. 340-357, IGI Global, 2011, ISBN: 9781613501535. Links | BibTeX | Tags: forensics, mmsn @inbook{JaiKunChap11, title = {“Visual Sensor Network Processing and Preventative Steganalysis," in Visual Information Processing in Wireless Sensor Networks}, author = {J S Jainsky and D Kundur}, editor = {L -M Ang and K P Seng}, url = {http://www.igi-global.com/book/visual-information-processing-wireless-sensor/52741}, isbn = {9781613501535}, year = {2011}, date = {2011-09-01}, pages = {340-357}, publisher = {IGI Global}, keywords = {forensics, mmsn}, pubstate = {published}, tppubtype = {inbook} } |
Jainsky, J S; Kundur, D Preventative Steganalysis in Wireless Visual Sensor Networks: Challenges and Solutions Inproceedings Proc. IEEE International Conference on Multimedia and Expo (ICME), pp. 1692-1695, Barcelona, Spain, 2011. Links | BibTeX | Tags: forensics @inproceedings{JaiKunICME11, title = {Preventative Steganalysis in Wireless Visual Sensor Networks: Challenges and Solutions}, author = {J S Jainsky and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/JaiKunICME11.pdf http://dx.doi.org/10.1109/ICME.2011.6012224}, year = {2011}, date = {2011-07-11}, booktitle = {Proc. IEEE International Conference on Multimedia and Expo (ICME)}, pages = {1692-1695}, address = {Barcelona, Spain}, keywords = {forensics}, pubstate = {published}, tppubtype = {inproceedings} } |
2009 |
Fei, C; Kwong, R; Kundur, D Secure Semi-Fragile Watermarking for Image Authentication Inproceedings Proc. First IEEE International Workshop on Information Forensics and Security (WIFS), pp. 141-145, London, UK, 2009. Links | BibTeX | Tags: drm, forensics @inproceedings{FeiKwoKunWIFS09, title = {Secure Semi-Fragile Watermarking for Image Authentication}, author = {C Fei and R Kwong and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/FeiKwoKunWIFS09.pdf http://dx.doi.org/10.1109/WIFS.2009.5386465}, year = {2009}, date = {2009-12-06}, booktitle = {Proc. First IEEE International Workshop on Information Forensics and Security (WIFS)}, pages = {141-145}, address = {London, UK}, keywords = {drm, forensics}, pubstate = {published}, tppubtype = {inproceedings} } |
2007 |
Jainsky, J S; Kundur, D; Halverson, D R Towards Digital Video Steganalysis using Asymptotic Memoryless Detection Inproceedings Proc. ACM Multimedia and Security (MMSec) Workshop, pp. 161-168, Dallas, Texas, 2007. Links | BibTeX | Tags: forensics @inproceedings{JaiKunHalMMSec07, title = {Towards Digital Video Steganalysis using Asymptotic Memoryless Detection}, author = {J S Jainsky and D Kundur and D R Halverson}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/JaiKunHalMMSec07.pdf http://doi.acm.org/10.1145/1288869.1288891}, year = {2007}, date = {2007-09-01}, booktitle = {Proc. ACM Multimedia and Security (MMSec) Workshop}, pages = {161-168}, address = {Dallas, Texas}, keywords = {forensics}, pubstate = {published}, tppubtype = {inproceedings} } |
2006 |
Budhia, U; Kundur, D; Zourntos, T Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain Journal Article IEEE Transactions on Information Forensics and Security, 1 (4), pp. 502-516, 2006. Links | BibTeX | Tags: forensics @article{BudKunZouTIFS06, title = {Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain}, author = {U Budhia and D Kundur and T Zourntos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/BudKunZouTIFS06.pdf http://dx.doi.org/10.1109/TIFS.2006.885020}, year = {2006}, date = {2006-12-01}, journal = {IEEE Transactions on Information Forensics and Security}, volume = {1}, number = {4}, pages = {502-516}, keywords = {forensics}, pubstate = {published}, tppubtype = {article} } |
2005 |
Budhia, Udit Steganalysis of Video Sequences using Collusion Sensitivity 2005. Abstract | BibTeX | Tags: forensics, MS Thesis, thesis @masterthesis{BudMSThesis05, title = {Steganalysis of Video Sequences using Collusion Sensitivity}, author = {Udit Budhia}, year = {2005}, date = {2005-05-01}, address = {College Station, TX}, school = {Texas A&M University}, abstract = {In this thesis we present an effective steganalysis technique for digital video sequences based on the collusion attack. Steganalysis is the process of detecting with a high probability the presence of covert data in multimedia. Existing algorithms for steganalysis target detecting covert information in still images. When applied directly to video