My ICIP 2013 Schedule

Note: Your custom schedule will not be saved unless you create a new account or login to an existing account.
  1. Create a login based on your email (takes less than one minute)
  2. Perform 'Paper Search'
  3. Select papers that you desire to save in your personalized schedule
  4. Click on 'My Schedule' to see the current list of selected papers
  5. Click on 'Printable Version' to create a separate window suitable for printing (the header and menu will appear, but will not actually print)

Clicking on the Add button next to a paper title will add that paper to your custom schedule.
Clicking on the Remove button next to a paper will remove that paper from your custom schedule.

MA.L7: Steganography, Watermarking, and Security Applications

Session Type: Oral
Time: Monday, September 16, 10:40 - 13:00
Location: Room 208
Session Chairs: William Puech, University of Montpellier and Pedro Comesana, University of Vigo
 
Presented 10:40 - 11:00
  MA.L7.1: VIDEO STEGANALYSIS BASED ON THE CONSTRAINTS OF MOTION VECTORS
         Xikai Xu; Institute of Automation, Chinese Academy of Sciences
         Jing Dong; Institute of Automation, Chinese Academy of Sciences
         Wei Wang; Institute of Automation, Chinese Academy of Sciences
         Tieniu Tan; Institute of Automation, Chinese Academy of Sciences
 
Presented 11:00 - 11:20
  MA.L7.2: STEGANALYSIS OF JSTEG ALGORITHM BASED ON A NOVEL STATISTICAL MODEL OF QUANTIZED DCT COEFFICIENTS
         Thanh Hai Thai; University of Technology of Troyes
         Rémi Cogranne; University of Technology of Troyes
         Florent Retraint; University of Technology of Troyes
 
Presented 11:20 - 11:40
  MA.L7.3: GENERALIZED TRANSFER COMPONENT ANALYSIS FOR MISMATCHED JPEG STEGANALYSIS
         Xiaofeng Li; Dalian University of Technology
         Xiangwei Kong; Dalian University of Technology
         Bo Wang; Dalian University of Technology
         Yanqing Guo; Dalian University of Technology
         Xingang You; Dalian University of Technology
 
Presented 11:40 - 12:00
  MA.L7.4: ASYMPTOTICALLY OPTIMAL DETECTION OF LSB MATCHING DATA HIDING
         Rémi Cogranne; Troyes University of Technology
         Thanh Hai Thai; Troyes University of Technology
         Florent Retraint; Troyes University of Technology
 
Presented 12:00 - 12:20
  MA.L7.5: AN EFFICIENT SIGN PREDICTION METHOD FOR DCT COEFFICIENTS AND ITS APPLICATION TO REVERSIBLE DATA EMBEDDING IN SCRAMBLED JPEG IMAGE
         Reza Moradi Rad; University of Malaya
         KokSheik Wong; University of Malaya
 
Presented 12:20 - 12:40
  MA.L7.6: A VISUAL DICTIONARY ATTACK ON PICTURE PASSWORDS
         Amir Sadovnik; Cornell University
         Tsuhan Chen; Cornell University