Search dblp for Publications

export results for "stream:conf/iwdw:"

 download as .bib file

@proceedings{DBLP:conf/iwdw/2023,
  editor       = {Bin Ma and
                  Jian Li and
                  Qi Li},
  title        = {Digital Forensics and Watermarking - 22nd International Workshop,
                  {IWDW} 2023, Jinan, China, November 25-26, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14511},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-2585-4},
  doi          = {10.1007/978-981-97-2585-4},
  isbn         = {978-981-97-2584-7},
  timestamp    = {Tue, 20 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/BaoCNE23,
  author       = {Erjin Bao and
                  Ching{-}Chun Chang and
                  Huy H. Nguyen and
                  Isao Echizen},
  editor       = {Bin Ma and
                  Jian Li and
                  Qi Li},
  title        = {From Deconstruction to Reconstruction: {A} Plug-In Module for Diffusion-Based
                  Purification of Adversarial Examples},
  booktitle    = {Digital Forensics and Watermarking - 22nd International Workshop,
                  {IWDW} 2023, Jinan, China, November 25-26, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14511},
  pages        = {48--62},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-2585-4\_4},
  doi          = {10.1007/978-981-97-2585-4\_4},
  timestamp    = {Tue, 20 Aug 2024 07:54:45 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/BaoCNE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/DuanMWXWZ23,
  author       = {Hongtao Duan and
                  Ruihe Ma and
                  Songkun Wang and
                  Yongjin Xian and
                  Chunpeng Wang and
                  Guanxu Zhao},
  editor       = {Bin Ma and
                  Jian Li and
                  Qi Li},
  title        = {Convolutional Neural Network Prediction Error Algorithm Based on Block
                  Classification Enhanced},
  booktitle    = {Digital Forensics and Watermarking - 22nd International Workshop,
                  {IWDW} 2023, Jinan, China, November 25-26, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14511},
  pages        = {223--232},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-2585-4\_16},
  doi          = {10.1007/978-981-97-2585-4\_16},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/DuanMWXWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/GuoCWYZ23,
  author       = {Shengnan Guo and
                  Xuekai Chen and
                  Zhuang Wang and
                  Zhongliang Yang and
                  Linna Zhou},
  editor       = {Bin Ma and
                  Jian Li and
                  Qi Li},
  title        = {Linguistic Steganalysis Based on Clustering and Ensemble Learning
                  in Imbalanced Scenario},
  booktitle    = {Digital Forensics and Watermarking - 22nd International Workshop,
                  {IWDW} 2023, Jinan, China, November 25-26, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14511},
  pages        = {304--318},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-2585-4\_22},
  doi          = {10.1007/978-981-97-2585-4\_22},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/GuoCWYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HeZQQZ23,
  author       = {Xiaoling He and
                  Yuanding Zhou and
                  Chuan Qin and
                  Zhenxing Qian and
                  Xinpeng Zhang},
  editor       = {Bin Ma and
                  Jian Li and
                  Qi Li},
  title        = {{PDMTT:} {A} Plagiarism Detection Model Towards Multi-turn Text Back-Translation},
  booktitle    = {Digital Forensics and Watermarking - 22nd International Workshop,
                  {IWDW} 2023, Jinan, China, November 25-26, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14511},
  pages        = {79--94},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-2585-4\_6},
  doi          = {10.1007/978-981-97-2585-4\_6},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HeZQQZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuangLHXWH23,
  author       = {Jinkun Huang and
                  Weiqi Luo and
                  Wenmin Huang and
                  Ziyi Xi and
                  Kangkang Wei and
                  Jiwu Huang},
  editor       = {Bin Ma and
                  Jian Li and
                  Qi Li},
  title        = {Multi-Scale Enhanced Dual-Stream Network for Facial Attribute Editing
                  Localization},
  booktitle    = {Digital Forensics and Watermarking - 22nd International Workshop,
                  {IWDW} 2023, Jinan, China, November 25-26, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14511},
  pages        = {151--165},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-2585-4\_11},
  doi          = {10.1007/978-981-97-2585-4\_11},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuangLHXWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiZC23,
  author       = {Jinchuan Li and
                  Xianfeng Zhao and
                  Yun Cao},
  editor       = {Bin Ma and
                  Jian Li and
                  Qi Li},
  title        = {Generalizable Deep Video Inpainting Detection Based on Constrained
                  Convolutional Neural Networks},
  booktitle    = {Digital Forensics and Watermarking - 22nd International Workshop,
                  {IWDW} 2023, Jinan, China, November 25-26, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14511},
  pages        = {125--138},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-2585-4\_9},
  doi          = {10.1007/978-981-97-2585-4\_9},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiZC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiZMWWZZ23,
  author       = {Jian Li and
                  Huanhuan Zhao and
                  Bin Ma and
                  Chunpeng Wang and
                  Xiaoming Wu and
                  Tao Zuo and
                  Zhengzhong Zhao},
  editor       = {Bin Ma and
                  Jian Li and
                  Qi Li},
  title        = {High-Quality {PRNU} Anonymous Algorithm for {JPEG} Images},
  booktitle    = {Digital Forensics and Watermarking - 22nd International Workshop,
                  {IWDW} 2023, Jinan, China, November 25-26, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14511},
  pages        = {18--32},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-2585-4\_2},
  doi          = {10.1007/978-981-97-2585-4\_2},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiZMWWZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiZRNZJ23,
  author       = {Yan Li and
                  Zhuoran Zheng and
                  Wenqi Ren and
                  Yunfeng Nie and
                  Jingang Zhang and
                  Xiuyi Jia},
  editor       = {Bin Ma and
                  Jian Li and
                  Qi Li},
  title        = {Dual-Domain Learning Network for Polyp Segmentation},
  booktitle    = {Digital Forensics and Watermarking - 22nd International Workshop,
                  {IWDW} 2023, Jinan, China, November 25-26, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14511},
  pages        = {233--247},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-2585-4\_17},
  doi          = {10.1007/978-981-97-2585-4\_17},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiZRNZJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/MaWXWZ23,
  author       = {Bin Ma and
                  Haocheng Wang and
                  Yongjin Xian and
                  Chunpeng Wang and
                  Guanxu Zhao},
  editor       = {Bin Ma and
                  Jian Li and
                  Qi Li},
  title        = {Cross-channel Image Steganography Based on Generative Adversarial
                  Network},
  booktitle    = {Digital Forensics and Watermarking - 22nd International Workshop,
                  {IWDW} 2023, Jinan, China, November 25-26, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14511},
  pages        = {194--206},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-2585-4\_14},
  doi          = {10.1007/978-981-97-2585-4\_14},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/MaWXWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/MoZZCHLLY23,
  author       = {Donger Mo and
                  Peijia Zheng and
                  Yufei Zhou and
                  Jingyi Chen and
                  Shan Huang and
                  Weiqi Luo and
                  Wei Lu and
                  Chunfang Yang},
  editor       = {Bin Ma and
                  Jian Li and
                  Qi Li},
  title        = {Privacy-Preserving Image Scaling Using Bicubic Interpolation and Homomorphic
                  Encryption},
  booktitle    = {Digital Forensics and Watermarking - 22nd International Workshop,
                  {IWDW} 2023, Jinan, China, November 25-26, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14511},
  pages        = {63--78},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-2585-4\_5},
  doi          = {10.1007/978-981-97-2585-4\_5},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/MoZZCHLLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/PengL23,
  author       = {Fei Peng and
                  Min Long},
  editor       = {Bin Ma and
                  Jian Li and
                  Qi Li},
  title        = {3DPS: 3D Printing Signature for Authentication Based on Equipment
                  Distortion Model},
  booktitle    = {Digital Forensics and Watermarking - 22nd International Workshop,
                  {IWDW} 2023, Jinan, China, November 25-26, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14511},
  pages        = {139--150},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-2585-4\_10},
  doi          = {10.1007/978-981-97-2585-4\_10},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/PengL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/PuYYZL23,
  author       = {Houchen Pu and
                  Xiaowei Yi and
                  Bowen Yang and
                  Xianfeng Zhao and
                  Changjun Liu},
  editor       = {Bin Ma and
                  Jian Li and
                  Qi Li},
  title        = {Inversion Image Pairs for Anti-forensics in the Frequency Domain},
  booktitle    = {Digital Forensics and Watermarking - 22nd International Workshop,
                  {IWDW} 2023, Jinan, China, November 25-26, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14511},
  pages        = {180--193},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-2585-4\_13},
  doi          = {10.1007/978-981-97-2585-4\_13},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/PuYYZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SchuikiKHU23,
  author       = {Johannes Schuiki and
                  Christof Kauba and
                  Heinz Hofbauer and
                  Andreas Uhl},
  editor       = {Bin Ma and
                  Jian Li and
                  Qi Li},
  title        = {Limiting Factors in Smartphone-Based Cross-Sensor Microstructure Material
                  Classification},
  booktitle    = {Digital Forensics and Watermarking - 22nd International Workshop,
                  {IWDW} 2023, Jinan, China, November 25-26, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14511},
  pages        = {33--47},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-2585-4\_3},
  doi          = {10.1007/978-981-97-2585-4\_3},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SchuikiKHU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/VorderleitnerHU23,
  author       = {Andreas Vorderleitner and
                  Jutta H{\"{a}}mmerle{-}Uhl and
                  Andreas Uhl},
  editor       = {Bin Ma and
                  Jian Li and
                  Qi Li},
  title        = {Finger Vein Spoof GANs: Can We Supersede the Production of Presentation
                  Attack Artefacts?},
  booktitle    = {Digital Forensics and Watermarking - 22nd International Workshop,
                  {IWDW} 2023, Jinan, China, November 25-26, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14511},
  pages        = {109--124},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-2585-4\_8},
  doi          = {10.1007/978-981-97-2585-4\_8},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/VorderleitnerHU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangCXLLWWH23,
  author       = {Chunpeng Wang and
                  Long Chen and
                  Zhiqiu Xia and
                  Jian Li and
                  Qi Li and
                  Ziqi Wei and
                  Changxu Wang and
                  Bing Han},
  editor       = {Bin Ma and
                  Jian Li and
                  Qi Li},
  title        = {Novel Quaternion Orthogonal Fourier-Mellin Moments Using Optimized
                  Factorial Calculation},
  booktitle    = {Digital Forensics and Watermarking - 22nd International Workshop,
                  {IWDW} 2023, Jinan, China, November 25-26, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14511},
  pages        = {262--276},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-2585-4\_19},
  doi          = {10.1007/978-981-97-2585-4\_19},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangCXLLWWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangWMH23,
  author       = {Yue Wang and
                  Zhanshan Wang and
                  Xiaofeng Ma and
                  Jing He},
  editor       = {Bin Ma and
                  Jian Li and
                  Qi Li},
  title        = {Two-Round Private Set Intersection Mechanism and Algorithm Based on
                  Blockchain},
  booktitle    = {Digital Forensics and Watermarking - 22nd International Workshop,
                  {IWDW} 2023, Jinan, China, November 25-26, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14511},
  pages        = {248--261},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-2585-4\_18},
  doi          = {10.1007/978-981-97-2585-4\_18},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangWMH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangXHGHYZ23,
  author       = {Zhuang Wang and
                  Jinyi Xia and
                  Kaibo Huang and
                  Shengnan Guo and
                  Chenwei Huang and
                  Zhongliang Yang and
                  Linna Zhou},
  editor       = {Bin Ma and
                  Jian Li and
                  Qi Li},
  title        = {{DNA} Steganalysis Based on Multi-dimensional Feature Extraction and
                  Fusion},
  booktitle    = {Digital Forensics and Watermarking - 22nd International Workshop,
                  {IWDW} 2023, Jinan, China, November 25-26, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14511},
  pages        = {277--291},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-2585-4\_20},
  doi          = {10.1007/978-981-97-2585-4\_20},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangXHGHYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XianMLZ23,
  author       = {Yongjin Xian and
                  Ruihe Ma and
                  Pengyu Liu and
                  Linna Zhou},
  editor       = {Bin Ma and
                  Jian Li and
                  Qi Li},
  title        = {Image Encryption Scheme Based on New 1D Chaotic System and Blockchain},
  booktitle    = {Digital Forensics and Watermarking - 22nd International Workshop,
                  {IWDW} 2023, Jinan, China, November 25-26, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14511},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-2585-4\_1},
  doi          = {10.1007/978-981-97-2585-4\_1},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/XianMLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XieW23,
  author       = {Yunfei Xie and
                  Zichi Wang},
  editor       = {Bin Ma and
                  Jian Li and
                  Qi Li},
  title        = {Neural Network Steganography Using Extractor Matching},
  booktitle    = {Digital Forensics and Watermarking - 22nd International Workshop,
                  {IWDW} 2023, Jinan, China, November 25-26, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14511},
  pages        = {169--179},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-2585-4\_12},
  doi          = {10.1007/978-981-97-2585-4\_12},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/XieW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XuGFZYZ23,
  author       = {Xuan Xu and
                  Shengnan Guo and
                  Zhengyang Fang and
                  Pengcheng Zhou and
                  Zhongliang Yang and
                  Linna Zhou},
  editor       = {Bin Ma and
                  Jian Li and
                  Qi Li},
  title        = {VStego800K: Large-Scale Steganalysis Dataset for Streaming Voice},
  booktitle    = {Digital Forensics and Watermarking - 22nd International Workshop,
                  {IWDW} 2023, Jinan, China, November 25-26, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14511},
  pages        = {292--303},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-2585-4\_21},
  doi          = {10.1007/978-981-97-2585-4\_21},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/XuGFZYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YangQXL23,
  author       = {Meihong Yang and
                  Baolin Qi and
                  Yongjin Xian and
                  Jian Li},
  editor       = {Bin Ma and
                  Jian Li and
                  Qi Li},
  title        = {An Image Perceptual Hashing Algorithm Based on Convolutional Neural
                  Networks},
  booktitle    = {Digital Forensics and Watermarking - 22nd International Workshop,
                  {IWDW} 2023, Jinan, China, November 25-26, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14511},
  pages        = {95--108},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-2585-4\_7},
  doi          = {10.1007/978-981-97-2585-4\_7},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YangQXL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhaoMX23,
  author       = {Chunxin Zhao and
                  Ruihe Ma and
                  Yongjin Xian},
  editor       = {Bin Ma and
                  Jian Li and
                  Qi Li},
  title        = {A Reversible Data Hiding Algorithm for {JPEG} Image Based on Paillier
                  Homomorphic Encryption},
  booktitle    = {Digital Forensics and Watermarking - 22nd International Workshop,
                  {IWDW} 2023, Jinan, China, November 25-26, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14511},
