Scott Craver
Scott Craver
Professor of electrical and computer engineering, binghamton university
Verifierad e-postadress på binghamton.edu
Citeras av
Citeras av
Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
S Craver, N Memon, BL Yeo, MM Yeung
IEEE Journal on Selected areas in Communications 16 (4), 573-586, 1998
Can invisible watermarks resolve rightful ownerships?
SA Craver, ND Memon, BL Yeo, MM Yeung
Storage and Retrieval for Image and Video Databases V 3022, 310-321, 1997
Moving steganography and steganalysis from the laboratory into the real world
AD Ker, P Bas, R Böhme, R Cogranne, S Craver, T Filler, J Fridrich, ...
Proceedings of the first ACM workshop on Information hiding and multimedia …, 2013
On public-key steganography in the presence of an active warden
S Craver
International Workshop on Information Hiding, 355-368, 1998
Zero knowledge watermark detection
S Craver
Information Hiding: Third International Workshop, IH’99, Dresden, Germany …, 2000
Technical trials and legal tribulations
S Craver, BL Yeo, M Yeung
Communications of the ACM 41 (7), 45-54, 1998
Reading Between the Lines: Lessons from the {SDMI} Challenge
SA Craver, M Wu, B Liu, B Swartzlander, DS Wallach, D Dean, EW Felten
10th USENIX Security Symposium (USENIX Security 01), 2001
On the invertibility of invisible watermarking techniques
S Craver, N Memon, BL Yeo, MM Yeung
Proceedings of international conference on image processing 1, 540-543, 1997
What can we reasonably expect from watermarks?
SA Craver, M Wu, B Liu
Proceedings of the 2001 IEEE Workshop on the Applications of Signal …, 2001
Copyright protection protocols based on asymmetric watermarking: The ticket concept
S Craver, S Katzenbeisser
Communications and Multimedia Security Issues of the New Century: IFIP TC6 …, 2001
Security analysis of public key watermarking schemes
SA Craver, S Katzenbeisser
Mathematics of Data/Image Coding, Compression, and Encryption IV, with …, 2001
Analysis of attacks on SDMI audio watermarks
M Wu, S Craver, EW Felten, B Liu
2001 IEEE International Conference on Acoustics, Speech, and Signal …, 2001
Multilinearization data structure for image browsing
SA Craver, BL Yeo, MM Yeung
Storage and Retrieval for Image and Video Databases VII 3656, 155-166, 1998
Toward the identification of DSLR lenses by chromatic aberration
J Yu, S Craver, E Li
Media Watermarking, Security, and Forensics III 7880, 373-381, 2011
A supraliminal channel in a videoconferencing application
S Craver, E Li, J Yu, I Atakli
Information Hiding: 10th International Workshop, IH 2008, Santa Barbara, CA …, 2008
A supraliminal channel in a wireless phone application
E Li, S Craver
Proceedings of the 11th ACM workshop on Multimedia and security, 151-154, 2009
An implementation of, and attacks on, zero-knowledge watermarking
S Craver, B Liu, W Wolf
Information Hiding: 6th International Workshop, IH 2004, Toronto, Canada …, 2005
Lessons learned from SDMI
S Craver, JP Stern
2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No. 01TH8564 …, 2001
Robustness of copyright marking systems
S Craver, A Perrig, FAP Petitcolas
Information hiding techniques for steganography and digital watermarking, 2000
Additive attacks on speaker recognition
AF Baroughi, S Craver
Media Watermarking, Security, and Forensics 2014 9028, 269-281, 2014
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20