Follow
Scott Craver
Scott Craver
Professor of electrical and computer engineering, binghamton university
Verified email at binghamton.edu
Title
Cited by
Cited by
Year
Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
S Craver, N Memon, BL Yeo, MM Yeung
IEEE Journal on Selected areas in Communications 16 (4), 573-586, 1998
8581998
Can invisible watermarks resolve rightful ownerships?
SA Craver, ND Memon, BL Yeo, MM Yeung
Storage and Retrieval for Image and Video Databases V 3022, 310-321, 1997
3931997
Moving steganography and steganalysis from the laboratory into the real world
AD Ker, P Bas, R Böhme, R Cogranne, S Craver, T Filler, J Fridrich, ...
Proceedings of the first ACM workshop on Information hiding and multimedia …, 2013
2952013
On public-key steganography in the presence of an active warden
S Craver
Information Hiding: Second International Workshop, IH’98 Portland, Oregon …, 1998
2001998
Technical trials and legal tribulations
S Craver, BL Yeo, M Yeung
Communications of the ACM 41 (7), 45-54, 1998
1321998
Reading Between the Lines: Lessons from the SDMI Challenge.
S Craver, M Wu, B Liu, A Stubblefield, B Swartzlander, DS Wallach, ...
USENIX security symposium, 2001
1302001
Zero knowledge watermark detection
S Craver
Information Hiding: Third International Workshop, IH’99, Dresden, Germany …, 2000
1262000
On the invertibility of invisible watermarking techniques
S Craver, N Memon, BL Yeo, MM Yeung
Proceedings of International Conference on Image Processing 1, 540-543, 1997
1061997
Copyright protection protocols based on asymmetric watermarking: The ticket concept
S Craver, S Katzenbeisser
Communications and Multimedia Security Issues of the New Century: IFIP TC6 …, 2001
502001
What can we reasonably expect from watermarks?
SA Craver, M Wu, B Liu
Proceedings of the 2001 IEEE Workshop on the Applications of Signal …, 2001
482001
Analysis of attacks on SDMI audio watermarks
M Wu, S Craver, EW Felten, B Liu
2001 IEEE International Conference on Acoustics, Speech, and Signal …, 2001
472001
Security analysis of public key watermarking schemes
SA Craver, S Katzenbeisser
Mathematics of Data/Image Coding, Compression, and Encryption IV, with …, 2001
452001
Multilinearization data structure for image browsing
SA Craver, BL Yeo, MM Yeung
Storage and Retrieval for Image and Video Databases VII 3656, 155-166, 1998
361998
Toward the identification of DSLR lenses by chromatic aberration
J Yu, S Craver, E Li
Media Watermarking, Security, and Forensics III 7880, 373-381, 2011
182011
A supraliminal channel in a videoconferencing application
S Craver, E Li, J Yu, I Atakli
Information Hiding: 10th International Workshop, IH 2008, Santa Barbara, CA …, 2008
182008
A supraliminal channel in a wireless phone application
E Li, S Craver
Proceedings of the 11th ACM workshop on Multimedia and security, 151-154, 2009
162009
Robustness of copyright marking systems
S Craver, A Perrig, FAP Petitcolas
Information hiding techniques for steganography and digital watermarking, 2000
152000
An implementation of, and attacks on, zero-knowledge watermarking
S Craver, B Liu, W Wolf
Information Hiding: 6th International Workshop, IH 2004, Toronto, Canada …, 2005
132005
Lessons learned from SDMI
S Craver, JP Stern
2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No. 01TH8564 …, 2001
112001
Subset selection circumvents the square root law
S Craver, J Yu
Media Forensics and Security II 7541, 20-25, 2010
102010
The system can't perform the operation now. Try again later.
Articles 1–20