  pages        = {207--222},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-2585-4\_15},
  doi          = {10.1007/978-981-97-2585-4\_15},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhaoMX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2022,
  editor       = {Xianfeng Zhao and
                  Zhenjun Tang and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Alessandro Piva},
  title        = {Digital Forensics and Watermarking - 21st International Workshop,
                  {IWDW} 2022, Guilin, China, November 18-19, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13825},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-25115-3},
  doi          = {10.1007/978-3-031-25115-3},
  isbn         = {978-3-031-25114-6},
  timestamp    = {Tue, 07 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/BellafqiraAGC22,
  author       = {Reda Bellafqira and
                  Musab Al{-}Ghadi and
                  Emmanuelle G{\'{e}}nin and
                  Gouenou Coatrieux},
  editor       = {Xianfeng Zhao and
                  Zhenjun Tang and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Alessandro Piva},
  title        = {Robust and Imperceptible Watermarking Scheme for {GWAS} Data Traceability},
  booktitle    = {Digital Forensics and Watermarking - 21st International Workshop,
                  {IWDW} 2022, Guilin, China, November 18-19, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13825},
  pages        = {147--161},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25115-3\_10},
  doi          = {10.1007/978-3-031-25115-3\_10},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/BellafqiraAGC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChenDWYSF22,
  author       = {Jiale Chen and
                  Li Dong and
                  Rangding Wang and
                  Diqun Yan and
                  Weiwei Sun and
                  Hang{-}Yu Fan},
  editor       = {Xianfeng Zhao and
                  Zhenjun Tang and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Alessandro Piva},
  title        = {Physical Anti-copying Semi-robust Random Watermarking for {QR} Code},
  booktitle    = {Digital Forensics and Watermarking - 21st International Workshop,
                  {IWDW} 2022, Guilin, China, November 18-19, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13825},
  pages        = {131--146},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25115-3\_9},
  doi          = {10.1007/978-3-031-25115-3\_9},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChenDWYSF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/FuZH22,
  author       = {Haocheng Fu and
                  Xianfeng Zhao and
                  Xiaolei He},
  editor       = {Xianfeng Zhao and
                  Zhenjun Tang and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Alessandro Piva},
  title        = {High-Performance Steganographic Coding Based on Sub-Polarized Channel},
  booktitle    = {Digital Forensics and Watermarking - 21st International Workshop,
                  {IWDW} 2022, Guilin, China, November 18-19, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13825},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25115-3\_1},
  doi          = {10.1007/978-3-031-25115-3\_1},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/FuZH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/GuZYX22,
  author       = {Yewei Gu and
                  Xianfeng Zhao and
                  Xiaowei Yi and
                  Junchao Xiao},
  editor       = {Xianfeng Zhao and
                  Zhenjun Tang and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Alessandro Piva},
  title        = {Voice Conversion Using Learnable Similarity-Guided Masked Autoencoder},
  booktitle    = {Digital Forensics and Watermarking - 21st International Workshop,
                  {IWDW} 2022, Guilin, China, November 18-19, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13825},
  pages        = {53--67},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25115-3\_4},
  doi          = {10.1007/978-3-031-25115-3\_4},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/GuZYX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/JochlU22,
  author       = {Robert J{\"{o}}chl and
                  Andreas Uhl},
  editor       = {Xianfeng Zhao and
                  Zhenjun Tang and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Alessandro Piva},
  title        = {Deep Learning Image Age Approximation - What is More Relevant: Image
                  Content or Age Information?},
  booktitle    = {Digital Forensics and Watermarking - 21st International Workshop,
                  {IWDW} 2022, Guilin, China, November 18-19, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13825},
  pages        = {114--128},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25115-3\_8},
  doi          = {10.1007/978-3-031-25115-3\_8},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/JochlU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiWH22,
  author       = {Fan Li and
                  Chen Wan and
                  Fangjun Huang},
  editor       = {Xianfeng Zhao and
                  Zhenjun Tang and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Alessandro Piva},
  title        = {Adaptive Robust Watermarking Method Based on Deep Neural Networks},
  booktitle    = {Digital Forensics and Watermarking - 21st International Workshop,
                  {IWDW} 2022, Guilin, China, November 18-19, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13825},
  pages        = {162--173},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25115-3\_11},
  doi          = {10.1007/978-3-031-25115-3\_11},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiWH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiZCH22,
  author       = {Gen Li and
                  Xianfeng Zhao and
                  Yun Cao and
                  Chengqiao Hu},
  editor       = {Xianfeng Zhao and
                  Zhenjun Tang and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Alessandro Piva},
  title        = {Manipulated Face Detection and Localization Based on Semantic Segmentation},
  booktitle    = {Digital Forensics and Watermarking - 21st International Workshop,
                  {IWDW} 2022, Guilin, China, November 18-19, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13825},
  pages        = {98--113},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25115-3\_7},
  doi          = {10.1007/978-3-031-25115-3\_7},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiZCH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/PeiZCH22,
  author       = {Pengfei Pei and
                  Xianfeng Zhao and
                  Yun Cao and
                  Chengqiao Hu},
  editor       = {Xianfeng Zhao and
                  Zhenjun Tang and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Alessandro Piva},
  title        = {Visual Explanations for Exposing Potential Inconsistency of Deepfakes},
  booktitle    = {Digital Forensics and Watermarking - 21st International Workshop,
                  {IWDW} 2022, Guilin, China, November 18-19, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13825},
  pages        = {68--82},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25115-3\_5},
  doi          = {10.1007/978-3-031-25115-3\_5},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/PeiZCH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SunXFYT22,
  author       = {Yingying Sun and
                  Guoxiong Xie and
                  Guijin Fan and
                  Chunqiang Yu and
                  Zhenjun Tang},
  editor       = {Xianfeng Zhao and
                  Zhenjun Tang and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Alessandro Piva},
  title        = {Reversible Data Hiding via Arranging Blocks of Bit-Planes in Encrypted
                  Images},
  booktitle    = {Digital Forensics and Watermarking - 21st International Workshop,
                  {IWDW} 2022, Guilin, China, November 18-19, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13825},
  pages        = {190--204},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25115-3\_13},
  doi          = {10.1007/978-3-031-25115-3\_13},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/SunXFYT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/TangCLY22,
  author       = {Yun Tang and
                  Lulu Cheng and
                  Wanli Lyu and
                  Zhaoxia Yin},
  editor       = {Xianfeng Zhao and
                  Zhenjun Tang and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Alessandro Piva},
  title        = {High Capacity Reversible Data Hiding for Encrypted 3D Mesh Models
                  Based on Topology},
  booktitle    = {Digital Forensics and Watermarking - 21st International Workshop,
                  {IWDW} 2022, Guilin, China, November 18-19, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13825},
  pages        = {205--218},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25115-3\_14},
  doi          = {10.1007/978-3-031-25115-3\_14},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/TangCLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangZZBH22,
  author       = {Xiaofeng Wang and
                  Zekun Zhao and
                  Chi Zhang and
                  Ningning Bai and
                  Xingfu Hu},
  editor       = {Xianfeng Zhao and
                  Zhenjun Tang and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Alessandro Piva},
  title        = {SE-ResNet56: Robust Network Model for Deepfake Detection},
  booktitle    = {Digital Forensics and Watermarking - 21st International Workshop,
                  {IWDW} 2022, Guilin, China, November 18-19, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13825},
  pages        = {37--52},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25115-3\_3},
  doi          = {10.1007/978-3-031-25115-3\_3},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangZZBH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WuWZLM22,
  author       = {Hao Wu and
                  Jinwei Wang and
                  Jiawei Zhang and
                  Xiangyang Luo and
                  Bin Ma},
  editor       = {Xianfeng Zhao and
                  Zhenjun Tang and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Alessandro Piva},
  title        = {Improving the Transferability of Adversarial Attacks Through Both
                  Front and Rear Vector Method},
  booktitle    = {Digital Forensics and Watermarking - 21st International Workshop,
                  {IWDW} 2022, Guilin, China, November 18-19, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13825},
  pages        = {83--97},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25115-3\_6},
  doi          = {10.1007/978-3-031-25115-3\_6},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WuWZLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YangWXDHL22,
  author       = {Lin Yang and
                  Rangding Wang and
                  Dawen Xu and
                  Li Dong and
                  Songhan He and
                  Fang Liu},
  editor       = {Xianfeng Zhao and
                  Zhenjun Tang and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Alessandro Piva},
  title        = {High-Capacity Adaptive Steganography Based on Transform Coefficient
                  for {HEVC}},
  booktitle    = {Digital Forensics and Watermarking - 21st International Workshop,
                  {IWDW} 2022, Guilin, China, November 18-19, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13825},
  pages        = {20--34},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25115-3\_2},
  doi          = {10.1007/978-3-031-25115-3\_2},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/YangWXDHL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhangWHL22,
  author       = {Fei Zhang and
                  Hongxia Wang and
                  Mingze He and
                  Jinhe Li},
  editor       = {Xianfeng Zhao and
                  Zhenjun Tang and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Alessandro Piva},
  title        = {Adaptive Despread Spectrum-Based Image Watermarking for Fast Product
                  Tracking},
  booktitle    = {Digital Forensics and Watermarking - 21st International Workshop,
                  {IWDW} 2022, Guilin, China, November 18-19, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13825},
  pages        = {174--189},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25115-3\_12},
  doi          = {10.1007/978-3-031-25115-3\_12},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhangWHL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2021,
  editor       = {Xianfeng Zhao and
                  Alessandro Piva and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {Digital Forensics and Watermarking - 20th International Workshop,
                  {IWDW} 2021, Beijing, China, November 20-22, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13180},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-95398-0},
  doi          = {10.1007/978-3-030-95398-0},
  isbn         = {978-3-030-95397-3},
  timestamp    = {Fri, 22 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChenWWY21,
  author       = {Jia Chen and
                  Jiayu Wang and
                  Yongjie Wang and
                  Xuehu Yan},
  editor       = {Xianfeng Zhao and
                  Alessandro Piva and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {Data Hiding Based on Redundant Space of WeChat Mini Program Codes},
  booktitle    = {Digital Forensics and Watermarking - 20th International Workshop,
                  {IWDW} 2021, Beijing, China, November 20-22, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13180},
  pages        = {243--257},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95398-0\_17},
  doi          = {10.1007/978-3-030-95398-0\_17},
  timestamp    = {Fri, 22 Apr 2022 14:23:22 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChenWWY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChenYC21,
  author       = {Ziqing Chen and
                  Xiangyu Yu and
                  Runze Chen},
  editor       = {Xianfeng Zhao and
                  Alessandro Piva and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {Image Block Regression Based on Feature Fusion for CNN-Based Spatial
                  Steganalysis},
  booktitle    = {Digital Forensics and Watermarking - 20th International Workshop,
                  {IWDW} 2021, Beijing, China, November 20-22, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13180},
  pages        = {258--272},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95398-0\_18},
  doi          = {10.1007/978-3-030-95398-0\_18},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChenYC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/GuoTB21,
  author       = {Wei Guo and
                  Benedetta Tondi and
                  Mauro Barni},
  editor       = {Xianfeng Zhao and
                  Alessandro Piva and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {MasterFace Watermarking for {IPR} Protection of Siamese Network for
                  Face Verification},
  booktitle    = {Digital Forensics and Watermarking - 20th International Workshop,
                  {IWDW} 2021, Beijing, China, November 20-22, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13180},
  pages        = {178--193},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95398-0\_13},
  doi          = {10.1007/978-3-030-95398-0\_13},
  timestamp    = {Wed, 17 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/GuoTB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HsiaoTKSM21,
  author       = {Annjhih Hsiao and
                  Takao Takenouchi and
                  Hiroaki Kikuchi and
                  Kazuo Sakiyama and
                  Noriyuki Miura},
  editor       = {Xianfeng Zhao and
                  Alessandro Piva and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {More Accurate and Robust PRNU-Based Source Camera Identification with
                  3-Step 3-Class Approach},
  booktitle    = {Digital Forensics and Watermarking - 20th International Workshop,
                  {IWDW} 2021, Beijing, China, November 20-22, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13180},
  pages        = {87--101},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95398-0\_7},
  doi          = {10.1007/978-3-030-95398-0\_7},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/HsiaoTKSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuZYLY21,
  author       = {Yongjian Hu and
                  Hongjie Zhao and
                  Zeqiong Yu and
                  Beibei Liu and
                  Xiangyu Yu},
  editor       = {Xianfeng Zhao and
                  Alessandro Piva and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {Exposing Deepfake Videos with Spatial, Frequency and Multi-scale Temporal
                  Artifacts},
  booktitle    = {Digital Forensics and Watermarking - 20th International Workshop,
                  {IWDW} 2021, Beijing, China, November 20-22, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13180},
  pages        = {47--57},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95398-0\_4},
  doi          = {10.1007/978-3-030-95398-0\_4},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuZYLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/JochlU21,
  author       = {Robert J{\"{o}}chl and
                  Andreas Uhl},
  editor       = {Xianfeng Zhao and
                  Alessandro Piva and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {Effects of Image Compression on Image Age Approximation},
  booktitle    = {Digital Forensics and Watermarking - 20th International Workshop,
                  {IWDW} 2021, Beijing, China, November 20-22, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13180},
  pages        = {102--116},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95398-0\_8},
  doi          = {10.1007/978-3-030-95398-0\_8},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/JochlU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiAWB21,
  author       = {Yue Li and
                  Lydia Abady and
                  Hongxia Wang and
                  Mauro Barni},
  editor       = {Xianfeng Zhao and
                  Alessandro Piva and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {A Feature-Map-Based Large-Payload {DNN} Watermarking Algorithm},