sequences these approaches are suboptimal. In this thesis we present methods that overcome this limitation by using redundant information present in the temporal domain to detect covert messages in the form of Gaussian watermarks. In particular we target the spread spectrum steganography method because of its widespread use. Our gains are achieved by exploiting the collusion attack that has recently been studied in the field of digital video watermarking and more sophisticated pattern recognition tools. Through analysis and simulations we, evaluate the effectiveness of the video steganalysis method based on averaging based collusion scheme. Other forms of collusion attack in the form of weighted linear collusion and block-based collusion schemes have been proposed to improve the detection performance. The proposed steganalsyis methods were successful in detecting hidden watermarks bearing low SNR with high accuracy. The simulation results also show the improved performance of the proposed temporal based methods over the spatial methods. We conclude that the essence of future video steganalysis techniques lies in the exploitation of the temporal redundancy.}, keywords = {forensics, MS Thesis, thesis}, pubstate = {published}, tppubtype = {masterthesis} } In this thesis we present an effective steganalysis technique for digital video sequences based on the collusion attack. Steganalysis is the process of detecting with a high probability the presence of covert data in multimedia. Existing algorithms for steganalysis target detecting covert information in still images. When applied directly to video sequences these approaches are suboptimal. In this thesis we present methods that overcome this limitation by using redundant information present in the temporal domain to detect covert messages in the form of Gaussian watermarks. In particular we target the spread spectrum steganography method because of its widespread use. Our gains are achieved by exploiting the collusion attack that has recently been studied in the field of digital video watermarking and more sophisticated pattern recognition tools. Through analysis and simulations we, evaluate the effectiveness of the video steganalysis method based on averaging based collusion scheme. Other forms of collusion attack in the form of weighted linear collusion and block-based collusion schemes have been proposed to improve the detection performance. The proposed steganalsyis methods were successful in detecting hidden watermarks bearing low SNR with high accuracy. The simulation results also show the improved performance of the proposed temporal based methods over the spatial methods. We conclude that the essence of future video steganalysis techniques lies in the exploitation of the temporal redundancy. |
2004 |
Dube, Raghav Denial of Service Attacks: Path Reconstruction for IP Traceback using Adjusted Probabilistic Packet Marking 2004. Abstract | BibTeX | Tags: forensics, MS Thesis, thesis @masterthesis{DubMSThesis04, title = {Denial of Service Attacks: Path Reconstruction for IP Traceback using Adjusted Probabilistic Packet Marking}, author = {Raghav Dube}, year = {2004}, date = {2004-12-01}, address = {College Station, TX}, school = {Texas A&M University}, abstract = {The use of Internet has revolutionized the way information is exchanged, changed business paradigms and put mission critical and sensitive systems online. Any disruption of this connectivity and the plethora of services provided results in significant damages to everyone involved. Denial of Service (DoS) attacks are becoming increasingly common and are the cause of lost time and revenue. Flooding type DoS attacks use spoofed IP addresses to disguise the attackers. This makes identification of the attackers extremely difficult. This work proposes a new scheme that allows the victim of a DoS attack to identify the correct origin of the malicious traffic. The suggested mechanism requires routers to mark packets using adjusted probabilistic marking. This results in a lower number of packet-markings required to identify the traffic source. Unlike many related works, we use the existing IPv4 header structure to incorporate these markings. We simulate and test our algorithms using real Internet trace data to show that our technique is fast, and works successfully for a large number of distributed attackers.