Scott Craver

According to our database1, Scott Craver authored at least 40 papers between 1997 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Applying a Zero-Knowledge Watermarking Protocol to Secure Elections.
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023

2022
A video auditing system for display-based voting machines.
Proceedings of the Media Watermarking, 2022

2019
Nondestructive ciphertext injection in document files.
Proceedings of the Media Watermarking, 2019

2016
Ambiguity Attack on the Integrity of a Genuine Picture by Producing Another Picture Immune to Generic Digital Forensic Test.
Proceedings of the Media Watermarking, 2016

Attacks on Speaker Identification Systems Constrained to Speech-to-Text Decoding.
Proceedings of the Media Watermarking, 2016

2015
Capacity Limits of Pseudorandom Channels in Deception Problems.
IEEE Trans. Inf. Forensics Secur., 2015

The non-trusty clown attack on model-based speaker recognition systems.
Proceedings of the Media Watermarking, 2015

Design of a steganographic virtual operating system.
Proceedings of the Media Watermarking, 2015

A Negative Number Vulnerability for Histogram-based Face Recognition Systems.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

2014
Additive attacks on speaker recognition.
Proceedings of the Media Watermarking, 2014

2013
Moving steganography and steganalysis from the laboratory into the real world.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

2012
A fast, automatic camera image stabilization benchmarking scheme.
Proceedings of the Image Quality and System Performance IX, 2012

2011
A square-root law for active wardens.
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011

Toward the identification of DSLR lenses by chromatic aberration.
Proceedings of the Media Forensics and Security III, 2011

2010
Subset selection circumvents the square root law.
Proceedings of the Media Forensics and Security II, 2010

2009
A supraliminal channel in a wireless phone application.
Proceedings of the Multimedia and Security Workshop, 2009

BLINK: pixel-domain encryption for secure document management.
Proceedings of the Multimedia and Security Workshop, 2009

Protocols for data hiding in pseudo-random state.
Proceedings of the Media Forensics and Security I, 2009

BLINK: Securing Information to the Last Connection.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
A Supraliminal Channel in a Videoconferencing Application.
Proceedings of the Information Hiding, 10th International Workshop, 2008

2007
Reverse-Engineering a Watermark Detector Using an Oracle.
EURASIP J. Inf. Secur., 2007

Reverse-engineering a detector with false alarms.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

How we broke the BOWS watermark.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

2006
Fingerprinting with Wow.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

An Improved Asymmetric Watermarking System Using Matrix Embedding.
Proceedings of the Information Hiding, 8th International Workshop, 2006

Vicarious infringement creates a privacy ceiling.
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006

2004
An Implementation of, and Attacks on, Zero-Knowledge Watermarking.
Proceedings of the Information Hiding, 6th International Workshop, 2004

2002
Return of ambiguity attacks.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Detectors for Echo Hiding Systems.
Proceedings of the Information Hiding, 5th International Workshop, 2002

2001
Reading Between the Lines: Lessons from the SDMI Challenge.
Proceedings of the 10th USENIX Security Symposium, 2001

Lessons learned from SDMI.
Proceedings of the Fourth IEEE Workshop on Multimedia Signal Processing, 2001

Analysis of attacks on SDMI audio watermarks.
Proceedings of the IEEE International Conference on Acoustics, 2001

Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001

1999
Multilinearization data structure for image browsing.
Proceedings of the Storage and Retrieval for Image and Video Databases VII, 1999

Zero Knowledge Watermark Detection.
Proceedings of the Information Hiding, Third International Workshop, 1999

1998
Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications.
IEEE J. Sel. Areas Commun., 1998

Technical Trials and Legal Tribulations.
Commun. ACM, 1998

On Public-Key Steganography in the Presence of an Active Warden.
Proceedings of the Information Hiding, 1998

1997
Can Invisible Watermarks Resolve Rightful Ownerships?
Proceedings of the Storage and Retrieval for Image and Video Databases V, 1997

On the Invertibility of Invisible Watermarking Techniques.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997


  Loading...