  booktitle    = {Digital Forensics and Watermarking - 20th International Workshop,
                  {IWDW} 2021, Beijing, China, November 20-22, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13180},
  pages        = {135--148},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95398-0\_10},
  doi          = {10.1007/978-3-030-95398-0\_10},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiAWB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiuGHGW21,
  author       = {Beibei Liu and
                  Yifei Gao and
                  Yongjian Hu and
                  Jingjing Guo and
                  Yufei Wang},
  editor       = {Xianfeng Zhao and
                  Alessandro Piva and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {Double-Stream Segmentation Network with Temporal Self-attention for
                  Deepfake Video Detection},
  booktitle    = {Digital Forensics and Watermarking - 20th International Workshop,
                  {IWDW} 2021, Beijing, China, November 20-22, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13180},
  pages        = {32--46},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95398-0\_3},
  doi          = {10.1007/978-3-030-95398-0\_3},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiuGHGW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/RenLW21,
  author       = {Yanzhen Ren and
                  Yiwen Liu and
                  Lina Wang},
  editor       = {Xianfeng Zhao and
                  Alessandro Piva and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {Using Contrastive Learning to Improve the Performance of Steganalysis
                  Schemes},
  booktitle    = {Digital Forensics and Watermarking - 20th International Workshop,
                  {IWDW} 2021, Beijing, China, November 20-22, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13180},
  pages        = {212--226},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95398-0\_15},
  doi          = {10.1007/978-3-030-95398-0\_15},
  timestamp    = {Fri, 15 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/RenLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ShiSL21,
  author       = {Henan Shi and
                  Tanfeng Sun and
                  Zhaohong Li},
  editor       = {Xianfeng Zhao and
                  Alessandro Piva and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {A {HEVC} Steganalysis Algorithm Based on Relationship of Adjacent
                  Intra Prediction Modes},
  booktitle    = {Digital Forensics and Watermarking - 20th International Workshop,
                  {IWDW} 2021, Beijing, China, November 20-22, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13180},
  pages        = {227--242},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95398-0\_16},
  doi          = {10.1007/978-3-030-95398-0\_16},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ShiSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SuZH21,
  author       = {Ante Su and
                  Xianfeng Zhao and
                  Xiaolei He},
  editor       = {Xianfeng Zhao and
                  Alessandro Piva and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {Arbitrary-Sized {JPEG} Steganalysis Based on Fully Convolutional Network},
  booktitle    = {Digital Forensics and Watermarking - 20th International Workshop,
                  {IWDW} 2021, Beijing, China, November 20-22, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13180},
  pages        = {197--211},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95398-0\_14},
  doi          = {10.1007/978-3-030-95398-0\_14},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SuZH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/TangZTWC21,
  author       = {Xin Tang and
                  Linna Zhou and
                  Guang Tang and
                  Yuchen Wen and
                  Yixuan Cheng},
  editor       = {Xianfeng Zhao and
                  Alessandro Piva and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {Improved Fluctuation Derived Block Selection Strategy in Pixel Value
                  Ordering Based Reversible Data Hiding},
  booktitle    = {Digital Forensics and Watermarking - 20th International Workshop,
                  {IWDW} 2021, Beijing, China, November 20-22, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13180},
  pages        = {163--177},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95398-0\_12},
  doi          = {10.1007/978-3-030-95398-0\_12},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/TangZTWC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangWLYMS21,
  author       = {Hao Wang and
                  Jinwei Wang and
                  Xiangyang Luo and
                  Qilin Yin and
                  Bin Ma and
                  Jinsheng Sun},
  editor       = {Xianfeng Zhao and
                  Alessandro Piva and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {Modify the Quantization Table in the {JPEG} Header File for Forensics
                  and Anti-forensics},
  booktitle    = {Digital Forensics and Watermarking - 20th International Workshop,
                  {IWDW} 2021, Beijing, China, November 20-22, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13180},
  pages        = {72--86},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95398-0\_6},
  doi          = {10.1007/978-3-030-95398-0\_6},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangWLYMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YangWZLHM21,
  author       = {Ling Yang and
                  Hongxia Wang and
                  Yulin Zhang and
                  Jinhe Li and
                  Peisong He and
                  Sijiang Meng},
  editor       = {Xianfeng Zhao and
                  Alessandro Piva and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {A Robust DCT-Based Video Watermarking Scheme Against Recompression
                  and Synchronization Attacks},
  booktitle    = {Digital Forensics and Watermarking - 20th International Workshop,
                  {IWDW} 2021, Beijing, China, November 20-22, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13180},
  pages        = {149--162},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95398-0\_11},
  doi          = {10.1007/978-3-030-95398-0\_11},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/YangWZLHM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YuanHC21,
  author       = {Yuan Yuan and
                  Hongjie He and
                  Fan Chen},
  editor       = {Xianfeng Zhao and
                  Alessandro Piva and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {On the Security of Encrypted {JPEG} Image with Adaptive Key Generated
                  by Invariant Characteristic},
  booktitle    = {Digital Forensics and Watermarking - 20th International Workshop,
                  {IWDW} 2021, Beijing, China, November 20-22, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13180},
  pages        = {58--71},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95398-0\_5},
  doi          = {10.1007/978-3-030-95398-0\_5},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/YuanHC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhangCPL21,
  author       = {Le{-}Bing Zhang and
                  Juan Cai and
                  Fei Peng and
                  Min Long},
  editor       = {Xianfeng Zhao and
                  Alessandro Piva and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {{MSA-CNN:} Face Morphing Detection via a Multiple Scales Attention
                  Convolutional Neural Network},
  booktitle    = {Digital Forensics and Watermarking - 20th International Workshop,
                  {IWDW} 2021, Beijing, China, November 20-22, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13180},
  pages        = {17--31},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95398-0\_2},
  doi          = {10.1007/978-3-030-95398-0\_2},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhangCPL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhangCZ21,
  author       = {Zeyu Zhang and
                  Yun Cao and
                  Xianfeng Zhao},
  editor       = {Xianfeng Zhao and
                  Alessandro Piva and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {A Multi-level Feature Enhancement Network for Image Splicing Localization},
  booktitle    = {Digital Forensics and Watermarking - 20th International Workshop,
                  {IWDW} 2021, Beijing, China, November 20-22, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13180},
  pages        = {3--16},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95398-0\_1},
  doi          = {10.1007/978-3-030-95398-0\_1},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhangCZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhangGYZ21,
  author       = {Zhenyu Zhang and
                  Yewei Gu and
                  Xiaowei Yi and
                  Xianfeng Zhao},
  editor       = {Xianfeng Zhao and
                  Alessandro Piva and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {{FMFCC-A:} {A} Challenging Mandarin Dataset for Synthetic Speech Detection},
  booktitle    = {Digital Forensics and Watermarking - 20th International Workshop,
                  {IWDW} 2021, Beijing, China, November 20-22, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13180},
  pages        = {117--131},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95398-0\_9},
  doi          = {10.1007/978-3-030-95398-0\_9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhangGYZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2020,
  editor       = {Xianfeng Zhao and
                  Yun{-}Qing Shi and
                  Alessandro Piva and
                  Hyoung Joong Kim},
  title        = {Digital Forensics and Watermarking - 19th International Workshop,
                  {IWDW} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12617},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-69449-4},
  doi          = {10.1007/978-3-030-69449-4},
  isbn         = {978-3-030-69448-7},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/BaracchiINP20,
  author       = {Daniele Baracchi and
                  Massimo Iuliani and
                  Andrea G. Nencini and
                  Alessandro Piva},
  editor       = {Xianfeng Zhao and
                  Yun{-}Qing Shi and
                  Alessandro Piva and
                  Hyoung Joong Kim},
  title        = {Facing Image Source Attribution on iPhone {X}},
  booktitle    = {Digital Forensics and Watermarking - 19th International Workshop,
                  {IWDW} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12617},
  pages        = {196--207},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69449-4\_15},
  doi          = {10.1007/978-3-030-69449-4\_15},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/BaracchiINP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/CamachoW20,
  author       = {Ivan Castillo Camacho and
                  Kai Wang},
  editor       = {Xianfeng Zhao and
                  Yun{-}Qing Shi and
                  Alessandro Piva and
                  Hyoung Joong Kim},
  title        = {Data-Dependent Scaling of CNN's First Layer for Improved Image Manipulation
                  Detection},
  booktitle    = {Digital Forensics and Watermarking - 19th International Workshop,
                  {IWDW} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12617},
  pages        = {208--223},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69449-4\_16},
  doi          = {10.1007/978-3-030-69449-4\_16},
  timestamp    = {Fri, 30 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/CamachoW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/FengLW0L20,
  author       = {Bingwen Feng and
                  Zhiquan Liu and
                  Kaimin Wei and
                  Wei Lu and
                  Yuchun Lin},
  editor       = {Xianfeng Zhao and
                  Yun{-}Qing Shi and
                  Alessandro Piva and
                  Hyoung Joong Kim},
  title        = {Variable Rate Syndrome-Trellis Codes for Steganography on Bursty Channels},
  booktitle    = {Digital Forensics and Watermarking - 19th International Workshop,
                  {IWDW} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12617},
  pages        = {15--30},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69449-4\_2},
  doi          = {10.1007/978-3-030-69449-4\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/FengLW0L20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/GruberNFGSS20,
  author       = {Sebastian Gruber and
                  Bernd Neumayr and
                  Christoph Fabianek and
                  Eduard Gringinger and
                  Christoph Georg Sch{\"{u}}tz and
                  Michael Schrefl},
  editor       = {Xianfeng Zhao and
                  Yun{-}Qing Shi and
                  Alessandro Piva and
                  Hyoung Joong Kim},
  title        = {Towards Informed Watermarking of Personal Health Sensor Data for Data
                  Leakage Detection},
  booktitle    = {Digital Forensics and Watermarking - 19th International Workshop,
                  {IWDW} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12617},
  pages        = {109--124},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69449-4\_9},
  doi          = {10.1007/978-3-030-69449-4\_9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/GruberNFGSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/GuZGY20,
  author       = {Yewei Gu and
                  Xianfeng Zhao and
                  Chen Gong and
                  Xiaowei Yi},
  editor       = {Xianfeng Zhao and
                  Yun{-}Qing Shi and
                  Alessandro Piva and
                  Hyoung Joong Kim},
  title        = {Deepfake Video Detection Using Audio-Visual Consistency},
  booktitle    = {Digital Forensics and Watermarking - 19th International Workshop,
                  {IWDW} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12617},
  pages        = {168--180},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69449-4\_13},
  doi          = {10.1007/978-3-030-69449-4\_13},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/GuZGY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuCYH20,
  author       = {Yuting Hu and
                  Han Cao and
                  Zhongliang Yang and
                  Yongfeng Huang},
  editor       = {Xianfeng Zhao and
                  Yun{-}Qing Shi and
                  Alessandro Piva and
                  Hyoung Joong Kim},
  title        = {Improving Text-Image Matching with Adversarial Learning and Circle
                  Loss for Multi-modal Steganography},
  booktitle    = {Digital Forensics and Watermarking - 19th International Workshop,
                  {IWDW} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12617},
  pages        = {41--52},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69449-4\_4},
  doi          = {10.1007/978-3-030-69449-4\_4},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuCYH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuYCH20,
  author       = {Yuting Hu and
                  Zhongliang Yang and
                  Han Cao and
                  Yongfeng Huang},
  editor       = {Xianfeng Zhao and
                  Yun{-}Qing Shi and
                  Alessandro Piva and
                  Hyoung Joong Kim},
  title        = {Multi-modal Steganography Based on Semantic Relevancy},
  booktitle    = {Digital Forensics and Watermarking - 19th International Workshop,
                  {IWDW} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12617},
  pages        = {3--14},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69449-4\_1},
  doi          = {10.1007/978-3-030-69449-4\_1},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuYCH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/JochlU20,
  author       = {Robert J{\"{o}}chl and
                  Andreas Uhl},
  editor       = {Xianfeng Zhao and
                  Yun{-}Qing Shi and
                  Alessandro Piva and
                  Hyoung Joong Kim},
  title        = {A Machine Learning Approach to Approximate the Age of a Digital Image},
  booktitle    = {Digital Forensics and Watermarking - 19th International Workshop,
                  {IWDW} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12617},
  pages        = {181--195},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69449-4\_14},
  doi          = {10.1007/978-3-030-69449-4\_14},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/JochlU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/MaZ20,
  author       = {Sai Ma and
                  Xianfeng Zhao},
  editor       = {Xianfeng Zhao and
                  Yun{-}Qing Shi and
                  Alessandro Piva and
                  Hyoung Joong Kim},
  title        = {Generating {JPEG} Steganographic Adversarial Example via Segmented
                  Adversarial Embedding},
  booktitle    = {Digital Forensics and Watermarking - 19th International Workshop,
                  {IWDW} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12617},
  pages        = {68--79},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69449-4\_6},
  doi          = {10.1007/978-3-030-69449-4\_6},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/MaZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/PengQL20,
  author       = {Fei Peng and
                  Wenjie Qian and
                  Min Long},
  editor       = {Xianfeng Zhao and
                  Yun{-}Qing Shi and
                  Alessandro Piva and
                  Hyoung Joong Kim},
  title        = {Visible Reversible Watermarking for 3D Models Based on Mesh Subdivision},
  booktitle    = {Digital Forensics and Watermarking - 19th International Workshop,
                  {IWDW} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12617},
  pages        = {136--149},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69449-4\_11},
  doi          = {10.1007/978-3-030-69449-4\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/PengQL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangCH20,
  author       = {Hongxia Wang and
                  Zhilong Chen and
                  Peisong He},
  editor       = {Xianfeng Zhao and
                  Yun{-}Qing Shi and
                  Alessandro Piva and
                  Hyoung Joong Kim},
  title        = {Constructing Immune Cover for Secure Steganography Based on an Artificial
