default search action
11. IWDW 2012: Shanghai, China
- Yun Q. Shi, Hyoung-Joong Kim, Fernando Pérez-González:
Digital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7809, Springer 2013, ISBN 978-3-642-40098-8
Invited Lectures (Abstracts)
- Yane Zhong, Fangjun Huang, Dong Zhang:
New Channel Selection Criterion for Spatial Domain Steganography. 1-7 - Yuanzhi Qi, Xiaolong Li, Bin Wang, Bin Yang:
A Study of Optimal Matrix for Efficient Matrix Embedding in. 8-18 - Licong Chen, Yun Q. Shi, Patchara Sutthiwan, Xinxin Niu:
A Novel Mapping Scheme for Steganalysis. 19-33 - Yanqing Guo, Xiangwei Kong, Bo Wang, Qian Xiao:
Steganalysis of LSB Matching Based on the Sum Features of Average Co-occurrence Matrix Using Image Estimation. 34-43 - Fei Peng, Xiaolong Li, Bin Yang:
Calibration Based Reliable Detector for Detecting LSB Matching Steganography. 44-53 - Zheng Zhao, Fenlin Liu, Xiangyang Luo, Xin Xie, Lu Yu:
LSB Replacement Steganography Software Detection Based on Model Checking. 54-68 - Vasiliy Sachnev, Hyoung Joong Kim:
An Attempt to Generalize Distortion Measure for JPEG Steganography. 69-82 - Yagiz Yasaroglu, A. Aydin Alatan:
Optimal Data Embedding in 3D Models for Extraction from 2D Views Using Perspective Invariants. 83-97 - Kazuo Ohzeki, Yuanyu Wei, Yutaka Hirakawa, Kiyotsugu Sato:
Consideration of the Watermark Inversion Attack and Its Invalidation Framework. 98-110 - Huang Zhang, Xiaoqiang Li:
Geometrically Invariant Image Blind Watermarking Based on Speeded-Up Robust Features and DCT Transform. 111-119 - Hongjie He, Fan Chen, Yaoran Huo:
Self-embedding Fragile Watermarking Scheme Combined Average with VQ Encoding. 120-134 - Quan Wen, Yufei Wang:
An Efficient Fragile Web Pages Watermarking for Integrity Protection of XML Documents. 135-144 - Qiyin Zhao, Daqing Chen, Zhi Tao, Ji-Hua Gu:
Image Information Hiding Based on Binary Holography of Iterative Conjugate-Symmetric Extension. 145-155 - Meng Guo, Hongbin Zhang:
High Capacity Data Hiding for Halftone Image Authentication. 156-168 - Minoru Kuribayashi:
Coded Spread Spectrum Watermarking Scheme. 169-183 - Takayuki Yamada, Seiichi Gohshi, Isao Echizen:
Enhancement of Method for Preventing Unauthorized Copying of Displayed Information Using Object Surface Reflection. 184-197 - Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai:
Image Splicing Verification Based on Pixel-Based Alignment Method. 198-212 - Pedro Comesaña, Fernando Pérez-González:
Multimedia Operator Chain Topology and Ordering Estimation Based on Detection and Information Theoretic Tools. 213-227 - Zhaohong Li, Jingyu Ye, Yun-Qing Shi:
Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns. 228-241 - Leida Li, Xuewei Wang, Wei Zhang, Gaobo Yang, Guozhang Hu:
Detecting Removed Object from Video with Stationary Background. 242-252 - Yongjian Hu, Chang-Tsun Li, Zhisheng Lv, Bei-Bei Liu:
Audio Forgery Detection Based on Max Offsets for Cross Correlation between ENF and Reference Signal. 253-266 - Juan Chao, Xinghao Jiang, Tanfeng Sun:
A Novel Video Inter-frame Forgery Model Detection Scheme Based on Optical Flow Consistency. 267-281 - Luyi Chen, Shilin Wang, Shenghong Li, Jianhua Li:
Countering Universal Image Tampering Detection with Histogram Restoration. 282-289 - Wook Jin Shin, Seung-Ho Lee, Hyun-seok Min, Hosik Sohn, Yong Man Ro:
Face Verification Using Color Sparse Representation. 290-299 - Bo Su, Quanqiao Yuan, Yujin Zhang, Mengying Zhai, Shilin Wang:
Rapid Image Splicing Detection Based on Relevance Vector Machine. 300-310 - Zhenghui Liu, Hongxia Wang:
An Efficient Speech Content Authentication Algorithm Based on Coefficients Self-correlation Degree. 311-326 - Xin He, Huiyun Jing, Qi Han, Xiamu Niu:
Saliency-Based Region Log Covariance Feature for Image Copy Detection. 327-335 - Yong Wang, Yanhong Deng, Haojun Wu, Jiwu Huang:
Blind Detection of Electronic Voice Transformation with Natural Disguise. 336-343 - Anjie Peng, Xiangui Kang:
Robust Median Filtering Detection Based on Filtered Residual. 344-357 - Xinpeng Zhang, Chuan Qin, Guangling Sun:
Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence Modulation. 358-367 - Guorong Xuan, Xuefeng Tong, Jianzhong Teng, Xiaojie Zhang, Yun-Qing Shi:
Optimal Histogram-Pair and Prediction-Error Based Image Reversible Data Hiding. 368-383 - Jie Yu, Guopu Zhu, Xiaolong Li, Jianquan Yang:
An Improved Algorithm for Reversible Data Hiding in Encrypted Image. 384-394 - Quan Chen, Shijun Xiang, Xinrong Luo:
Reversible Watermarking for Audio Authentication Based on Integer DCT and Expansion Embedding. 395-409 - Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Tien Dung Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen:
Automatic Anonymous Fingerprinting of Text Posted on Social Networking Services. 410-424 - Fang Liu, Qi-Kai Fu, Lee-Ming Cheng:
Memoryless Hash-Based Perceptual Image Authentication. 425-434 - Stelvio Cimato, Ching-Nung Yang, Chih-Cheng Wu:
Visual Cryptography Based Watermarking: Definition and Meaning. 435-448 - Ching-Nung Yang, Yi-Chin Lin, Chih-Cheng Wu:
Region-in-Region Incrementing Visual Cryptography Scheme. 449-463 - Feng Liu, Wei Qi Yan, Peng Li, Chuan Kun Wu:
A Secret Enriched Visual Cryptography. 464-484 - Zhengxin Fu, Bin Yu:
On the Security of Multi-secret Visual Cryptography Scheme with Ring Shares. 485-494 - Aixin Zhang, Chao Guan, Haomiao Jiang, Jianhua Li:
An Image Super-Resolution Scheme Based on Compressive Sensing with PCA Sparse Representation. 495-506 - Conghuan Ye, Hefei Ling, Fuhao Zou, Zhengding Lu, Zenggang Xiong, Kaibing Zhang:
A Novel JFE Scheme for Social Multimedia Distribution in Compressed Domain Using SVD and CA. 507-519 - Dongyang Cheng, Tanfeng Sun, Xinghao Jiang:
A Robust Image Classification Scheme with Sparse Coding and Multiple Kernel Learning. 520-529
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.