Session I: Steganography and Steganalysis -- A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography -- Information Transmission and Steganography -- On the Existence of Perfect Stegosystems -- Towards Multi-class Blind Steganalyzer for JPEG Images -- Session II: Fingerprinting -- An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption -- C…
Invited Lecture -- Reversible Data Hiding -- Fingerprinting Curves -- Informed Detection Revisited -- Session I: Systems -- A Counter-Geometric Distortions Data Hiding Scheme Using Double Channels in Color Images -- A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition -- Better Use of Human Visual Model in Watermarking Based on Li…
Global optimization -- The Motivation for Differential Evolution -- Critical values for the control parameters of differential evolution algorithms -- The Differential Evolution Algorithm -- Fast Evolution Strategies -- Benchmarking Differential Evolution -- On the usage of differential evolution for function optimization -- Problem Domains -- Shape design and optimization by genetic algorithm …
Invited Lecture -- Robust Airline Fleet Assignment:Imposing Station Purity Using Station Decomposition -- Computing the Arrow-Debreu Competitive Market Equilibrium and Its Extensions -- Contributed Papers -- Complexity of Minimal Tree Routing and Coloring -- Energy Efficient Broadcasting and Multicasting in Static Wireless Ad Hoc Networks -- An Algorithm for Nonconvex Lower Semicontinuous Optim…
Fundamentals -- Foiling the Adversary -- Fingerprinting -- Success Amplification and Random Sampling -- Abundance of Witnesses -- Optimization and Random Rounding.Randomness is a powerful phenomenon that can be harnessed to solve various problems in all areas of computer science. Randomized algorithms are often more efficient, simpler and, surprisingly, also more reliable than their determinist…
Oral Presentations -- Blurred Correlation Versus Correlation Blur -- A Scale Invariant Covariance Structure on Jet Space -- Essential Loops and Their Relevance for Skeletons and Symmetry Sets -- Pre-symmetry Sets of 3D Shapes -- Deep Structure of Images in Populations Via Geometric Models in Populations -- Estimating the Statistics of Multi-object Anatomic Geometry Using Inter-object Relationsh…
Basic Tools and Techniques -- The Universal Generating Function in Reliability Analysis of Binary Systems -- to Multi-state Systems -- Universal Generating Function in Analysis of Series-Parallel Multi-state Systems -- Universal Generating Function in Optimization of Series-Parallel Multi-state Systems -- Universal Generating Function in Analysis and Optimization of Special Types of Multi-state…
Streams, Security and Scalability -- Towards Privacy-Enhanced Authorization Policies and Languages -- Revocation of Obligation and Authorisation Policy Objects -- Role Slices: A Notation for RBAC Permission Assignment and Enforcement -- Designing Secure Indexes for Encrypted Databases -- Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases -- Verified Query Resul…
An NPR Technique for Pointillistic and Mosaic Images with Impressionist Color Arrangement -- Active View Optimization for Viewing Objects in Motion -- Adding Hand Motion to the Motion Capture Based Character Animation -- Oversimplified Euler Operators for a Non-oriented, Non-manifold B-Rep Data Structure -- The Number of Gaps in Binary Pictures -- Video Codec for Classical Cartoon Animations wi…
Cryptanalysis -- The Second-Preimage Attack on MD4 -- On the Security of Certificateless Signature Schemes from Asiacrypt 2003 -- On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme -- Cryptanalysis of Two Group Key Management Protocols for Secure Multicast -- Security Analysis of Password-Authenticated Key Agreement Protocols -- Intrusion Detection and Viruses -…