                  Immune System Approach},
  booktitle    = {Digital Forensics and Watermarking - 19th International Workshop,
                  {IWDW} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12617},
  pages        = {53--67},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69449-4\_5},
  doi          = {10.1007/978-3-030-69449-4\_5},
  timestamp    = {Wed, 13 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangCH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangF020,
  author       = {Zichi Wang and
                  Guorui Feng and
                  Xinpeng Zhang},
  editor       = {Xianfeng Zhao and
                  Yun{-}Qing Shi and
                  Alessandro Piva and
                  Hyoung Joong Kim},
  title        = {Steganographic Distortion Function for Enhanced Images},
  booktitle    = {Digital Forensics and Watermarking - 19th International Workshop,
                  {IWDW} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12617},
  pages        = {31--40},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69449-4\_3},
  doi          = {10.1007/978-3-030-69449-4\_3},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangF020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangW0YR20,
  author       = {Donghua Wang and
                  Rangding Wang and
                  Li Dong and
                  Diqun Yan and
                  Yiming Ren},
  editor       = {Xianfeng Zhao and
                  Yun{-}Qing Shi and
                  Alessandro Piva and
                  Hyoung Joong Kim},
  title        = {Efficient Generation of Speech Adversarial Examples with Generative
                  Model},
  booktitle    = {Digital Forensics and Watermarking - 19th International Workshop,
                  {IWDW} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12617},
  pages        = {251--264},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69449-4\_19},
  doi          = {10.1007/978-3-030-69449-4\_19},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangW0YR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WongND20,
  author       = {KokSheik Wong and
                  Mohamed N. M. Nazeeb and
                  Jean{-}Luc Dugelay},
  editor       = {Xianfeng Zhao and
                  Yun{-}Qing Shi and
                  Alessandro Piva and
                  Hyoung Joong Kim},
  title        = {Complete Quality Preserving Data Hiding in Animated {GIF} with Reversibility
                  and Scalable Capacity Functionalities},
  booktitle    = {Digital Forensics and Watermarking - 19th International Workshop,
                  {IWDW} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12617},
  pages        = {125--135},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69449-4\_10},
  doi          = {10.1007/978-3-030-69449-4\_10},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WongND20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YinWL20,
  author       = {Qilin Yin and
                  Jinwei Wang and
                  Xiangyang Luo},
  editor       = {Xianfeng Zhao and
                  Yun{-}Qing Shi and
                  Alessandro Piva and
                  Hyoung Joong Kim},
  title        = {A Hybrid Loss Network for Localization of Image Manipulation},
  booktitle    = {Digital Forensics and Watermarking - 19th International Workshop,
                  {IWDW} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12617},
  pages        = {237--247},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69449-4\_18},
  doi          = {10.1007/978-3-030-69449-4\_18},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/YinWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZengDP20,
  author       = {Hui Zeng and
                  Kang Deng and
                  Anjie Peng},
  editor       = {Xianfeng Zhao and
                  Yun{-}Qing Shi and
                  Alessandro Piva and
                  Hyoung Joong Kim},
  title        = {{ISO} Setting Estimation Based on Convolutional Neural Network and
                  its Application in Image Forensics},
  booktitle    = {Digital Forensics and Watermarking - 19th International Workshop,
                  {IWDW} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12617},
  pages        = {224--236},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69449-4\_17},
  doi          = {10.1007/978-3-030-69449-4\_17},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZengDP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhaoNN020,
  author       = {Xiaoyu Zhao and
                  Yakun Niu and
                  Rongrong Ni and
                  Yao Zhao},
  editor       = {Xianfeng Zhao and
                  Yun{-}Qing Shi and
                  Alessandro Piva and
                  Hyoung Joong Kim},
  title        = {Defocused Image Splicing Localization by Distinguishing Multiple Cues
                  between Raw Naturally Blur and Artificial Blur},
  booktitle    = {Digital Forensics and Watermarking - 19th International Workshop,
                  {IWDW} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12617},
  pages        = {153--167},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69449-4\_12},
  doi          = {10.1007/978-3-030-69449-4\_12},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhaoNN020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhaoW20,
  author       = {Junjie Zhao and
                  Jinwei Wang},
  editor       = {Xianfeng Zhao and
                  Yun{-}Qing Shi and
                  Alessandro Piva and
                  Hyoung Joong Kim},
  title        = {Lightweight DCT-Like Domain Forensics Model for Adversarial Example},
  booktitle    = {Digital Forensics and Watermarking - 19th International Workshop,
                  {IWDW} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12617},
  pages        = {265--279},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69449-4\_20},
  doi          = {10.1007/978-3-030-69449-4\_20},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhaoW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhaoYL20,
  author       = {Xianfeng Zhao and
                  Chunfang Yang and
                  Fenlin Liu},
  editor       = {Xianfeng Zhao and
                  Yun{-}Qing Shi and
                  Alessandro Piva and
                  Hyoung Joong Kim},
  title        = {On the Sharing-Based Model of Steganography},
  booktitle    = {Digital Forensics and Watermarking - 19th International Workshop,
                  {IWDW} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12617},
  pages        = {94--105},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69449-4\_8},
  doi          = {10.1007/978-3-030-69449-4\_8},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhaoYL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZouYZRH20,
  author       = {Jiajun Zou and
                  Zhongliang Yang and
                  Si{-}Yu Zhang and
                  Sadaqat ur Rehman and
                  Yongfeng Huang},
  editor       = {Xianfeng Zhao and
                  Yun{-}Qing Shi and
                  Alessandro Piva and
                  Hyoung Joong Kim},
  title        = {High-Performance Linguistic Steganalysis, Capacity Estimation and
                  Steganographic Positioning},
  booktitle    = {Digital Forensics and Watermarking - 19th International Workshop,
                  {IWDW} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12617},
  pages        = {80--93},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69449-4\_7},
  doi          = {10.1007/978-3-030-69449-4\_7},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZouYZRH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2019,
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-43575-2},
  doi          = {10.1007/978-3-030-43575-2},
  isbn         = {978-3-030-43574-5},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/0001GSQ19,
  author       = {Dawen Xu and
                  Bo Guan and
                  Shubing Su and
                  Xuena Qiu},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {High-Capacity Reversible Data Hiding in Encrypted Images Based on
                  {MSB} Prediction},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {231--243},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_20},
  doi          = {10.1007/978-3-030-43575-2\_20},
  timestamp    = {Thu, 28 May 2020 12:51:40 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/0001GSQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/0059CXYS19,
  author       = {Yang Yang and
                  Xue Cai and
                  Xingxing Xiao and
                  Jinghan Ye and
                  Wenyi Shi},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {A Novel Reversible Data Hiding with Skin Tone Smoothing Effect for
                  Face Images},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {204--212},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_17},
  doi          = {10.1007/978-3-030-43575-2\_17},
  timestamp    = {Wed, 25 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/0059CXYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/CaoWQQZ19,
  author       = {Fang Cao and
                  Tianwei Wu and
                  Chuan Qin and
                  Zhenxing Qian and
                  Xinpeng Zhang},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {New Paradigm for Self-embedding Image Watermarking with Poisson Equation},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {184--191},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_15},
  doi          = {10.1007/978-3-030-43575-2\_15},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/CaoWQQZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Darmet0C19,
  author       = {Ludovic Darmet and
                  Kai Wang and
                  Fran{\c{c}}ois Cayre},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {Weakly Supervised Adaptation to Re-sizing for Image Manipulation Detection
                  on Small Patches},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {99--114},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_8},
  doi          = {10.1007/978-3-030-43575-2\_8},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Darmet0C19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/DuWH19,
  author       = {Ling Du and
                  Yijing Wang and
                  Anthony T. S. Ho},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {Multi-attack Reference Hashing Generation for Image Authentication},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {407--420},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_33},
  doi          = {10.1007/978-3-030-43575-2\_33},
  timestamp    = {Wed, 25 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/DuWH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/DuanMH19,
  author       = {Guiduo Duan and
                  Jiayu Miao and
                  Tianxi Huang},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {Median Filtering Detection of Small-Size Image Using AlexCaps-Network},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {126--140},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_10},
  doi          = {10.1007/978-3-030-43575-2\_10},
  timestamp    = {Wed, 25 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/DuanMH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/GeHXLZ19,
  author       = {Hui Ge and
                  Donghui Hu and
                  Haiyan Xu and
                  Meng Li and
                  Shuli Zheng},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {New Steganalytic Features for Spatial Image Steganography Based on
                  Non-negative Matrix Factorization},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {337--351},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_28},
  doi          = {10.1007/978-3-030-43575-2\_28},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/GeHXLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/GongZ19,
  author       = {Chen Gong and
                  Xianfeng Zhao},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {New Steganalytic Approach for {AMR} Steganography Based on Block-Wise
                  of Pulse Position Distribution and Neighboring Joint Density},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {307--321},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_26},
  doi          = {10.1007/978-3-030-43575-2\_26},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/GongZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/GuoSJD019,
  author       = {Mengyuan Guo and
                  Tanfeng Sun and
                  Xinghao Jiang and
                  Yi Dong and
                  Ke Xu},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {A Motion Vector-Based Steganographic Algorithm for {HEVC} with {MTB}
                  Mapping Strategy},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {293--306},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_25},
  doi          = {10.1007/978-3-030-43575-2\_25},
  timestamp    = {Wed, 25 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/GuoSJD019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuangW0H19,
  author       = {Ting Huang and
                  Hongxia Wang and
                  Yi Chen and
                  Peisong He},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {{GRU-SVM} Model for Synthetic Speech Detection},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {115--125},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_9},
  doi          = {10.1007/978-3-030-43575-2\_9},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuangW0H19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KuribayashiW19,
  author       = {Minoru Kuribayashi and
                  KokSheik Wong},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {Improved {DM-QIM} Watermarking Scheme for {PDF} Document},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {171--183},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_14},
  doi          = {10.1007/978-3-030-43575-2\_14},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KuribayashiW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiFWZ19,
  author       = {Qiangjie Li and
                  Guorui Feng and
                  Hanzhou Wu and
                  Xinpeng Zhang},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {Ensemble Steganalysis Based on Deep Residual Network},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {84--95},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_7},
  doi          = {10.1007/978-3-030-43575-2\_7},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiFWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiuYLZ19,
  author       = {Wanteng Liu and
                  Xiaolin Yin and
                  Wei Lu and
                  Junhong Zhang},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {Halftone Image Steganography with Distortion Measurement Based on
                  Structural Similarity},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {281--292},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_24},
  doi          = {10.1007/978-3-030-43575-2\_24},
  timestamp    = {Wed, 15 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiuYLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LuZW19,
  author       = {Yubo Lu and
                  Liming Zhai and
                  Lina Wang},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {Designing Non-additive Distortions for {JPEG} Steganography Based
                  on Blocking Artifacts Reduction},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {268--280},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_23},
  doi          = {10.1007/978-3-030-43575-2\_23},
  timestamp    = {Fri, 15 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/LuZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/MaYL19,
  author       = {Jianfeng Ma and
                  Liping Yin and
                  Peng Li},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {Cheating Detection in (k, n) Secret Image Sharing Scheme},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {421--428},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_34},
  doi          = {10.1007/978-3-030-43575-2\_34},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/MaYL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/MalikWKC019,
  author       = {Asad Malik and
                  Hongxia Wang and
                  Ahmad Neyaz Khan and
                  Yanli Chen and
                  Yi Chen},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {A Novel Lossless Data Hiding Scheme in Homomorphically Encrypted Images},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {213--220},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_18},
  doi          = {10.1007/978-3-030-43575-2\_18},
  timestamp    = {Wed, 06 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/MalikWKC019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/QinLZ19,
  author       = {Liwen Qin and
                  Xiaolong Li and
                  Yao Zhao},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {A New {JPEG} Image Watermarking Method Exploiting Spatial {JND} Model},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {161--170},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_13},
  doi          = {10.1007/978-3-030-43575-2\_13},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/QinLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Shen0S19,
  author       = {Zhangyi Shen and
                  Feng Ding and
                  Yunqing Shi},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {Anti-forensics of Image Sharpening Using Generative Adversarial Network},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {150--157},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_12},
  doi          = {10.1007/978-3-030-43575-2\_12},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/Shen0S19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/TongNS19,
  author       = {Yichen Tong and
                  Jiangqun Ni and
                  Wenkang Su},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {Image Steganography Using an Eight-Element Neighborhood Gaussian Markov
                  Random Field Model},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {247--255},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_21},
  doi          = {10.1007/978-3-030-43575-2\_21},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/TongNS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangHLS19,
