Follow
Scott Craver
Scott Craver
Professor of electrical and computer engineering, binghamton university
Verified email at binghamton.edu
Title
Cited by
Cited by
Year
Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
S Craver, N Memon, BL Yeo, MM Yeung
IEEE Journal on Selected areas in Communications 16 (4), 573-586, 1998
8681998
Can invisible watermarks resolve rightful ownerships?
SA Craver, ND Memon, BL Yeo, MM Yeung
Storage and Retrieval for Image and Video Databases V 3022, 310-321, 1997
3981997
Moving steganography and steganalysis from the laboratory into the real world
AD Ker, P Bas, R Böhme, R Cogranne, S Craver, T Filler, J Fridrich, ...
Proceedings of the first ACM workshop on Information hiding and multimedia …, 2013
3232013
On public-key steganography in the presence of an active warden
S Craver
International Workshop on Information Hiding, 355-368, 1998
2051998
Zero knowledge watermark detection
S Craver
Information Hiding: Third International Workshop, IH’99, Dresden, Germany …, 2000
1342000
Reading Between the Lines: Lessons from the {SDMI} Challenge
SA Craver, M Wu, B Liu, B Swartzlander, DS Wallach, D Dean, EW Felten
10th USENIX Security Symposium (USENIX Security 01), 2001
1332001
Technical trials and legal tribulations
S Craver, BL Yeo, M Yeung
Communications of the ACM 41 (7), 45-54, 1998
1311998
On the invertibility of invisible watermarking techniques
S Craver, N Memon, BL Yeo, MM Yeung
Proceedings of International Conference on Image Processing 1, 540-543, 1997
1111997
Copyright protection protocols based on asymmetric watermarking: The ticket concept
S Craver, S Katzenbeisser
Communications and Multimedia Security Issues of the New Century: IFIP TC6 …, 2001
512001
What can we reasonably expect from watermarks?
SA Craver, M Wu, B Liu
Proceedings of the 2001 IEEE Workshop on the Applications of Signal …, 2001
502001
Security analysis of public key watermarking schemes
SA Craver, S Katzenbeisser
Mathematics of Data/Image Coding, Compression, and Encryption IV, with …, 2001
452001
Analysis of attacks on SDMI audio watermarks
M Wu, S Craver, EW Felten, B Liu
2001 IEEE International Conference on Acoustics, Speech, and Signal …, 2001
442001
Multilinearization data structure for image browsing
SA Craver, BL Yeo, MM Yeung
Storage and Retrieval for Image and Video Databases VII 3656, 155-166, 1998
371998
Toward the identification of DSLR lenses by chromatic aberration
J Yu, S Craver, E Li
Media Watermarking, Security, and Forensics III 7880, 373-381, 2011
192011
A supraliminal channel in a videoconferencing application
S Craver, E Li, J Yu, I Atakli
Information Hiding: 10th International Workshop, IH 2008, Santa Barbara, CA …, 2008
182008
A supraliminal channel in a wireless phone application
E Li, S Craver
Proceedings of the 11th ACM workshop on Multimedia and security, 151-154, 2009
162009
An implementation of, and attacks on, zero-knowledge watermarking
S Craver, B Liu, W Wolf
Information Hiding: 6th International Workshop, IH 2004, Toronto, Canada …, 2005
142005
Lessons learned from SDMI
S Craver, JP Stern
2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No. 01TH8564 …, 2001
142001
Robustness of copyright marking systems
S Craver, A Perrig, FAP Petitcolas
Information hiding techniques for steganography and digital watermarking, 2000
142000
Additive attacks on speaker recognition
AF Baroughi, S Craver
Media Watermarking, Security, and Forensics 2014 9028, 269-281, 2014
102014
The system can't perform the operation now. Try again later.
Articles 1–20