Scott Craver
Scott Craver
Professor of electrical and computer engineering, binghamton university
Verified email at
Cited by
Cited by
Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
S Craver, N Memon, BL Yeo, MM Yeung
IEEE Journal on Selected areas in Communications 16 (4), 573-586, 1998
Can invisible watermarks resolve rightful ownerships?
SA Craver, ND Memon, BL Yeo, MM Yeung
Storage and Retrieval for Image and Video Databases V 3022, 310-321, 1997
Moving steganography and steganalysis from the laboratory into the real world
AD Ker, P Bas, R Böhme, R Cogranne, S Craver, T Filler, J Fridrich, ...
Proceedings of the first ACM workshop on Information hiding and multimedia …, 2013
On public-key steganography in the presence of an active warden
S Craver
International Workshop on Information Hiding, 355-368, 1998
Technical trials and legal tribulations
S Craver, BL Yeo, M Yeung
Communications of the ACM 41 (7), 45-54, 1998
Reading Between the Lines: Lessons from the SDMI Challenge.
S Craver, M Wu, B Liu, A Stubblefield, B Swartzlander, DS Wallach, ...
USENIX security symposium, 2001
Zero knowledge watermark detection
S Craver
International Workshop on Information Hiding, 101-116, 1999
On the invertibility of invisible watermarking techniques
S Craver, N Memon, BL Yeo, MM Yeung
Proceedings of International Conference on Image Processing 1, 540-543, 1997
What can we reasonably expect from watermarks?
SA Craver, M Wu, B Liu
Proceedings of the 2001 IEEE Workshop on the Applications of Signal …, 2001
Copyright protection protocols based on asymmetric watermarking
S Craver, S Katzenbeisser
Communications and Multimedia Security Issues of the New Century, 159-170, 2001
Analysis of attacks on SDMI audio watermarks
M Wu, S Craver, EW Felten, B Liu
2001 IEEE International Conference on Acoustics, Speech, and Signal …, 2001
Security analysis of public key watermarking schemes
SA Craver, S Katzenbeisser
Mathematics of Data/Image Coding, Compression, and Encryption IV, with …, 2001
Multilinearization data structure for image browsing
SA Craver, BL Yeo, MM Yeung
Storage and Retrieval for Image and Video Databases VII 3656, 155-166, 1998
A supraliminal channel in a videoconferencing application
S Craver, E Li, J Yu, I Atakli
International Workshop on Information Hiding, 283-293, 2008
Toward the identification of DSLR lenses by chromatic aberration
J Yu, S Craver, E Li
Media Watermarking, Security, and Forensics III 7880, 788010, 2011
A supraliminal channel in a wireless phone application
E Li, S Craver
Proceedings of the 11th ACM workshop on Multimedia and security, 151-154, 2009
Robustness of copyright marking systems
S Craver, A Perrig, FAP Petitcolas
Information hiding techniques for steganography and digital watermarking, 2000
An implementation of, and attacks on, zero-knowledge watermarking
S Craver, B Liu, W Wolf
International Workshop on Information Hiding, 1-12, 2004
Information Hiding: 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers
T Filler, T Pevny, S Craver, A Ker
Springer Science & Business Media, 2011
How we broke the BOWS watermark
S Craver, I Atakli, J Yu
Security, Steganography, and Watermarking of Multimedia Contents IX 6505, 65051C, 2007
The system can't perform the operation now. Try again later.
Articles 1–20