  author       = {Jinwei Wang and
                  Wei Huang and
                  Xiangyang Luo and
                  Yung{-}Qing Shi},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {Double {JPEG} Compression Detection Based on Markov Model},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {141--149},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_11},
  doi          = {10.1007/978-3-030-43575-2\_11},
  timestamp    = {Wed, 25 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangHLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WuH19,
  author       = {Haihang Wu and
                  Fangjun Huang},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {Reversible Data Hiding Based on Partitioning the Prediction Values},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {195--203},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_16},
  doi          = {10.1007/978-3-030-43575-2\_16},
  timestamp    = {Wed, 25 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/WuH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WuLZ019,
  author       = {Haibin Wu and
                  Fengyong Li and
                  Xinpeng Zhang and
                  Kui Wu},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {GAN-Based Steganography with the Concatenation of Multiple Feature
                  Maps},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_1},
  doi          = {10.1007/978-3-030-43575-2\_1},
  timestamp    = {Tue, 31 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/WuLZ019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XuWFZD19,
  author       = {Mengtian Xu and
                  Hanzhou Wu and
                  Guorui Feng and
                  Xinpeng Zhang and
                  Feng Ding},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {Broadcasting Steganography in the Blockchain},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {256--267},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_22},
  doi          = {10.1007/978-3-030-43575-2\_22},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/XuWFZD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XuePWWZ19,
  author       = {Yiming Xue and
                  Wan{-}li Peng and
                  Yuzhu Wang and
                  Juan Wen and
                  Ping Zhong},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {Optimized {CNN} with Point-Wise Parametric Rectified Linear Unit for
                  Spatial Image Steganalysis},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {32--42},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_3},
  doi          = {10.1007/978-3-030-43575-2\_3},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/XuePWWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YangHHZ19,
  author       = {Zhongliang Yang and
                  Yuting Hu and
                  Yongfeng Huang and
                  Yujin Zhang},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {Behavioral Security in Covert Communication Systems},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {377--392},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_31},
  doi          = {10.1007/978-3-030-43575-2\_31},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YangHHZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YangWLHZ19,
  author       = {Zhongliang Yang and
                  Nan Wei and
                  Qinghe Liu and
                  Yongfeng Huang and
                  Yujin Zhang},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {GAN-TStega: Text Steganography Based on Generative Adversarial Networks},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {18--31},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_2},
  doi          = {10.1007/978-3-030-43575-2\_2},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YangWLHZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YangWMHKZ19,
  author       = {Zhongliang Yang and
                  Ke Wang and
                  Sai Ma and
                  Yongfeng Huang and
                  Xiangui Kang and
                  Xianfeng Zhao},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {IStego100K: Large-Scale Image Steganalysis Dataset},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {352--364},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_29},
  doi          = {10.1007/978-3-030-43575-2\_29},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/YangWMHKZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YangZZXW19,
  author       = {Liran Yang and
                  Jing Zhong and
                  Ping Zhong and
                  Yiming Xue and
                  Juan Wen},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {A Novel Feature Selection Model for {JPEG} Image Steganalysis},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {322--336},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_27},
  doi          = {10.1007/978-3-030-43575-2\_27},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/YangZZXW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhangKW019,
  author       = {Xunpeng Zhang and
                  Xiangwei Kong and
                  Pengda Wang and
                  Bo Wang},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {Cover-Source Mismatch in Deep Spatial Steganalysis},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {71--83},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_6},
  doi          = {10.1007/978-3-030-43575-2\_6},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhangKW019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhangYZ19,
  author       = {Zhenyu Zhang and
                  Xiaowei Yi and
                  Xianfeng Zhao},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {Improving Audio Steganalysis Using Deep Residual Networks},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {57--70},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_5},
  doi          = {10.1007/978-3-030-43575-2\_5},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhangYZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhangYZC19,
  author       = {Jinghong Zhang and
                  Xiaowei Yi and
                  Xianfeng Zhao and
                  Yun Cao},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {Light Multiscale Conventional Neural Network for {MP3} Steganalysis},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {43--56},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_4},
  doi          = {10.1007/978-3-030-43575-2\_4},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhangYZC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhaoW19,
  author       = {Danyang Zhao and
                  Kaixi Wang},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {{BNS-CNN:} {A} Blind Network Steganalysis Model Based on Convolutional
                  Neural Network in IPv6 Network},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {365--373},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_30},
  doi          = {10.1007/978-3-030-43575-2\_30},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhaoW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhouBCW19,
  author       = {Longfu Zhou and
                  Sen Bai and
                  Yuqiang Cao and
                  Yinglong Wang},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {Image Visually Meaningful Cryptography Based on Julia Set Generating
                  and Information Hiding},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {393--406},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_32},
  doi          = {10.1007/978-3-030-43575-2\_32},
  timestamp    = {Wed, 25 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhouBCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhouL19,
  author       = {Linna Zhou and
                  Derui Liao},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {Information Hiding Based on Typing Errors},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {221--230},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_19},
  doi          = {10.1007/978-3-030-43575-2\_19},
  timestamp    = {Wed, 25 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhouL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2018,
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-11389-6},
  doi          = {10.1007/978-3-030-11389-6},
  isbn         = {978-3-030-11388-9},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/BellafqiraCGC18,
  author       = {Reda Bellafqira and
                  Gouenou Coatrieux and
                  Emmanuelle G{\'{e}}nin and
                  Michel Cozic},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {Secure Multilayer Perceptron Based on Homomorphic Encryption},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {322--336},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_24},
  doi          = {10.1007/978-3-030-11389-6\_24},
  timestamp    = {Thu, 28 May 2020 12:51:40 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/BellafqiraCGC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Cardamoned18,
  author       = {Nicol{\`{o}} Cardamone and
                  Fabrizio d'Amore},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {{DWT} and {QR} Code Based Watermarking for Document {DRM}},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {137--150},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_11},
  doi          = {10.1007/978-3-030-11389-6\_11},
  timestamp    = {Thu, 31 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/Cardamoned18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChenYCHQ18,
  author       = {Fan Chen and
                  Yuan Yuan and
                  Yuyu Chen and
                  Hongjie He and
                  Lingfeng Qu},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {Reversible Data Hiding Scheme in Encrypted-Image Based on Prediction
                  and Compression Coding},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {216--229},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_17},
  doi          = {10.1007/978-3-030-11389-6\_17},
  timestamp    = {Wed, 03 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChenYCHQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/DongSJ18,
  author       = {Yi Dong and
                  Tanfeng Sun and
                  Xinghao Jiang},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {A High Capacity {HEVC} Steganographic Algorithm Using Intra Prediction
                  Modes in Multi-sized Prediction Blocks},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {233--247},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_18},
  doi          = {10.1007/978-3-030-11389-6\_18},
  timestamp    = {Thu, 31 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/DongSJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/FadlHL18,
  author       = {Sondos M. Fadl and
                  Qi Han and
                  Qiong Li},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {Surveillance Video Authentication Using Universal Image Quality Index
                  of Temporal Average},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {337--350},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_25},
  doi          = {10.1007/978-3-030-11389-6\_25},
  timestamp    = {Fri, 31 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/FadlHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/GongYZ18,
  author       = {Chen Gong and
                  Xiaowei Yi and
                  Xianfeng Zhao},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {Pitch Delay Based Adaptive Steganography for {AMR} Speech Stream},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {275--289},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_21},
  doi          = {10.1007/978-3-030-11389-6\_21},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/GongYZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuangTLH18,
  author       = {Yuankun Huang and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {{VPCID} - {A} VoIP Phone Call Identification Database},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {307--321},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_23},
  doi          = {10.1007/978-3-030-11389-6\_23},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuangTLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KangJL18,
  author       = {Jihyeon Kang and
                  Sang{-}Keun Ji and
                  Heung{-}Kyu Lee},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {Spherical Panorama Image Watermarking Using Viewpoint Detection},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {95--109},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_8},
  doi          = {10.1007/978-3-030-11389-6\_8},
  timestamp    = {Wed, 20 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KangJL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KimCKN18,
  author       = {Hakil Kim and
                  Xuenan Cui and
                  Man{-}Gyu Kim and
                  Thi Hai Binh Nguyen},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {Reconstruction of Fingerprints from Minutiae Using Conditional Adversarial
                  Networks},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {353--362},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_26},
  doi          = {10.1007/978-3-030-11389-6\_26},
  timestamp    = {Thu, 31 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/KimCKN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/MaWLS18,
  author       = {Bin Ma and
                  Xiaoyu Wang and
                  Bing Li and
                  Yun{-}Qing Shi},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {A Multiple Linear Regression Based High-Accuracy Error Prediction
                  Algorithm for Reversible Data Hiding},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {195--205},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_15},
  doi          = {10.1007/978-3-030-11389-6\_15},
  timestamp    = {Fri, 15 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/MaWLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/MareenPWL18,
  author       = {Hannes Mareen and
                  Johan De Praeter and
                  Glenn Van Wallendael and
                  Peter Lambert},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {Traitor Tracing After Visible Watermark Removal},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {110--123},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_9},
  doi          = {10.1007/978-3-030-11389-6\_9},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/MareenPWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Nishimura18,
  author       = {Akira Nishimura},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {A Novel Steganalysis of Steghide Focused on High-Frequency Region
                  of Audio Waveform},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {69--82},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_6},
  doi          = {10.1007/978-3-030-11389-6\_6},
  timestamp    = {Thu, 31 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/Nishimura18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/NiyitegekaCBGF18,
  author       = {David Niyitegeka and
                  Gouenou Coatrieux and
                  Reda Bellafqira and
                  Emmanuelle G{\'{e}}nin and
                  Javier Franco{-}Contreras},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {Dynamic Watermarking-Based Integrity Protection of Homomorphically
                  Encrypted Databases - Application to Outsourced Genetic Data},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {151--166},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_12},
  doi          = {10.1007/978-3-030-11389-6\_12},
  timestamp    = {Thu, 31 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/NiyitegekaCBGF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/OuLLS18,
  author       = {Bo Ou and
                  Xiaolong Li and
                  Wei Li and
                  Yun{-}Qing Shi},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {Pixel-Value-Ordering Based Reversible Data Hiding with Adaptive Texture
                  Classification and Modification},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {169--179},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_13},
  doi          = {10.1007/978-3-030-11389-6\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/OuLLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ParkJMY18,
  author       = {Hyoungwoo Park and
                  Minjeong Ju and
                  Sangkeun Moon and
                  Chang D. Yoo},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {Unsupervised Domain Adaptation for Object Detection Using Distribution
                  Matching in Various Feature Level},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {363--372},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_27},
  doi          = {10.1007/978-3-030-11389-6\_27},
  timestamp    = {Thu, 31 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ParkJMY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/PengY18,
  author       = {Yinyin Peng and
                  Zhao{-}Xia Yin},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {A Strategy of Distinguishing Texture Feature for Reversible Data Hiding
                  Based on Histogram Shifting},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {206--215},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_16},
  doi          = {10.1007/978-3-030-11389-6\_16},
  timestamp    = {Thu, 31 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/PengY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SongZL18,
  author       = {Chang Song and
                  Yifeng Zhang and
                  Guojun Lu},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {Reversible Data Hiding in Encrypted Images Based on Image Partition
                  and Spatial Correlation},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {180--194},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_14},
  doi          = {10.1007/978-3-030-11389-6\_14},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/SongZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/TaburetFBS18,
  author       = {Th{\'{e}}o Taburet and
                  Louis Filstroff and
                  Patrick Bas and
                  Wadih Sawaya},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {An Empirical Study of Steganography and Steganalysis of Color Images