}, keywords = {forensics, MS Thesis, thesis}, pubstate = {published}, tppubtype = {masterthesis} } The use of Internet has revolutionized the way information is exchanged, changed business paradigms and put mission critical and sensitive systems online. Any disruption of this connectivity and the plethora of services provided results in significant damages to everyone involved. Denial of Service (DoS) attacks are becoming increasingly common and are the cause of lost time and revenue. Flooding type DoS attacks use spoofed IP addresses to disguise the attackers. This makes identification of the attackers extremely difficult. This work proposes a new scheme that allows the victim of a DoS attack to identify the correct origin of the malicious traffic. The suggested mechanism requires routers to mark packets using adjusted probabilistic marking. This results in a lower number of packet-markings required to identify the traffic source. Unlike many related works, we use the existing IPv4 header structure to incorporate these markings. We simulate and test our algorithms using real Internet trace data to show that our technique is fast, and works successfully for a large number of distributed attackers. |
Budhia, U; Kundur, D Digital Video Steganalysis Exploiting Collusion Sensitivity Inproceedings Carapezza, Edward M (Ed.): Proc. SPIE Sensors, Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense, pp. 210-221, Orlando, Florida, 2004. Links | BibTeX | Tags: forensics @inproceedings{BudKunSPIE04, title = {Digital Video Steganalysis Exploiting Collusion Sensitivity}, author = {U Budhia and D Kundur}, editor = {Edward M Carapezza}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/BudKunSPIE04.pdf http://dx.doi.org/10.1117/12.540814}, year = {2004}, date = {2004-04-01}, booktitle = {Proc. SPIE Sensors, Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense}, volume = {5403}, pages = {210-221}, address = {Orlando, Florida}, keywords = {forensics}, pubstate = {published}, tppubtype = {inproceedings} } |
Zhao, Y; Campisi, P; Kundur, D Dual Domain Watermarking for Authentication and Compression of Cultural Heritage Images Journal Article IEEE Transactions on Image Processing, 13 (3), pp. 430-448, 2004. Links | BibTeX | Tags: drm, forensics @article{ZhaCamKunTIP04, title = {Dual Domain Watermarking for Authentication and Compression of Cultural Heritage Images}, author = {Y Zhao and P Campisi and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/ZhaCamKunTIP04.pdf http://dx.doi.org/10.1109/TIP.2003.821552}, year = {2004}, date = {2004-03-01}, journal = {IEEE Transactions on Image Processing}, volume = {13}, number = {3}, pages = {430-448}, keywords = {drm, forensics}, pubstate = {published}, tppubtype = {article} } |
Kundur, D; Zhao, Y; Campisi, P A Steganographic Framework for Dual Authentication and Compression of High Resolution Imagery Inproceedings Proc. IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1-4, Vancouver, Canada, 2004. Links | BibTeX | Tags: drm, forensics @inproceedings{KunZhaCamISCAS04, title = {A Steganographic Framework for Dual Authentication and Compression of High Resolution Imagery}, author = {D Kundur and Y Zhao and P Campisi}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunZhaCamISCAS04.pdf http://dx.doi.org/10.1109/ISCAS.2004.1329193}, year = {2004}, date = {2004-01-01}, booktitle = {Proc. IEEE International Symposium on Circuits and Systems (ISCAS)}, volume = {2}, pages = {1-4}, address = {Vancouver, Canada}, keywords = {drm, forensics}, pubstate = {published}, tppubtype = {inproceedings} } |
2003 |
Zhao, Yang Dual Domain Semi-Fragile Watermarking for Image Authentication 2003. Abstract | BibTeX | Tags: drm, forensics, MS Thesis, thesis @masterthesis{ZhaMSThesis03, title = {Dual Domain Semi-Fragile Watermarking for Image Authentication}, author = {Yang Zhao}, year = {2003}, date = {2003-12-01}, address = {Toronto, Canada}, school = {University of Toronto}, abstract = {Techniques to establish the authenticity and integrity of digital images are becoming increasingly essential for secure transacting. Ideally, the authentication algorithm should distinguish incidental integrity maintaining distortions such as lossy compression from malicious manipulations. This has motivated research into semi-ragile watermarking. A novel watermarking