My ICASSP 2013 Schedule

Note: Your custom schedule will not be saved unless you create a new account or login to an existing account.
  1. Create a login based on your email (takes less than one minute)
  2. Perform 'Paper Search'
  3. Select papers that you desire to save in your personalized schedule
  4. Click on 'My Schedule' to see the current list of selected papers
  5. Click on 'Printable Version' to create a separate window suitable for printing (the header and menu will appear, but will not actually print)

Clicking on the Add button next to a paper title will add that paper to your custom schedule.
Clicking on the Remove button next to a paper will remove that paper from your custom schedule.

IFS-P2: Data Hiding, Cryptography, and Security Applications

Session Type: Poster
Time: Thursday, May 30, 15:20 - 17:20
Location: Poster Area C
Session Chair: Shantanu Rane, Mitsubishi Electric Research Laboratories
 
  IFS-P2.1: A NOVEL QUANTIZATION-BASED WATERMARKING APPROACH INVARIANT TO GAIN ATTACK
         Mohsen Zareian; Amirkabir University of Technology
         Hamid Reza Tohidypour; University of British Columbia
         Z. Jane Wang; University of British Columbia
 
  IFS-P2.2: MULTIVARIATE GAUSSIAN MODEL FOR DESIGNING ADDITIVE DISTORTION FOR STEGANOGRAPHY
         Jessica Fridrich; Binghamton University
         Jan Kodovsky; Binghamton University
 
  IFS-P2.3: PERMUTATION CODES AND STEGANOGRAPHY
         FĂ©lix Balado; University College Dublin
         David Haughton; University College Dublin
 
  IFS-P2.4: MAXIMIZING PRIVACY IN VARIABLE BIT RATE CODING
         Jiyun Yao; Lehigh University
         Parv Venkitasubramaniam; Lehigh University
 
  IFS-P2.5: PRIVACY REGION PROTECTION FOR H.264/AVC BY ENCRYPTING THE INTRA PREDICTION MODES WITHOUT DRIFT ERROR IN I FRAMES
         Yongsheng Wang; Queen's University Belfast
         Maire O'Neill; Queen's University Belfast
         Fatih Kurugollu; Queen's University Belfast
 
  IFS-P2.6: ON OPTIMAL DECISIONS IN AN INTRODUCTION-BASED REPUTATION PROTOCOL
         Richard Al-Bayaty; University of North Florida
         O. Patrick Kreidl; University of North Florida
 
  IFS-P2.7: NOWHERE TO HIDE: EXPLORING USER-VERIFICATION ACROSS FLICKR ACCOUNTS
         Howard Lei; International Computer Science Institute
         Jaeyoung Choi; International Computer Science Institute
         Gerald Friedland; International Computer Science Institute