Book Volume 4105 2006

Multimedia Content Representation, Classification and Security

International Workshop, MRCS 2006, Istanbul, Turkey, September 11-13, 2006. Proceedings


ISBN: 978-3-540-39392-4 (Print) 978-3-540-39393-1 (Online)

Table of contents (104 chapters)

previous Page of 6
  1. Front Matter

    Pages -

  2. Invited Talk

    1. Chapter

      Pages 1-1

      Multimedia Security: The Good, the Bad, and the Ugly

  3. Biometric Recognition

    1. Chapter

      Pages 2-9

      Generation and Evaluation of Brute-Force Signature Forgeries

    2. Chapter

      Pages 10-16

      The Quality of Fingerprint Scanners and Its Impact on the Accuracy of Fingerprint Recognition Algorithms

    3. Chapter

      Pages 17-25

      Correlation-Based Similarity Between Signals for Speaker Verification with Limited Amount of Speech Data

    4. Chapter

      Pages 26-33

      Human Face Identification from Video Based on Frequency Domain Asymmetry Representation Using Hidden Markov Models

    5. Chapter

      Pages 34-41

      Utilizing Independence of Multimodal Biometric Matchers

  4. Invited Talk

    1. Chapter

      Pages 42-42

      Discreet Signaling: From the Chinese Emperors to the Internet

  5. Multimedia Content Security: Steganography/Watermarking/Authentication

    1. Chapter

      Pages 43-48

      Real-Time Steganography in Compressed Video

    2. Chapter

      Pages 49-56

      A Feature Selection Methodology for Steganalysis

    3. Chapter

      Pages 57-65

      Multiple Messages Embedding Using DCT-Based Mod4 Steganographic Method

    4. Chapter

      Pages 66-73

      SVD Adapted DCT Domain DC Subband Image Watermarking Against Watermark Ambiguity

    5. Chapter

      Pages 74-81

      3D Animation Watermarking Using PositionInterpolator

    6. Chapter

      Pages 82-89

      Color Images Watermarking Based on Minimization of Color Differences

    7. Chapter

      Pages 90-97

      Improved Pixel-Wise Masking for Image Watermarking

    8. Chapter

      Pages 98-105

      Additive vs. Image Dependent DWT-DCT Based Watermarking

    9. Chapter

      Pages 106-113

      A Robust Blind Audio Watermarking Using Distribution of Sub-band Signals

    10. Chapter

      Pages 114-120

      Dirty-Paper Writing Based on LDPC Codes for Data Hiding

    11. Chapter

      Pages 121-127

      Key Agreement Protocols Based on the Center Weighted Jacket Matrix as a Symmetric Co-cyclic Matrix

    12. Chapter

      Pages 128-135

      A Hardware-Implemented Truly Random Key Generator for Secure Biometric Authentication Systems

  6. Classification for Biometric Recognition

    1. Chapter

      Pages 136-142

      Kernel Fisher LPP for Face Recognition

previous Page of 6