


default search action
11. IWDW 2012: Shanghai, China
- Yun Q. Shi, Hyoung-Joong Kim, Fernando Pérez-González

:
Digital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7809, Springer 2013, ISBN 978-3-642-40098-8
Invited Lectures (Abstracts)
- Yane Zhong, Fangjun Huang, Dong Zhang:

New Channel Selection Criterion for Spatial Domain Steganography. 1-7 - Yuanzhi Qi, Xiaolong Li, Bin Wang, Bin Yang:

A Study of Optimal Matrix for Efficient Matrix Embedding in. 8-18 - Licong Chen, Yun Q. Shi, Patchara Sutthiwan, Xinxin Niu:

A Novel Mapping Scheme for Steganalysis. 19-33 - Yanqing Guo, Xiangwei Kong, Bo Wang, Qian Xiao:

Steganalysis of LSB Matching Based on the Sum Features of Average Co-occurrence Matrix Using Image Estimation. 34-43 - Fei Peng, Xiaolong Li, Bin Yang:

Calibration Based Reliable Detector for Detecting LSB Matching Steganography. 44-53 - Zheng Zhao, Fenlin Liu, Xiangyang Luo, Xin Xie, Lu Yu:

LSB Replacement Steganography Software Detection Based on Model Checking. 54-68 - Vasiliy Sachnev, Hyoung Joong Kim:

An Attempt to Generalize Distortion Measure for JPEG Steganography. 69-82 - Yagiz Yasaroglu, A. Aydin Alatan:

Optimal Data Embedding in 3D Models for Extraction from 2D Views Using Perspective Invariants. 83-97 - Kazuo Ohzeki, Yuanyu Wei, Yutaka Hirakawa, Kiyotsugu Sato:

Consideration of the Watermark Inversion Attack and Its Invalidation Framework. 98-110 - Huang Zhang, Xiaoqiang Li:

Geometrically Invariant Image Blind Watermarking Based on Speeded-Up Robust Features and DCT Transform. 111-119 - Hongjie He, Fan Chen, Yaoran Huo:

Self-embedding Fragile Watermarking Scheme Combined Average with VQ Encoding. 120-134 - Quan Wen, Yufei Wang:

An Efficient Fragile Web Pages Watermarking for Integrity Protection of XML Documents. 135-144 - Qiyin Zhao, Daqing Chen, Zhi Tao, Ji-Hua Gu:

Image Information Hiding Based on Binary Holography of Iterative Conjugate-Symmetric Extension. 145-155 - Meng Guo, Hongbin Zhang:

High Capacity Data Hiding for Halftone Image Authentication. 156-168 - Minoru Kuribayashi

:
Coded Spread Spectrum Watermarking Scheme. 169-183 - Takayuki Yamada, Seiichi Gohshi, Isao Echizen:

Enhancement of Method for Preventing Unauthorized Copying of Displayed Information Using Object Surface Reflection. 184-197 - Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai:

Image Splicing Verification Based on Pixel-Based Alignment Method. 198-212 - Pedro Comesaña

, Fernando Pérez-González
:
Multimedia Operator Chain Topology and Ordering Estimation Based on Detection and Information Theoretic Tools. 213-227 - Zhaohong Li, Jingyu Ye

, Yun-Qing Shi:
Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns. 228-241 - Leida Li, Xuewei Wang, Wei Zhang, Gaobo Yang, Guozhang Hu:

Detecting Removed Object from Video with Stationary Background. 242-252 - Yongjian Hu, Chang-Tsun Li

, Zhisheng Lv, Bei-Bei Liu:
Audio Forgery Detection Based on Max Offsets for Cross Correlation between ENF and Reference Signal. 253-266 - Juan Chao, Xinghao Jiang, Tanfeng Sun:

A Novel Video Inter-frame Forgery Model Detection Scheme Based on Optical Flow Consistency. 267-281 - Luyi Chen, Shilin Wang, Shenghong Li, Jianhua Li:

Countering Universal Image Tampering Detection with Histogram Restoration. 282-289 - Wook Jin Shin, Seung-Ho Lee, Hyun-seok Min

, Hosik Sohn, Yong Man Ro
:
Face Verification Using Color Sparse Representation. 290-299 - Bo Su, Quanqiao Yuan, Yujin Zhang, Mengying Zhai, Shilin Wang:

Rapid Image Splicing Detection Based on Relevance Vector Machine. 300-310 - Zhenghui Liu, Hongxia Wang:

An Efficient Speech Content Authentication Algorithm Based on Coefficients Self-correlation Degree. 311-326 - Xin He, Huiyun Jing, Qi Han, Xiamu Niu:

Saliency-Based Region Log Covariance Feature for Image Copy Detection. 327-335 - Yong Wang, Yanhong Deng, Haojun Wu, Jiwu Huang:

Blind Detection of Electronic Voice Transformation with Natural Disguise. 336-343 - Anjie Peng, Xiangui Kang:

Robust Median Filtering Detection Based on Filtered Residual. 344-357 - Xinpeng Zhang, Chuan Qin

, Guangling Sun:
Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence Modulation. 358-367 - Guorong Xuan, Xuefeng Tong, Jianzhong Teng, Xiaojie Zhang, Yun-Qing Shi:

Optimal Histogram-Pair and Prediction-Error Based Image Reversible Data Hiding. 368-383 - Jie Yu, Guopu Zhu

, Xiaolong Li, Jianquan Yang:
An Improved Algorithm for Reversible Data Hiding in Encrypted Image. 384-394 - Quan Chen, Shijun Xiang, Xinrong Luo:

Reversible Watermarking for Audio Authentication Based on Integer DCT and Expansion Embedding. 395-409 - Hoang-Quoc Nguyen-Son, Minh-Triet Tran

, Tien Dung Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen:
Automatic Anonymous Fingerprinting of Text Posted on Social Networking Services. 410-424 - Fang Liu, Qi-Kai Fu, Lee-Ming Cheng

:
Memoryless Hash-Based Perceptual Image Authentication. 425-434 - Stelvio Cimato

, Ching-Nung Yang
, Chih-Cheng Wu:
Visual Cryptography Based Watermarking: Definition and Meaning. 435-448 - Ching-Nung Yang

, Yi-Chin Lin, Chih-Cheng Wu:
Region-in-Region Incrementing Visual Cryptography Scheme. 449-463 - Feng Liu, Wei Qi Yan, Peng Li, Chuan Kun Wu:

A Secret Enriched Visual Cryptography. 464-484 - Zhengxin Fu, Bin Yu:

On the Security of Multi-secret Visual Cryptography Scheme with Ring Shares. 485-494 - Aixin Zhang, Chao Guan, Haomiao Jiang, Jianhua Li:

An Image Super-Resolution Scheme Based on Compressive Sensing with PCA Sparse Representation. 495-506 - Conghuan Ye

, Hefei Ling, Fuhao Zou, Zhengding Lu, Zenggang Xiong, Kaibing Zhang:
A Novel JFE Scheme for Social Multimedia Distribution in Compressed Domain Using SVD and CA. 507-519 - Dongyang Cheng, Tanfeng Sun, Xinghao Jiang:

A Robust Image Classification Scheme with Sparse Coding and Multiple Kernel Learning. 520-529

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














