Technical Program
IFS-P2: Data Hiding, Cryptography, and Security Applications |
Session Type: Poster |
Time: Thursday, May 30, 15:20 - 17:20 |
Location: Poster Area C |
Session Chair: Shantanu Rane, Mitsubishi Electric Research Laboratories |
IFS-P2.1: A NOVEL QUANTIZATION-BASED WATERMARKING APPROACH INVARIANT TO GAIN ATTACK |
Mohsen Zareian; Amirkabir University of Technology |
Hamid Reza Tohidypour; University of British Columbia |
Z. Jane Wang; University of British Columbia |
IFS-P2.2: MULTIVARIATE GAUSSIAN MODEL FOR DESIGNING ADDITIVE DISTORTION FOR STEGANOGRAPHY |
Jessica Fridrich; Binghamton University |
Jan Kodovsky; Binghamton University |
IFS-P2.3: PERMUTATION CODES AND STEGANOGRAPHY |
FĂ©lix Balado; University College Dublin |
David Haughton; University College Dublin |
IFS-P2.4: MAXIMIZING PRIVACY IN VARIABLE BIT RATE CODING |
Jiyun Yao; Lehigh University |
Parv Venkitasubramaniam; Lehigh University |
IFS-P2.5: PRIVACY REGION PROTECTION FOR H.264/AVC BY ENCRYPTING THE INTRA PREDICTION MODES WITHOUT DRIFT ERROR IN I FRAMES |
Yongsheng Wang; Queen's University Belfast |
Maire O'Neill; Queen's University Belfast |
Fatih Kurugollu; Queen's University Belfast |
IFS-P2.6: ON OPTIMAL DECISIONS IN AN INTRODUCTION-BASED REPUTATION PROTOCOL |
Richard Al-Bayaty; University of North Florida |
O. Patrick Kreidl; University of North Florida |
IFS-P2.7: NOWHERE TO HIDE: EXPLORING USER-VERIFICATION ACROSS FLICKR ACCOUNTS |
Howard Lei; International Computer Science Institute |
Jaeyoung Choi; International Computer Science Institute |
Gerald Friedland; International Computer Science Institute |