algorithm is proposed in this thesis that is both robust to compression and self-authenticating. The proposed algorithm is a content-based, semi-fragile watermarking method that employs a public-key scheme for still image authentication and integrity veri¯cation. The use of dual domains in the proposed algorithm enables greater control over the robustness and fragility of the overall scheme to manipulations, and provides very good classi¯cation of intentional and incidental tampering. In addition, the thesis provides theoretical analysis for the performance and the feasibility of the scheme. We also present experimental results to verify the theoretical observations and the comparison results for the proposed algorithm to four popular techniques.}, keywords = {drm, forensics, MS Thesis, thesis}, pubstate = {published}, tppubtype = {masterthesis} } Techniques to establish the authenticity and integrity of digital images are becoming increasingly essential for secure transacting. Ideally, the authentication algorithm should distinguish incidental integrity maintaining distortions such as lossy compression from malicious manipulations. This has motivated research into semi-ragile watermarking. A novel watermarking algorithm is proposed in this thesis that is both robust to compression and self-authenticating. The proposed algorithm is a content-based, semi-fragile watermarking method that employs a public-key scheme for still image authentication and integrity veri¯cation. The use of dual domains in the proposed algorithm enables greater control over the robustness and fragility of the overall scheme to manipulations, and provides very good classi¯cation of intentional and incidental tampering. In addition, the thesis provides theoretical analysis for the performance and the feasibility of the scheme. We also present experimental results to verify the theoretical observations and the comparison results for the proposed algorithm to four popular techniques. |
Kundur, D; Ahsan, K Practical Internet Steganography: Data Hiding in IP Inproceedings Proc. Texas Workshop on Security of Information Systems, College Station, Texas, 2003. Links | BibTeX | Tags: forensics @inproceedings{KunAhsTXSecWrkshp03, title = {Practical Internet Steganography: Data Hiding in IP}, author = {D Kundur and K Ahsan}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunAhsTXSecWrkshp03.pdf}, year = {2003}, date = {2003-04-01}, booktitle = {Proc. Texas Workshop on Security of Information Systems}, address = {College Station, Texas}, keywords = {forensics}, pubstate = {published}, tppubtype = {inproceedings} } |
2002 |
Ahsan, K; Kundur, D Practical Data Hiding in TCP/IP Inproceedings Proc. Workshop on Multimedia Security at ACM Multimedia '02, Juan Les Pins, France, 2002. Links | BibTeX | Tags: forensics @inproceedings{AhsKunMMSec02, title = {Practical Data Hiding in TCP/IP}, author = {K Ahsan and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/AhsKunMMSec02.pdf}, year = {2002}, date = {2002-12-01}, booktitle = {Proc. Workshop on Multimedia Security at ACM Multimedia '02}, address = {Juan Les Pins, France}, keywords = {forensics}, pubstate = {published}, tppubtype = {inproceedings} } |
Ahsan, Kamran Covert Channel Analysis and Data Hiding in TCP/IP 2002. Abstract | BibTeX | Tags: forensics, MS Thesis, thesis @masterthesis{AhsMAScThesis02, title = {Covert Channel Analysis and Data Hiding in TCP/IP}, author = {Kamran Ahsan}, year = {2002}, date = {2002-08-01}, abstract = {This thesis investigates the existence of covert channels in computer networks by analyzing the transport and the Internet layers of the TCP/IP protocol suite. Two approaches for data hiding are identified: packet header manipulation and packet sorting. Each scenario facilitates the interaction of steganographic principles with the existing network security environment. Specifically, we show how associating additional information with IPv4 headers can ease up security mechanisms in network nodes like routers, firewalls and for services such as authentication, audit, and billing. Furthermore, use of packet sorting with the IP Sec framework results in an enhanced network security architecture. The packet sorting approach is simulated at the network layer which provides a feasibility of packet sorting under varying network conditions. While bridging the areas of data hiding, network protocols and network security, both techniques have potential for practical data hiding at the transport and network layers.