default search action
15. IWDW 2016: Beijing, China
- Yun-Qing Shi, Hyoung-Joong Kim, Fernando Pérez-González, Feng Liu:
Digital Forensics and Watermarking - 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10082, 2017, ISBN 978-3-319-53464-0
Digital Forensics
- Jingjing Yu, Yifeng Zhan, Jianhua Yang, Xiangui Kang:
A Multi-purpose Image Counter-anti-forensic Method Using Convolutional Neural Networks. 3-15 - Ye Tian, Shijun Xiang:
Detection of Video-Based Face Spoofing Using LBP and Multiscale DCT. 16-28 - Chao Jin, Rangding Wang, Diqun Yan, Biaoli Tao, Yanan Chen, Anshan Pei:
Source Cell-Phone Identification Using Spectral Features of Device Self-noise. 29-45 - Qing Qian, Hongxia Wang, Sani M. Abdullahi, Huan Wang, Canghong Shi:
Speech Authentication and Recovery Scheme in Encrypted Domain. 46-60 - Shuo Chen, Tanfeng Sun, Xinghao Jiang, Peisong He, Shilin Wang, Yun Q. Shi:
Detecting Double H.264 Compression Based on Analyzing Prediction Residual Distribution. 61-74 - Wencheng Cao, Hongxia Wang, Hong Zhao, Qing Qian, Sani M. Abdullahi:
Identification of Electronic Disguised Voices in the Noisy Environment. 75-87 - Aamo Iorliam, Anthony T. S. Ho, Adrian Waller, Xi Zhao:
Using Benford's Law Divergence and Neural Networks for Classification and Source Identification of Biometric Images. 88-105 - Le-Bing Zhang, Fei Peng, Min Long:
Source Camera Identification Based on Guided Image Estimation and Block Weighted Average. 106-118 - Pengpeng Yang, Rongrong Ni, Yao Zhao:
Recapture Image Forensics Based on Laplacian Convolutional Neural Networks. 119-128 - Sani M. Abdullahi, Hongxia Wang, Qing Qian, Wencheng Cao:
Concealing Fingerprint-Biometric Data into Audio Signals for Identify Authentication. 129-144 - Xin He, Qingxiao Guan, Yanfei Tong, Xianfeng Zhao, Haibo Yu:
A Novel Robust Image Forensics Algorithm Based on L1-Norm Estimation. 145-158 - Weiwei Zhang, Zhenghong Yang, Shaozhang Niu, Junbin Wang:
Detection of Copy-Move Forgery in Flat Region Based on Feature Enhancement. 159-171 - Jingyu Ye, Yun-Qing Shi:
A Local Derivative Pattern Based Image Forensic Framework for Seam Carving Detection. 172-184
Visual Cryptography
- Teng Guo, Feng Liu, Wen Wang, BingTao Yu:
Privacy Monitor. 187-197 - Wen Wang, Feng Liu, Teng Guo, YaWei Ren, Gang Shen:
Information Security Display Technology with Multi-view Effect. 198-208 - Xuehu Yan, Yuliang Lu, Lintao Liu, Song Wan:
Random Grids-Based Threshold Visual Secret Sharing with Improved Visual Quality. 209-222 - Gang Shen, Feng Liu, Zhengxin Fu, Bin Yu, Wen Wang:
Halftone Visual Cryptography with Complementary Cover Images. 223-237 - YaWei Ren, Feng Liu, Wen Wang:
Collusive Attacks to Partition Authentication Visual Cryptography Scheme. 238-250 - Sabyasachi Dutta, Partha Sarathi Roy, Avishek Adhikari, Kouichi Sakurai:
On the Robustness of Visual Cryptographic Schemes. 251-262
Reversible Data Hiding
- Aniket Roy, Rajat Subhra Chakraborty:
Optimal Distortion Estimation for Prediction Error Expansion Based Reversible Watermarking. 265-279 - Hak-Yeol Choi, Jeongho Son, Han-Ul Jang, Heung-Kyu Lee:
Blind 3D Mesh Watermarking Based on Sphere-Shape Template. 280-295 - Xin Tang, Yining Qi, Yongfeng Huang:
Fragile Watermarking Based Proofs of Retrievability for Archival Cloud Data. 296-311 - Bingwen Feng, Jian Weng, Wei Lu, Bei Pei:
Multiple Watermarking Using Multilevel Quantization Index Modulation. 312-326 - Wisdarmanto Erlangga, Ari Moesriami Barmawi:
Increasing Secret Data Hiding Capacity in QR Code Using 3 \times 3 3 × 3 Subcells. 327-342 - Javier Franco-Contreras, Gouenou Coatrieux:
Databases Traceability by Means of Watermarking with Optimized Detection. 343-357 - Xinxin Peng, Jianfeng Lu, Li Li, Chin-Chen Chang, Qili Zhou:
A New Card Authentication Scheme Based on Image Watermarking and Encryption. 358-369 - Kazutake Uehira, Masahiro Suzuki, Piyarat Silapasuphakornwong, Hideyuki Torii, Youichi Takashima:
Copyright Protection for 3D Printing by Embedding Information Inside 3D-Printed Objects. 370-378 - Minoru Kuribayashi, Ee-Chien Chang, Nobuo Funabiki:
Watermarking with Fixed Decoder for Aesthetic 2D Barcode. 379-392 - Dawen Xu, Yani Zhu, Rangding Wang, Jianjing Fu, Kai Chen:
Two-Dimensional Histogram Modification for Reversible Data Hiding in Partially Encrypted H.264/AVC Videos. 393-406 - Jiajia Xu, Hang Zhou, Weiming Zhang, Ruiqi Jiang, Guoli Ma, Nenghai Yu:
Second Order Perdicting-Error Sorting for Reversible Data Hiding. 407-420 - Yuanzhi Yao, Weiming Zhang, Nenghai Yu:
Reversible Data Hiding for Texture Videos and Depth Maps Coding with Quality Scalability. 421-435 - Xuejing Niu, Zhao-Xia Yin, Xinpeng Zhang, Jin Tang, Bin Luo:
Reversible Data Hiding in Encrypted AMBTC Compressed Images. 436-445 - Wengai Liu, Rongrong Ni, Yao Zhao:
Reversible 3D Image Data Hiding with Quality Enhancement. 446-455 - Jiaxin Yin, Rui Wang, Yuanfang Guo, Feng Liu:
An Adaptive Reversible Data Hiding Scheme for JPEG Images. 456-469 - Yan Ke, Minqing Zhang, Jia Liu:
Separable Multiple Bits Reversible Data Hiding in Encrypted Domain. 470-484
Steganography and Steganalysis
- Zichi Wang, Jinpeng Lv, Qingde Wei, Xinpeng Zhang:
Distortion Function for Spatial Image Steganography Based on the Polarity of Embedding Change. 487-493 - Zengzhen Zhao, Qingxiao Guan, Xianfeng Zhao, Haibo Yu, Changjun Liu:
Embedding Strategy for Batch Adaptive Steganography. 494-505 - Yuan Bian, Guangming Tang, Shuo Wang, Zhanzhan Gao, Shiyuan Chen:
Adaptive Steganography Using 2D Gabor Filters and Ensemble Classifiers. 506-517 - Lingyu Zhang, Xianfeng Zhao:
An Adaptive Video Steganography Based on Intra-prediction Mode and Cost Assignment. 518-532 - Ran Wang, Xijian Ping, Shaozhang Niu, Tao Zhang:
Segmentation Based Steganalysis of Spatial Images Using Local Linear Transform. 533-549 - Wei Huang, Xianfeng Zhao:
Reliable Pooled Steganalysis Using Fine-Grained Parameter Estimation and Hypothesis Testing. 550-563 - Xiaoyu Xu, Yifeng Sun, Guangming Tang, Shiyuan Chen, Jian Zhao:
Deep Learning on Spatial Rich Model for Steganalysis. 564-577 - Chin-Chen Chang, Jen-Chun Chang, Yun-Hong Chou, Hsin-Lung Wu:
A High Embedding Capacity Data Hiding Scheme Based upon Permutation Vectors. 578-587 - Hong Zhang, Yun Cao, Xianfeng Zhao, Haibo Yu, Changjun Liu:
Data Hiding in H.264/AVC Video Files Using the Coded Block Pattern. 588-600 - Donghui Hu, Zhongjin Ma, Yuqi Fan, Lina Wang:
A Study of the Two-Way Effects of Cover Source Mismatch and Texture Complexity in Steganalysis. 601-615
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.