MA.L7: Steganography, Watermarking, and Security Applications |
Session Type: Oral
|
Time: Monday, September 16, 10:40 - 13:00
|
Location: Room 208
|
Session Chairs: William Puech, University of Montpellier and Pedro Comesana, University of Vigo
|
|
Presented 10:40 - 11:00 |
MA.L7.1: VIDEO STEGANALYSIS BASED ON THE CONSTRAINTS OF MOTION VECTORS |
Xikai Xu; Institute of Automation, Chinese Academy of Sciences |
Jing Dong; Institute of Automation, Chinese Academy of Sciences |
Wei Wang; Institute of Automation, Chinese Academy of Sciences |
Tieniu Tan; Institute of Automation, Chinese Academy of Sciences |
|
Presented 11:00 - 11:20 |
MA.L7.2: STEGANALYSIS OF JSTEG ALGORITHM BASED ON A NOVEL STATISTICAL MODEL OF QUANTIZED DCT COEFFICIENTS |
Thanh Hai Thai; University of Technology of Troyes |
Rémi Cogranne; University of Technology of Troyes |
Florent Retraint; University of Technology of Troyes |
|
Presented 11:20 - 11:40 |
MA.L7.3: GENERALIZED TRANSFER COMPONENT ANALYSIS FOR MISMATCHED JPEG STEGANALYSIS |
Xiaofeng Li; Dalian University of Technology |
Xiangwei Kong; Dalian University of Technology |
Bo Wang; Dalian University of Technology |
Yanqing Guo; Dalian University of Technology |
Xingang You; Dalian University of Technology |
|
Presented 11:40 - 12:00 |
MA.L7.4: ASYMPTOTICALLY OPTIMAL DETECTION OF LSB MATCHING DATA HIDING |
Rémi Cogranne; Troyes University of Technology |
Thanh Hai Thai; Troyes University of Technology |
Florent Retraint; Troyes University of Technology |
|
Presented 12:00 - 12:20 |
MA.L7.5: AN EFFICIENT SIGN PREDICTION METHOD FOR DCT COEFFICIENTS AND ITS APPLICATION TO REVERSIBLE DATA EMBEDDING IN SCRAMBLED JPEG IMAGE |
Reza Moradi Rad; University of Malaya |
KokSheik Wong; University of Malaya |
|
Presented 12:20 - 12:40 |
MA.L7.6: A VISUAL DICTIONARY ATTACK ON PICTURE PASSWORDS |
Amir Sadovnik; Cornell University |
Tsuhan Chen; Cornell University |
|