By Topic

2009 First IEEE International Workshop on Information Forensics and Security (WIFS)

Date 6-9 Dec. 2009

Filter Results

Displaying Results 1 - 25 of 55
  • [USB label]

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2009, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (898 KB)
    Freely Available from IEEE
  • Hub page

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (208 KB)
    Freely Available from IEEE
  • Session list

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):1 - 6
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Brief author index

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • Detailed author index

    Publication Year: 2009, Page(s):1 - 27
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • The end of indexes

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • [PDF Reader FAQ and support]

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • [PDF Reader FAQ and support]

    Publication Year: 2009, Page(s):1 - 5
    Request permission for commercial reuse | PDF file iconPDF (455 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (85 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organization Committee

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • Financial sponsors

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (190 KB)
    Freely Available from IEEE
  • Keynote talks

    Publication Year: 2009
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • Tutorials

    Publication Year: 2009, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    Provides an abstract for each of the tutorial presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure and HVS-adaptive exhibition Spread Transform Dither Modulation watermarking for Digital Cinema

    Publication Year: 2009, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (542 KB) | HTML iconHTML

    In this paper, we propose a secure watermarking scheme based on spread transform dither modulation (STDM) method for digital cinema. The embedding is performed in the JPEG2000 decoding pipeline after the de-quantization and prior to the inverse discrete wavelet transform (IDWT). We exploit the wavelet properties related to the human visual system (HVS) in order to have a trade-off between fidelity... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hierarchical spatially adaptive image model for perceptual mask design and multiplicative watermark detection

    Publication Year: 2009, Page(s):6 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (816 KB) | HTML iconHTML

    In this work motivated by a hierarchical spatially adaptive image prior that we have developed for additive watermarking; we first, propose a new perceptual mask which improves robustness of additive watermark detectors in the spatial domain. The proposed mask is based on the local image variations along the two principal directions and enhances the watermark's energy while satisfying the impercep... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QIM-DM watermarking optimization based on inter-frequency contrast masking in the DCT domain

    Publication Year: 2009, Page(s):11 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (130 KB) | HTML iconHTML

    In this paper a watermarking scheme based on the human visual system (HVS) is presented. A quantization index modulation - dither modulation scheme is used in the discrete cosine transform domain for the embedding. The watermark quantization step is selected according to the inter-frequency masking effect computed by using a HVS-inspired objective image quality metric. Experimental results demonst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A system for forensic analysis of large image sets

    Publication Year: 2009, Page(s):16 - 20
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (209 KB) | HTML iconHTML

    Counterfeiting is a major concern for brand owners. Since printing is used to convey brands, brand owners should be able to analyze images of printed areas to gauge if the printing was performed by an authentic or a counterfeit printer/label converter. In this paper, we describe a system that uses a small set of pre-classified images (either authentic or counterfeit images from the same source) fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On resampling detection in re-compressed images

    Publication Year: 2009, Page(s):21 - 25
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB) | HTML iconHTML

    Resampling detection has become a standard tool in digital image forensics. This paper investigates the important case of resampling detection in re-compressed JPEG images. We show how blocking artifacts of the previous compression step can help to increase the otherwise drastically reduced detection performance in JPEG compressed images. We give a formulation on how affine transformations of JPEG... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Forensic characterization of RF devices

    Publication Year: 2009, Page(s):26 - 30
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    We present a framework for forensic identification of RF devices using specially designed probe signals. This framework applies to a broad range of devices. Probe signals, device models, feature selection and classifier design are described, and experimental results are given to verify our approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Retention of micro-fragments in cluster slack - A first model

    Publication Year: 2009, Page(s):31 - 35
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (149 KB) | HTML iconHTML

    In current forensic practice it is regularly needed to determine whether some set of files have been present on a storage medium or not. File carving techniques are readily used as a tool in such examinations. However, if all clusters holding the files searched for have been overwritten, remains of the previous files only resides in the cluster slack. In this work we elaborate on the factors that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A note on the equivalence of the traceability properties of Reed-Solomon codes for certain coalition sizes

    Publication Year: 2009, Page(s):36 - 40
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (133 KB) | HTML iconHTML

    Fingerprinting codes are used to prevent dishonest users from redistributing copyrighted material. In this context, codes with the traceability (TA) property are of remarkable significance, since they provide an efficient way to identify traitors. Codes with the identifiable parent property (IPP) are also capable of identifying traitors, requiring less restrictive conditions than the TA codes at t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tardos fingerprinting codes in the combined digit model

    Publication Year: 2009, Page(s):41 - 45
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB) | HTML iconHTML

    We introduce a new attack model for collusion-secure codes, called the combined digit model, which represents signal processing attacks against the underlying watermarking level better than existing models. In this paper, we analyze the performance of two variants of the Tardos code and show that both variants can accommodate the new model and resist collusion attacks with only a modest increase i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.