                  in the {JPEG} Domain},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {290--303},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_22},
  doi          = {10.1007/978-3-030-11389-6\_22},
  timestamp    = {Thu, 31 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/TaburetFBS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/UsamaC18,
  author       = {Muhammad Usama and
                  Dong Eui Chang},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {Towards Robust Neural Networks with Lipschitz Continuity},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {373--389},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_28},
  doi          = {10.1007/978-3-030-11389-6\_28},
  timestamp    = {Thu, 31 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/UsamaC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XueMLWZN18,
  author       = {Yiming Xue and
                  Kai Mu and
                  Yan Li and
                  Juan Wen and
                  Ping Zhong and
                  Shaozhang Niu},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {Improved High Capacity Spread Spectrum-Based Audio Watermarking by
                  Hadamard Matrices},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {124--136},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_10},
  doi          = {10.1007/978-3-030-11389-6\_10},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/XueMLWZN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YangCZY18,
  author       = {Kuan Yang and
                  Kejiang Chen and
                  Weiming Zhang and
                  Nenghai Yu},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {Provably Secure Generative Steganography Based on Autoregressive Model},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {55--68},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_5},
  doi          = {10.1007/978-3-030-11389-6\_5},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YangCZY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YeSXS18,
  author       = {Jingyu Ye and
                  Yuxi Shi and
                  Guanshuo Xu and
                  Yun{-}Qing Shi},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {A Convolutional Neural Network Based Seam Carving Detection Scheme
                  for Uncompressed Digital Images},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {3--13},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_1},
  doi          = {10.1007/978-3-030-11389-6\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YeSXS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YuCZWY18,
  author       = {Xinzhi Yu and
                  Kejiang Chen and
                  Weiming Zhang and
                  Yaofei Wang and
                  Nenghai Yu},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {Improving the Embedding Strategy for Batch Adaptive Steganography},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {248--260},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_19},
  doi          = {10.1007/978-3-030-11389-6\_19},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YuCZWY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Zhang0ZY18,
  author       = {Shiyang Zhang and
                  Hong Zhang and
                  Xianfeng Zhao and
                  Haibo Yu},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {A Deep Residual Multi-scale Convolutional Network for Spatial Steganalysis},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {40--52},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_4},
  doi          = {10.1007/978-3-030-11389-6\_4},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Zhang0ZY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhangZL18,
  author       = {Qian Zhang and
                  Xianfeng Zhao and
                  Changjun Liu},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {Convolutional Neural Network for Larger {JPEG} Images Steganalysis},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {14--28},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_2},
  doi          = {10.1007/978-3-030-11389-6\_2},
  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhangZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhaoYNZL18,
  author       = {Wei Zhao and
                  Pengpeng Yang and
                  Rongrong Ni and
                  Yao Zhao and
                  Wenjie Li},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {Cycle GAN-Based Attack on Recaptured Images to Fool both Human and
                  Machine},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {83--92},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_7},
  doi          = {10.1007/978-3-030-11389-6\_7},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhaoYNZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhengLRKS18,
  author       = {Huilin Zheng and
                  Xuan Li and
                  Danyang Ruan and
                  Xiangui Kang and
                  Yun{-}Qing Shi},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {Comparison of {DCT} and Gabor Filters in Residual Extraction of {CNN}
                  Based {JPEG} Steganalysis},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {29--39},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_3},
  doi          = {10.1007/978-3-030-11389-6\_3},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhengLRKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhouTTL18,
  author       = {Shijun Zhou and
                  Weixuan Tang and
                  Shunquan Tan and
                  Bin Li},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {Content-Adaptive Steganalysis via Augmented Utilization of Selection-Channel
                  Information},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {261--274},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_20},
  doi          = {10.1007/978-3-030-11389-6\_20},
  timestamp    = {Thu, 06 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhouTTL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/AsaadJ17,
  author       = {Aras Asaad and
                  Sabah Jassim},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {Topological Data Analysis for Image Tampering Detection},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {136--146},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_11},
  doi          = {10.1007/978-3-319-64185-0\_11},
  timestamp    = {Thu, 28 May 2020 12:51:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/AsaadJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/CuiNZ17,
  author       = {Chenchen Cui and
                  Rongrong Ni and
                  Yao Zhao},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {Robust Zero Watermarking for 3D Triangular Mesh Models Based on Spherical
                  Integral Invariants},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {318--330},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_24},
  doi          = {10.1007/978-3-319-64185-0\_24},
  timestamp    = {Thu, 05 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/CuiNZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/DongJSX17,
  author       = {Yi Dong and
                  Xinghao Jiang and
                  Tanfeng Sun and
                  Dawen Xu},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {Coding Efficiency Preserving Steganography Based on {HEVC} Steganographic
                  Channel Model},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {149--162},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_12},
  doi          = {10.1007/978-3-319-64185-0\_12},
  timestamp    = {Tue, 24 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/DongJSX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/EjetaK17,
  author       = {Tekachew Gobena Ejeta and
                  Hyoung Joong Kim},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {Website Fingerprinting Attack on Psiphon and Its Forensic Analysis},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {42--51},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_4},
  doi          = {10.1007/978-3-319-64185-0\_4},
  timestamp    = {Tue, 15 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/EjetaK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/FengWL17,
  author       = {Bingwen Feng and
                  Jian Weng and
                  Wei Lu},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {Improved Algorithms for Robust Histogram Shape-Based Image Watermarking},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {275--289},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_21},
  doi          = {10.1007/978-3-319-64185-0\_21},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/FengWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/FujiyoshiK17,
  author       = {Masaaki Fujiyoshi and
                  Hitoshi Kiya},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {A Blind Reversible Data Hiding Method for High Dynamic Range Images
                  Taking Advantage of Sparse Histogram},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {347--361},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_26},
  doi          = {10.1007/978-3-319-64185-0\_26},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/FujiyoshiK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KalbitzSYV17,
  author       = {Michael Kalbitz and
                  Tobias Scheidat and
                  Benjamin Y{\"{u}}ksel and
                  Claus Vielhauer},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {Towards Automated Forensic Pen Ink Verification by Spectral Analysis},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {18--30},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_2},
  doi          = {10.1007/978-3-319-64185-0\_2},
  timestamp    = {Tue, 15 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KalbitzSYV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KohlerPB17,
  author       = {Olaf Markus K{\"{o}}hler and
                  Cecilia Pasquini and
                  Rainer B{\"{o}}hme},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {On the Statistical Properties of Syndrome Trellis Coding},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {331--346},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_25},
  doi          = {10.1007/978-3-319-64185-0\_25},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/KohlerPB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiL17,
  author       = {Peng Li and
                  Zuquan Liu},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {A Novel Visual Cryptography Scheme with Different Importance of Shadows},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {365--377},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_27},
  doi          = {10.1007/978-3-319-64185-0\_27},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LuoZL17,
  author       = {Weiqi Luo and
                  Yue Zhang and
                  Haodong Li},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {Adaptive Audio Steganography Based on Advanced Audio Coding and Syndrome-Trellis
                  Coding},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {177--186},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_14},
  doi          = {10.1007/978-3-319-64185-0\_14},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/LuoZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Neubert17,
  author       = {Tom Neubert},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {Face Morphing Detection: An Approach Based on Image Degradation Analysis},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {93--106},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_8},
  doi          = {10.1007/978-3-319-64185-0\_8},
  timestamp    = {Tue, 15 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Neubert17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Nishimura17,
  author       = {Akira Nishimura},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {Improvement and Evaluation of Time-Spread Echo Hiding Technology for
                  Long-Distance Voice Evacuation Systems},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {391--405},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_29},
  doi          = {10.1007/978-3-319-64185-0\_29},
  timestamp    = {Tue, 15 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Nishimura17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/RenGLWL17,
  author       = {Xudie Ren and
                  Haonan Guo and
                  Shenghong Li and
                  Shilin Wang and
                  Jianhua Li},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {A Novel Image Classification Method with CNN-XGBoost Model},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {378--390},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_28},
  doi          = {10.1007/978-3-319-64185-0\_28},
  timestamp    = {Fri, 27 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/RenGLWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/RenXW17,
  author       = {Yanzhen Ren and
                  Qiaochu Xiong and
                  Lina Wang},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {A Steganalysis Scheme for {AAC} Audio Based on {MDCT} Difference Between
                  Intra and Inter Frame},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {217--231},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_17},
  doi          = {10.1007/978-3-319-64185-0\_17},
  timestamp    = {Fri, 15 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/RenXW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SameerNMK17,
  author       = {Venkata Udaya Sameer and
                  Ruchira Naskar and
                  Nikhita Musthyala and
                  Kalyan Kokkalla},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {Deep Learning Based Counter-Forensic Image Classification for Camera
                  Model Identification},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {52--64},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_5},
  doi          = {10.1007/978-3-319-64185-0\_5},
  timestamp    = {Tue, 15 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SameerNMK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SedeeqCL17,
  author       = {Iman Sedeeq and
                  Frans Coenen and
                  Alexei Lisitsa},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {A Prediction Model Based Approach to Open Space Steganography Detection
                  in {HTML} Webpages},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {235--247},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_18},
  doi          = {10.1007/978-3-319-64185-0\_18},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SedeeqCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SeiboldSHE17,
  author       = {Clemens Seibold and
                  Wojciech Samek and
                  Anna Hilsmann and
                  Peter Eisert},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {Detection of Face Morphing Attacks by Deep Learning},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {107--120},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_9},
  doi          = {10.1007/978-3-319-64185-0\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SeiboldSHE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Spiekermann0E17,
  author       = {Daniel Spiekermann and
                  J{\"{o}}rg Keller and
                  Tobias Eggendorfer},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {Towards Covert Channels in Cloud Environments: {A} Study of Implementations
                  in Virtual Networks},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {248--262},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_19},
  doi          = {10.1007/978-3-319-64185-0\_19},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Spiekermann0E17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WandzikVKC17,
  author       = {Lukasz Wandzik and
                  Raul Vicente{-}Garcia and
                  Gerald Kaeding and
                  Xi Chen},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {CNNs Under Attack: On the Vulnerability of Deep Neural Networks Based
                  Face Recognition to Image Morphing},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {121--135},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_10},
  doi          = {10.1007/978-3-319-64185-0\_10},
  timestamp    = {Tue, 15 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WandzikVKC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangCZZ17,
  author       = {Yu Wang and
                  Yun Cao and
                  Xianfeng Zhao and
                  Linna Zhou},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {A Prediction Mode-Based Information Hiding Approach for {H.264/AVC}
                  Videos Minimizing the Impacts on Rate-Distortion Optimization},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {163--176},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_13},
  doi          = {10.1007/978-3-319-64185-0\_13},
  timestamp    = {Mon, 19 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangCZZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangLGR17,
  author       = {Wen Wang and
                  Feng Liu and
                  Teng Guo and
                  YaWei Ren},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {Temporal Integration Based Visual Cryptography Scheme and Its Application},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {406--419},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_30},
  doi          = {10.1007/978-3-319-64185-0\_30},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangLGR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WuTS17,
  author       = {Hao{-}Tian Wu and
                  Shaohua Tang and
                  Yun{-}Qing Shi},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {Image Quality Assessment in Reversible Data Hiding with Contrast Enhancement},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {290--302},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_22},
  doi          = {10.1007/978-3-319-64185-0\_22},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WuTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XuSJD17,
  author       = {Qianyi Xu and
                  Tanfeng Sun and
                  Xinghao Jiang and
