Scott Craver
Scott Craver
Professor of electrical and computer engineering, binghamton university
Verified email at binghamton.edu
Title
Cited by
Cited by
Year
Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
S Craver, N Memon, BL Yeo, MM Yeung
IEEE Journal on Selected areas in Communications 16 (4), 573-586, 1998
8501998
Can invisible watermarks resolve rightful ownerships?
SA Craver, ND Memon, BL Yeo, MM Yeung
Storage and Retrieval for Image and Video Databases V 3022, 310-321, 1997
3841997
Moving steganography and steganalysis from the laboratory into the real world
AD Ker, P Bas, R Böhme, R Cogranne, S Craver, T Filler, J Fridrich, ...
Proceedings of the first ACM workshop on Information hiding and multimedia …, 2013
2582013
On public-key steganography in the presence of an active warden
S Craver
International Workshop on Information Hiding, 355-368, 1998
1851998
Technical trials and legal tribulations
S Craver, BL Yeo, M Yeung
Communications of the ACM 41 (7), 45-54, 1998
1291998
Reading Between the Lines: Lessons from the SDMI Challenge.
S Craver, M Wu, B Liu, A Stubblefield, B Swartzlander, DS Wallach, ...
USENIX security symposium, 2001
1282001
Zero knowledge watermark detection
S Craver
International Workshop on Information Hiding, 101-116, 1999
1231999
On the invertibility of invisible watermarking techniques
S Craver, N Memon, BL Yeo, MM Yeung
Proceedings of International Conference on Image Processing 1, 540-543, 1997
1061997
What can we reasonably expect from watermarks?
SA Craver, M Wu, B Liu
Proceedings of the 2001 IEEE Workshop on the Applications of Signal …, 2001
532001
Copyright protection protocols based on asymmetric watermarking
S Craver, S Katzenbeisser
Communications and Multimedia Security Issues of the New Century, 159-170, 2001
492001
Analysis of attacks on SDMI audio watermarks
M Wu, S Craver, EW Felten, B Liu
2001 IEEE International Conference on Acoustics, Speech, and Signal …, 2001
462001
Security analysis of public key watermarking schemes
SA Craver, S Katzenbeisser
Mathematics of Data/Image Coding, Compression, and Encryption IV, with …, 2001
422001
Multilinearization data structure for image browsing
SA Craver, BL Yeo, MM Yeung
Storage and Retrieval for Image and Video Databases VII 3656, 155-166, 1998
341998
A supraliminal channel in a videoconferencing application
S Craver, E Li, J Yu, I Atakli
International Workshop on Information Hiding, 283-293, 2008
172008
Toward the identification of DSLR lenses by chromatic aberration
J Yu, S Craver, E Li
Media Watermarking, Security, and Forensics III 7880, 788010, 2011
152011
A supraliminal channel in a wireless phone application
E Li, S Craver
Proceedings of the 11th ACM workshop on Multimedia and security, 151-154, 2009
152009
Robustness of copyright marking systems
S Craver, A Perrig, FAP Petitcolas
Information hiding techniques for steganography and digital watermarking, 2000
142000
An implementation of, and attacks on, zero-knowledge watermarking
S Craver, B Liu, W Wolf
International Workshop on Information Hiding, 1-12, 2004
132004
Information Hiding: 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers
T Filler, T Pevny, S Craver, A Ker
Springer Science & Business Media, 2011
112011
How we broke the BOWS watermark
S Craver, I Atakli, J Yu
Security, Steganography, and Watermarking of Multimedia Contents IX 6505, 65051C, 2007
112007
The system can't perform the operation now. Try again later.
Articles 1–20