Technical Program
IFS-P2: Data Hiding, Cryptography, and Security Applications |
| Session Type: Poster |
| Time: Thursday, May 30, 15:20 - 17:20 |
| Location: Poster Area C |
| Session Chair: Shantanu Rane, Mitsubishi Electric Research Laboratories |
| IFS-P2.1: A NOVEL QUANTIZATION-BASED WATERMARKING APPROACH INVARIANT TO GAIN ATTACK |
| Mohsen Zareian; Amirkabir University of Technology |
| Hamid Reza Tohidypour; University of British Columbia |
| Z. Jane Wang; University of British Columbia |
| IFS-P2.2: MULTIVARIATE GAUSSIAN MODEL FOR DESIGNING ADDITIVE DISTORTION FOR STEGANOGRAPHY |
| Jessica Fridrich; Binghamton University |
| Jan Kodovsky; Binghamton University |
| IFS-P2.3: PERMUTATION CODES AND STEGANOGRAPHY |
| Félix Balado; University College Dublin |
| David Haughton; University College Dublin |
| IFS-P2.4: MAXIMIZING PRIVACY IN VARIABLE BIT RATE CODING |
| Jiyun Yao; Lehigh University |
| Parv Venkitasubramaniam; Lehigh University |
| IFS-P2.5: PRIVACY REGION PROTECTION FOR H.264/AVC BY ENCRYPTING THE INTRA PREDICTION MODES WITHOUT DRIFT ERROR IN I FRAMES |
| Yongsheng Wang; Queen's University Belfast |
| Maire O'Neill; Queen's University Belfast |
| Fatih Kurugollu; Queen's University Belfast |
| IFS-P2.6: ON OPTIMAL DECISIONS IN AN INTRODUCTION-BASED REPUTATION PROTOCOL |
| Richard Al-Bayaty; University of North Florida |
| O. Patrick Kreidl; University of North Florida |
| IFS-P2.7: NOWHERE TO HIDE: EXPLORING USER-VERIFICATION ACROSS FLICKR ACCOUNTS |
| Howard Lei; International Computer Science Institute |
| Jaeyoung Choi; International Computer Science Institute |
| Gerald Friedland; International Computer Science Institute |