                  Yi Dong},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {{HEVC} Double Compression Detection Based on {SN-PUPM} Feature},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_1},
  doi          = {10.1007/978-3-319-64185-0\_1},
  timestamp    = {Tue, 15 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/XuSJD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YangLKWS17,
  author       = {Jianhua Yang and
                  Kai Liu and
                  Xiangui Kang and
                  Edward K. Wong and
                  Yunqing Shi},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {Steganalysis Based on Awareness of Selection-Channel and Deep Learning},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {263--272},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_20},
  doi          = {10.1007/978-3-319-64185-0\_20},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YangLKWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YangLNZ17,
  author       = {Pengpeng Yang and
                  Ruihan Li and
                  Rongrong Ni and
                  Yao Zhao},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {Recaptured Image Forensics Based on Quality Aware and Histogram Feature},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {31--41},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_3},
  doi          = {10.1007/978-3-319-64185-0\_3},
  timestamp    = {Thu, 05 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/YangLNZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YangQLG17,
  author       = {Guangyuan Yang and
                  Wenfa Qi and
                  Xiaolong Li and
                  Zongming Guo},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {Improved Reversible Visible Watermarking Based on Adaptive Block Partition},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {303--317},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_23},
  doi          = {10.1007/978-3-319-64185-0\_23},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/YangQLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YangYZZ17,
  author       = {Kun Yang and
                  Xiaowei Yi and
                  Xianfeng Zhao and
                  Linna Zhou},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {Adaptive {MP3} Steganography Using Equal Length Entropy Codes Substitution},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {202--216},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_16},
  doi          = {10.1007/978-3-319-64185-0\_16},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YangYZZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YeS17,
  author       = {Jingyu Ye and
                  Yun{-}Qing Shi},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {A Hybrid Feature Model for Seam Carving Detection},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {77--89},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_7},
  doi          = {10.1007/978-3-319-64185-0\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YeS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YouCZ17,
  author       = {Weike You and
                  Yun Cao and
                  Xianfeng Zhao},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {Information Hiding Using {CAVLC:} Misconceptions and a Detection Strategy},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {187--201},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_15},
  doi          = {10.1007/978-3-319-64185-0\_15},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YouCZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhouNR17,
  author       = {Jianghong Zhou and
                  Jiangqun Ni and
                  Yuan Rao},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {Block-Based Convolutional Neural Network for Image Forgery Detection},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {65--76},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_6},
  doi          = {10.1007/978-3-319-64185-0\_6},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhouNR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2016,
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-53465-7},
  doi          = {10.1007/978-3-319-53465-7},
  isbn         = {978-3-319-53464-0},
  timestamp    = {Tue, 20 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2017,
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0},
  doi          = {10.1007/978-3-319-64185-0},
  isbn         = {978-3-319-64184-3},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/0001ZWFC16,
  author       = {Dawen Xu and
                  Yani Zhu and
                  Rangding Wang and
                  Jianjing Fu and
                  Kai Chen},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Two-Dimensional Histogram Modification for Reversible Data Hiding
                  in Partially Encrypted {H.264/AVC} Videos},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {393--406},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_29},
  doi          = {10.1007/978-3-319-53465-7\_29},
  timestamp    = {Tue, 20 Aug 2024 07:54:44 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/0001ZWFC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/AbdullahiWQC16,
  author       = {Sani M. Abdullahi and
                  Hongxia Wang and
                  Qing Qian and
                  Wencheng Cao},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Concealing Fingerprint-Biometric Data into Audio Signals for Identify
                  Authentication},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {129--144},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_10},
  doi          = {10.1007/978-3-319-53465-7\_10},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/AbdullahiWQC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/BianTWGC16,
  author       = {Yuan Bian and
                  Guangming Tang and
                  Shuo Wang and
                  Zhanzhan Gao and
                  Shiyuan Chen},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Adaptive Steganography Using 2D Gabor Filters and Ensemble Classifiers},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {506--517},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_38},
  doi          = {10.1007/978-3-319-53465-7\_38},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/BianTWGC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/CaoWZQA16,
  author       = {Wencheng Cao and
                  Hongxia Wang and
                  Hong Zhao and
                  Qing Qian and
                  Sani M. Abdullahi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Identification of Electronic Disguised Voices in the Noisy Environment},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {75--87},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_6},
  doi          = {10.1007/978-3-319-53465-7\_6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/CaoWZQA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChangCCW16,
  author       = {Chin{-}Chen Chang and
                  Jen{-}Chun Chang and
                  Yun{-}Hong Chou and
                  Hsin{-}Lung Wu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {A High Embedding Capacity Data Hiding Scheme Based upon Permutation
                  Vectors},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {578--587},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_43},
  doi          = {10.1007/978-3-319-53465-7\_43},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChangCCW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChenSJHWS16,
  author       = {Shuo Chen and
                  Tanfeng Sun and
                  Xinghao Jiang and
                  Peisong He and
                  Shilin Wang and
                  Yun Q. Shi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Detecting Double {H.264} Compression Based on Analyzing Prediction
                  Residual Distribution},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {61--74},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_5},
  doi          = {10.1007/978-3-319-53465-7\_5},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChenSJHWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChoiSJL16,
  author       = {Hak{-}Yeol Choi and
                  Jeongho Son and
                  Han{-}Ul Jang and
                  Heung{-}Kyu Lee},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Blind 3D Mesh Watermarking Based on Sphere-Shape Template},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {280--295},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_21},
  doi          = {10.1007/978-3-319-53465-7\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChoiSJL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/DuttaRAS16,
  author       = {Sabyasachi Dutta and
                  Partha Sarathi Roy and
                  Avishek Adhikari and
                  Kouichi Sakurai},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {On the Robustness of Visual Cryptographic Schemes},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {251--262},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_19},
  doi          = {10.1007/978-3-319-53465-7\_19},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/DuttaRAS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ErlanggaB16,
  author       = {Wisdarmanto Erlangga and
                  Ari Moesriami Barmawi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Increasing Secret Data Hiding Capacity in {QR} Code Using 3 {\textbackslash}times
                  3 3 {\texttimes} 3 Subcells},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {327--342},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_24},
  doi          = {10.1007/978-3-319-53465-7\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ErlanggaB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/FengWLP16,
  author       = {Bingwen Feng and
                  Jian Weng and
                  Wei Lu and
                  Bei Pei},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Multiple Watermarking Using Multilevel Quantization Index Modulation},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {312--326},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_23},
  doi          = {10.1007/978-3-319-53465-7\_23},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/FengWLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Franco-Contreras16,
  author       = {Javier Franco{-}Contreras and
                  Gouenou Coatrieux},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Databases Traceability by Means of Watermarking with Optimized Detection},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {343--357},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_25},
  doi          = {10.1007/978-3-319-53465-7\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Franco-Contreras16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/GuoLWY16,
  author       = {Teng Guo and
                  Feng Liu and
                  Wen Wang and
                  BingTao Yu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Privacy Monitor},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {187--197},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_14},
  doi          = {10.1007/978-3-319-53465-7\_14},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/GuoLWY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HeGTZY16,
  author       = {Xin He and
                  Qingxiao Guan and
                  Yanfei Tong and
                  Xianfeng Zhao and
                  Haibo Yu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {A Novel Robust Image Forensics Algorithm Based on L1-Norm Estimation},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {145--158},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_11},
  doi          = {10.1007/978-3-319-53465-7\_11},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HeGTZY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuMFW16,
  author       = {Donghui Hu and
                  Zhongjin Ma and
                  Yuqi Fan and
                  Lina Wang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {A Study of the Two-Way Effects of Cover Source Mismatch and Texture
                  Complexity in Steganalysis},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {601--615},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_45},
  doi          = {10.1007/978-3-319-53465-7\_45},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuMFW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuangZ16,
  author       = {Wei Huang and
                  Xianfeng Zhao},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Reliable Pooled Steganalysis Using Fine-Grained Parameter Estimation
                  and Hypothesis Testing},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {550--563},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_41},
  doi          = {10.1007/978-3-319-53465-7\_41},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuangZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/IorliamHWZ16,
  author       = {Aamo Iorliam and
                  Anthony T. S. Ho and
                  Adrian Waller and
                  Xi Zhao},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Using Benford's Law Divergence and Neural Networks for Classification
                  and Source Identification of Biometric Images},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {88--105},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_7},
  doi          = {10.1007/978-3-319-53465-7\_7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/IorliamHWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/JinWYTCP16,
  author       = {Chao Jin and
                  Rangding Wang and
                  Diqun Yan and
                  Biaoli Tao and
                  Yanan Chen and
                  Anshan Pei},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Source Cell-Phone Identification Using Spectral Features of Device
                  Self-noise},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {29--45},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_3},
  doi          = {10.1007/978-3-319-53465-7\_3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/JinWYTCP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KeZL16,
  author       = {Yan Ke and
                  Minqing Zhang and
                  Jia Liu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Separable Multiple Bits Reversible Data Hiding in Encrypted Domain},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {470--484},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_35},
  doi          = {10.1007/978-3-319-53465-7\_35},
  timestamp    = {Thu, 21 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/KeZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KuribayashiCF16,
  author       = {Minoru Kuribayashi and
                  Ee{-}Chien Chang and
                  Nobuo Funabiki},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Watermarking with Fixed Decoder for Aesthetic 2D Barcode},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {379--392},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_28},
  doi          = {10.1007/978-3-319-53465-7\_28},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KuribayashiCF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiuNZ16,
  author       = {Wengai Liu and
                  Rongrong Ni and
                  Yao Zhao},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Reversible 3D Image Data Hiding with Quality Enhancement},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {446--455},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_33},
  doi          = {10.1007/978-3-319-53465-7\_33},
  timestamp    = {Thu, 05 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiuNZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/NiuYZTL16,
  author       = {Xuejing Niu and
                  Zhao{-}Xia Yin and
                  Xinpeng Zhang and
                  Jin Tang and
                  Bin Luo},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Reversible Data Hiding in Encrypted {AMBTC} Compressed Images},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {436--445},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_32},
  doi          = {10.1007/978-3-319-53465-7\_32},
  timestamp    = {Wed, 02 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/NiuYZTL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/PengLLCZ16,
  author       = {Xinxin Peng and
                  Jianfeng Lu and
                  Li Li and
                  Chin{-}Chen Chang and
                  Qili Zhou},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {A New Card Authentication Scheme Based on Image Watermarking and Encryption},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {358--369},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_26},
  doi          = {10.1007/978-3-319-53465-7\_26},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/PengLLCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/QianWAWS16,
  author       = {Qing Qian and
                  Hongxia Wang and
                  Sani M. Abdullahi and
                  Huan Wang and
                  Canghong Shi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Speech Authentication and Recovery Scheme in Encrypted Domain},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {46--60},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_4},
  doi          = {10.1007/978-3-319-53465-7\_4},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/QianWAWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/RenLW16,
  author       = {YaWei Ren and
                  Feng Liu and
                  Wen Wang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Collusive Attacks to Partition Authentication Visual Cryptography
                  Scheme},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {238--250},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_18},
  doi          = {10.1007/978-3-319-53465-7\_18},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/RenLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/RoyC16,
  author       = {Aniket Roy and
                  Rajat Subhra Chakraborty},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Optimal Distortion Estimation for Prediction Error Expansion Based
                  Reversible Watermarking},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {265--279},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_20},