}, keywords = {forensics, MS Thesis, thesis}, pubstate = {published}, tppubtype = {masterthesis} } This thesis investigates the existence of covert channels in computer networks by analyzing the transport and the Internet layers of the TCP/IP protocol suite. Two approaches for data hiding are identified: packet header manipulation and packet sorting. Each scenario facilitates the interaction of steganographic principles with the existing network security environment. Specifically, we show how associating additional information with IPv4 headers can ease up security mechanisms in network nodes like routers, firewalls and for services such as authentication, audit, and billing. Furthermore, use of packet sorting with the IP Sec framework results in an enhanced network security architecture. The packet sorting approach is simulated at the network layer which provides a feasibility of packet sorting under varying network conditions. While bridging the areas of data hiding, network protocols and network security, both techniques have potential for practical data hiding at the transport and network layers. |
Campisi, P; Kundur, D; Hatzinakos, D; Neri, A Hiding Based Compression for Improved Color Image Coding Inproceedings III, Delp E J; Wong, P W (Ed.): Proc. SPIE Security and Watermarking of Multimedia Contents IV, pp. 230-239, San Jose, California, 2002. Links | BibTeX | Tags: forensics @inproceedings{CamKunHatNerSPIE02, title = {Hiding Based Compression for Improved Color Image Coding}, author = {P Campisi and D Kundur and D Hatzinakos and A Neri}, editor = {Delp E J III and P W Wong}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/CamKunHatNerSPIE02.pdf http://dx.doi.org/10.1117/12.465280}, year = {2002}, date = {2002-01-01}, booktitle = {Proc. SPIE Security and Watermarking of Multimedia Contents IV}, volume = {4675}, pages = {230-239}, address = {San Jose, California}, keywords = {forensics}, pubstate = {published}, tppubtype = {inproceedings} } |
2000 |
Kundur, D Implications for High Capacity Data Hiding in the Presence of Lossy Compression Inproceedings Proc. IEEE International Conference on Information Technology: Coding and Computing (ITCC), pp. 16-21, Las Vegas, Nevada, 2000. Links | BibTeX | Tags: drm, forensics @inproceedings{KunITCC00, title = {Implications for High Capacity Data Hiding in the Presence of Lossy Compression}, author = {D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunITCC00.pdf http://dx.doi.org/10.1109/ITCC.2000.844177}, year = {2000}, date = {2000-03-01}, booktitle = {Proc. IEEE International Conference on Information Technology: Coding and Computing (ITCC)}, pages = {16-21}, address = {Las Vegas, Nevada}, keywords = {drm, forensics}, pubstate = {published}, tppubtype = {inproceedings} } |
1999 |
Kundur, D; Hatzinakos, D Digital Watermarking for Telltale Tamper-Proofing and Authentication Journal Article Proceedings of the IEEE Special Issue on Identification and Protection of Multimedia Information, 87 (7), pp. 1167-1180, 1999. Links | BibTeX | Tags: drm, forensics @article{KunHatProcIEEE99, title = {Digital Watermarking for Telltale Tamper-Proofing and Authentication}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatProcIEEE99.pdf http://dx.doi.org/10.1109/5.771070}, year = {1999}, date = {1999-07-01}, journal = {Proceedings of the IEEE Special Issue on Identification and Protection of Multimedia Information}, volume = {87}, number = {7}, pages = {1167-1180}, keywords = {drm, forensics}, pubstate = {published}, tppubtype = {article} } |
1998 |
Kundur, D; Hatzinakos, D Towards a Telltale Watermarking Technique for Tamper-Proofing Inproceedings Proc. IEEE International Conference on Image Processing (ICIP), pp. 409-413, 1998. Links | BibTeX | Tags: drm, forensics @inproceedings{KunHatICIP98, title = {Towards a Telltale Watermarking Technique for Tamper-Proofing}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatICIP98.pdf http://dx.doi.org/10.1109/ICIP.1998.723403}, year = {1998}, date = {1998-10-01}, booktitle = {Proc. IEEE International Conference on Image Processing (ICIP)}, volume = {2}, pages = {409-413}, keywords = {drm, forensics}, pubstate = {published}, tppubtype = {inproceedings} } |