By Topic

IEEE Transactions on Signal Processing

Issue 10  Part 2 • Date Oct. 2005

 This issue contains several parts.Go to:  Part 1 

Filter Results

Displaying Results 1 - 18 of 18
  • Table of contents

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • IEEE Transactions on Signal Processing publication information

    Publication Year: 2005, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • A Message From the Editor-in-Chief—Third Supplement on Secure Media

    Publication Year: 2005, Page(s): 3921
    Request permission for commercial reuse | PDF file iconPDF (18 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Editorial for Supplement on Secure Media—III

    Publication Year: 2005, Page(s): 3922
    Request permission for commercial reuse | PDF file iconPDF (22 KB) | HTML iconHTML
    Freely Available from IEEE
  • Writing on wet paper

    Publication Year: 2005, Page(s):3923 - 3935
    Cited by:  Papers (71)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    In this paper, we show that the communication channel known as writing in memory with defective cells is a relevant information-theoretical model for a specific case of passive warden steganography when the sender embeds a secret message into a subset C of the cover object X without sharing C with the recipient. The set C, which is also called the selection channel, could be arbitrary, determined ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new framework of LSB steganalysis of digital media

    Publication Year: 2005, Page(s):3936 - 3947
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    We propose a general framework for the detection of the least significant bit (LSB) steganography using digital media files as cover objects. The new framework exploits high-order statistics of the samples. It can compute a robust estimate of the length of a secret message hidden in the LSBs of samples for a large class of digital media contents such as image, video, and audio, in which the underl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exposing digital forgeries in color filter array interpolated images

    Publication Year: 2005, Page(s):3948 - 3959
    Cited by:  Papers (156)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3072 KB) | HTML iconHTML

    With the advent of low-cost and high-resolution digital cameras, and sophisticated photo editing software, digital images can be easily manipulated and altered. Although good forgeries may leave no visual clues of having been tampered with, they may, nevertheless, alter the underlying statistics of an image. Most digital cameras, for example, employ a single sensor in conjunction with a color filt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rational dither modulation: a high-rate data-hiding method invariant to gain attacks

    Publication Year: 2005, Page(s):3960 - 3975
    Cited by:  Papers (68)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB) | HTML iconHTML

    A novel quantization-based data-hiding method, called Rational Dither Modulation (RDM), is presented. This method retains most of the simplicity of the conventional dither modulation (DM) scheme, which is largely vulnerable to amplitude scalings and modifies it in such a way that the result becomes invariant to gain attacks. RDM is based on using a gain-invariant adaptive quantization step-size at... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Watermarking security: theory and practice

    Publication Year: 2005, Page(s):3976 - 3987
    Cited by:  Papers (75)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB) | HTML iconHTML

    This paper proposes a theory of watermarking security based on a cryptanalysis point of view. The main idea is that information about the secret key leaks from the observations, for instance, watermarked pieces of content, available to the opponent. Tools from information theory (Shannon's mutual information and Fisher's information matrix) can measure this leakage of information. The security lev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data hiding in curves with application to fingerprinting maps

    Publication Year: 2005, Page(s):3988 - 4005
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1192 KB) | HTML iconHTML

    This paper presents a new data hiding method for curves. The proposed algorithm parameterizes a curve using the B-spline model and adds a spread spectrum sequence to the coordinates of the B-spline control points. In order to achieve robust fingerprint detection, an iterative alignment-minimization algorithm is proposed to perform curve registration and to deal with the nonuniqueness of B-spline c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joint iterative decoding and estimation for side-informed data hiding

    Publication Year: 2005, Page(s):4006 - 4019
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    We present a previously unavailable study on a general procedure for joint iterative decoding and estimation of attack parameters in side-informed data hiding. This type of approach, which exploits iteratively decodable codes for channel identification purposes, has recently become a relevant research trend in many digital communications problems. An advantage is that estimation pilots are not str... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust video hashing based on radial projections of key frames

    Publication Year: 2005, Page(s):4020 - 4037
    Cited by:  Papers (60)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (792 KB) | HTML iconHTML

    Robust signal hashing defines a feature vector that characterizes the signal, independently of "nonsignificant" distortions of its content. When dealing with images, the considered distortions are typically due to compression or small geometrical manipulations. In other words, robustness means that images that are visually indistinguishable should produce equal or similar hash values. To discrimin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On orientation and anisotropy estimation for online fingerprint authentication

    Publication Year: 2005, Page(s):4038 - 4049
    Cited by:  Papers (9)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2480 KB) | HTML iconHTML

    Local dominant orientation estimation is one of the most important operations in almost all automatic fingerprint authentication systems. Robust orientation and anisotropy estimation improves the system's reliability in handling low-quality fingerprints, which is crucial for the system's massive application such as securing multimedia. This paper analyzes the robustness of the orientation and anis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Odyssey 2006: The Speaker and Language Recognition Workshop

    Publication Year: 2005, Page(s): 4050
    Request permission for commercial reuse | PDF file iconPDF (642 KB)
    Freely Available from IEEE
  • Electronic Newsletter of the Signal Processing Society

    Publication Year: 2005, Page(s): 4051
    Request permission for commercial reuse | PDF file iconPDF (157 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society 2006 International Workshop on Multimedia Signal Processing

    Publication Year: 2005, Page(s): 4052
    Request permission for commercial reuse | PDF file iconPDF (165 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2005, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Blank page [back cover]

    Publication Year: 2005, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (3 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Transactions on Signal Processing covers novel theory, algorithms, performance analyses and applications of techniques for the processing, understanding, learning, retrieval, mining, and extraction of information from signals

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sergios Theodoridis
University of Athens