{"title":"Session details: Steganography","authors":"J. Fridrich","doi":"10.1145/3260759","DOIUrl":"https://doi.org/10.1145/3260759","url":null,"abstract":"","PeriodicalId":141738,"journal":{"name":"Proceedings of the 10th ACM workshop on Multimedia and security","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122150095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Fingerprinting & tamperproofing","authors":"Andreas Westfled","doi":"10.1145/3260758","DOIUrl":"https://doi.org/10.1145/3260758","url":null,"abstract":"","PeriodicalId":141738,"journal":{"name":"Proceedings of the 10th ACM workshop on Multimedia and security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124788739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Biometrics & multi-modal methods","authors":"B. Prabhakaran","doi":"10.1145/3260761","DOIUrl":"https://doi.org/10.1145/3260761","url":null,"abstract":"","PeriodicalId":141738,"journal":{"name":"Proceedings of the 10th ACM workshop on Multimedia and security","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133654435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Coding & encryption","authors":"Andreas Westfeld","doi":"10.1145/3260757","DOIUrl":"https://doi.org/10.1145/3260757","url":null,"abstract":"","PeriodicalId":141738,"journal":{"name":"Proceedings of the 10th ACM workshop on Multimedia and security","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134592151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Steganalysis","authors":"Andrew D. Ker","doi":"10.1145/3260760","DOIUrl":"https://doi.org/10.1145/3260760","url":null,"abstract":"","PeriodicalId":141738,"journal":{"name":"Proceedings of the 10th ACM workshop on Multimedia and security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133387337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Watermarking attacks","authors":"C. Vielhauer","doi":"10.1145/3260762","DOIUrl":"https://doi.org/10.1145/3260762","url":null,"abstract":"","PeriodicalId":141738,"journal":{"name":"Proceedings of the 10th ACM workshop on Multimedia and security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124326478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Watermarking","authors":"P. Bas","doi":"10.1145/3260756","DOIUrl":"https://doi.org/10.1145/3260756","url":null,"abstract":"","PeriodicalId":141738,"journal":{"name":"Proceedings of the 10th ACM workshop on Multimedia and security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127402400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Forensics","authors":"J. Dittmann","doi":"10.1145/3260755","DOIUrl":"https://doi.org/10.1145/3260755","url":null,"abstract":"","PeriodicalId":141738,"journal":{"name":"Proceedings of the 10th ACM workshop on Multimedia and security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128117250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Keynote","authors":"Andrew D. Ker","doi":"10.1145/3260754","DOIUrl":"https://doi.org/10.1145/3260754","url":null,"abstract":"","PeriodicalId":141738,"journal":{"name":"Proceedings of the 10th ACM workshop on Multimedia and security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126413683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}