  doi          = {10.1007/978-3-319-53465-7\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/RoyC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ShenLFYW16,
  author       = {Gang Shen and
                  Feng Liu and
                  Zhengxin Fu and
                  Bin Yu and
                  Wen Wang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Halftone Visual Cryptography with Complementary Cover Images},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {223--237},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_17},
  doi          = {10.1007/978-3-319-53465-7\_17},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ShenLFYW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/TangQH16,
  author       = {Xin Tang and
                  Yining Qi and
                  Yongfeng Huang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Fragile Watermarking Based Proofs of Retrievability for Archival Cloud
                  Data},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {296--311},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_22},
  doi          = {10.1007/978-3-319-53465-7\_22},
  timestamp    = {Wed, 10 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/TangQH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/TianX16,
  author       = {Ye Tian and
                  Shijun Xiang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Detection of Video-Based Face Spoofing Using {LBP} and Multiscale
                  {DCT}},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {16--28},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_2},
  doi          = {10.1007/978-3-319-53465-7\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/TianX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/UehiraSSTT16,
  author       = {Kazutake Uehira and
                  Masahiro Suzuki and
                  Piyarat Silapasuphakornwong and
                  Hideyuki Torii and
                  Youichi Takashima},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Copyright Protection for 3D Printing by Embedding Information Inside
                  3D-Printed Objects},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {370--378},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_27},
  doi          = {10.1007/978-3-319-53465-7\_27},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/UehiraSSTT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangLGRS16,
  author       = {Wen Wang and
                  Feng Liu and
                  Teng Guo and
                  YaWei Ren and
                  Gang Shen},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Information Security Display Technology with Multi-view Effect},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {198--208},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_15},
  doi          = {10.1007/978-3-319-53465-7\_15},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangLGRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangLWZ16,
  author       = {Zichi Wang and
                  Jinpeng Lv and
                  Qingde Wei and
                  Xinpeng Zhang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Distortion Function for Spatial Image Steganography Based on the Polarity
                  of Embedding Change},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {487--493},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_36},
  doi          = {10.1007/978-3-319-53465-7\_36},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangLWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangPNZ16,
  author       = {Ran Wang and
                  Xijian Ping and
                  Shaozhang Niu and
                  Tao Zhang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Segmentation Based Steganalysis of Spatial Images Using Local Linear
                  Transform},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {533--549},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_40},
  doi          = {10.1007/978-3-319-53465-7\_40},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangPNZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XuSTCZ16,
  author       = {Xiaoyu Xu and
                  Yifeng Sun and
                  Guangming Tang and
                  Shiyuan Chen and
                  Jian Zhao},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Deep Learning on Spatial Rich Model for Steganalysis},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {564--577},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_42},
  doi          = {10.1007/978-3-319-53465-7\_42},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/XuSTCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XuZZJMY16,
  author       = {Jiajia Xu and
                  Hang Zhou and
                  Weiming Zhang and
                  Ruiqi Jiang and
                  Guoli Ma and
                  Nenghai Yu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Second Order Perdicting-Error Sorting for Reversible Data Hiding},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {407--420},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_30},
  doi          = {10.1007/978-3-319-53465-7\_30},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/XuZZJMY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YanLLW16,
  author       = {Xuehu Yan and
                  Yuliang Lu and
                  Lintao Liu and
                  Song Wan},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Random Grids-Based Threshold Visual Secret Sharing with Improved Visual
                  Quality},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {209--222},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_16},
  doi          = {10.1007/978-3-319-53465-7\_16},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/YanLLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YangNZ16,
  author       = {Pengpeng Yang and
                  Rongrong Ni and
                  Yao Zhao},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Recapture Image Forensics Based on Laplacian Convolutional Neural
                  Networks},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {119--128},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_9},
  doi          = {10.1007/978-3-319-53465-7\_9},
  timestamp    = {Thu, 05 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/YangNZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YaoZY16,
  author       = {Yuanzhi Yao and
                  Weiming Zhang and
                  Nenghai Yu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Reversible Data Hiding for Texture Videos and Depth Maps Coding with
                  Quality Scalability},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {421--435},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_31},
  doi          = {10.1007/978-3-319-53465-7\_31},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YaoZY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YeS16,
  author       = {Jingyu Ye and
                  Yun{-}Qing Shi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {A Local Derivative Pattern Based Image Forensic Framework for Seam
                  Carving Detection},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {172--184},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_13},
  doi          = {10.1007/978-3-319-53465-7\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YeS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YinWGL16,
  author       = {Jiaxin Yin and
                  Rui Wang and
                  Yuanfang Guo and
                  Feng Liu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {An Adaptive Reversible Data Hiding Scheme for {JPEG} Images},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {456--469},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_34},
  doi          = {10.1007/978-3-319-53465-7\_34},
  timestamp    = {Mon, 19 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YinWGL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YuZYK16,
  author       = {Jingjing Yu and
                  Yifeng Zhan and
                  Jianhua Yang and
                  Xiangui Kang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {A Multi-purpose Image Counter-anti-forensic Method Using Convolutional
                  Neural Networks},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {3--15},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_1},
  doi          = {10.1007/978-3-319-53465-7\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YuZYK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhangCZYL16,
  author       = {Hong Zhang and
                  Yun Cao and
                  Xianfeng Zhao and
                  Haibo Yu and
                  Changjun Liu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Data Hiding in {H.264/AVC} Video Files Using the Coded Block Pattern},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {588--600},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_44},
  doi          = {10.1007/978-3-319-53465-7\_44},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhangCZYL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhangPL16,
  author       = {Le{-}Bing Zhang and
                  Fei Peng and
                  Min Long},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Source Camera Identification Based on Guided Image Estimation and
                  Block Weighted Average},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {106--118},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_8},
  doi          = {10.1007/978-3-319-53465-7\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhangPL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhangYNW16,
  author       = {Weiwei Zhang and
                  Zhenghong Yang and
                  Shaozhang Niu and
                  Junbin Wang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Detection of Copy-Move Forgery in Flat Region Based on Feature Enhancement},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {159--171},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_12},
  doi          = {10.1007/978-3-319-53465-7\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhangYNW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhangZ16,
  author       = {Lingyu Zhang and
                  Xianfeng Zhao},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {An Adaptive Video Steganography Based on Intra-prediction Mode and
                  Cost Assignment},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {518--532},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_39},
  doi          = {10.1007/978-3-319-53465-7\_39},
  timestamp    = {Sun, 06 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhangZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhaoGZYL16,
  author       = {Zengzhen Zhao and
                  Qingxiao Guan and
                  Xianfeng Zhao and
                  Haibo Yu and
                  Changjun Liu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Embedding Strategy for Batch Adaptive Steganography},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {494--505},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_37},
  doi          = {10.1007/978-3-319-53465-7\_37},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhaoGZYL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2015,
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-31960-5},
  doi          = {10.1007/978-3-319-31960-5},
  isbn         = {978-3-319-31959-9},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/0001CWS15,
  author       = {Dawen Xu and
                  Kai Chen and
                  Rangding Wang and
                  Shubing Su},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Completely Separable Reversible Data Hiding in Encrypted Images},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {365--377},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_30},
  doi          = {10.1007/978-3-319-31960-5\_30},
  timestamp    = {Thu, 28 May 2020 12:51:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/0001CWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Capolupod15,
  author       = {Daniele Capolupo and
                  Fabrizio d'Amore},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Synthetic Speech Detection and Audio Steganography in VoIP Scenarios},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {145--159},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_13},
  doi          = {10.1007/978-3-319-31960-5\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Capolupod15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChotikawanidA15,
  author       = {Piyanart Chotikawanid and
                  Thumrongrat Amornraksa},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Image Watermarking Based on Reflectance Modification},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {176--190},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_15},
  doi          = {10.1007/978-3-319-31960-5\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChotikawanidA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/DingDZS15,
  author       = {Feng Ding and
                  Weiqiang Dong and
                  Guopu Zhu and
                  Yun{-}Qing Shi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {An Advanced Texture Analysis Method for Image Sharpening Detection},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {72--82},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_7},
  doi          = {10.1007/978-3-319-31960-5\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/DingDZS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/FengL0LL15,
  author       = {Bingwen Feng and
                  Wei Lu and
                  Wei Sun and
                  Zhuoqian Liang and
                  Juan Liu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Blind Watermarking Based on Adaptive Lattice Quantization Index Modulation},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {239--249},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_20},
  doi          = {10.1007/978-3-319-31960-5\_20},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/FengL0LL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HirataK15,
  author       = {Nobuhiro Hirata and
                  Masaki Kawamura},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Watermarking Method Using Concatenated Code for Scaling and Rotation
                  Attacks},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {259--270},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_22},
  doi          = {10.1007/978-3-319-31960-5\_22},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HirataK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuNP15,
  author       = {Xianglei Hu and
                  Jiangqun Ni and
                  Runbiao Pan},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Detecting Video Forgery by Estimating Extrinsic Camera Parameters},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {28--38},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_3},
  doi          = {10.1007/978-3-319-31960-5\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuNP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuangWX0L15,
  author       = {Meiling Huang and
                  Rangding Wang and
                  Jian Xu and
                  Dawen Xu and
                  Qian Li},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Detection of Double Compression for {HEVC} Videos Based on the Co-occurrence
                  Matrix of {DCT} Coefficients},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {61--71},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_6},
  doi          = {10.1007/978-3-319-31960-5\_6},
  timestamp    = {Tue, 26 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuangWX0L15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ItoKIKE15,
  author       = {Toshiki Ito and
                  Hyunho Kang and
                  Keiichi Iwamura and
                  Kitahiro Kaneda and
                  Isao Echizen},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Audio Watermarking Using Different Wavelet Filters},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {312--320},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_26},
  doi          = {10.1007/978-3-319-31960-5\_26},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ItoKIKE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/JiKJML15,
  author       = {Sang{-}Keun Ji and
                  Wook{-}Hyung Kim and
                  Han{-}Ul Jang and
                  Seung{-}Min Mun and
                  Heung{-}Kyu Lee},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Robust Imperceptible Video Watermarking for {MPEG} Compression and
                  {DA-AD} Conversion Using Visual Masking},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {285--298},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_24},
  doi          = {10.1007/978-3-319-31960-5\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/JiKJML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Joshi0R15,
  author       = {Vaibhav B. Joshi and
                  Dhruv Gupta and
                  Mehul S. Raval},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {A Commutative Encryption and Reversible Watermarking for Fingerprint
                  Image},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {323--336},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_27},
  doi          = {10.1007/978-3-319-31960-5\_27},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Joshi0R15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/JulliandNT15,
  author       = {Thibault Julliand and
                  Vincent Nozick and
                  Hugues Talbot},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Image Noise and Digital Image Forensics},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_1},
  doi          = {10.1007/978-3-319-31960-5\_1},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/JulliandNT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KuoKCW15,
  author       = {Wen{-}Chung Kuo and
                  Shao{-}Hung Kuo and
                  Hong{-}Yi Chang and
                  Lih{-}Chyau Wuu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Authenticated Secret Sharing Scheme Based on {GMEMD}},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {395--405},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_32},
  doi          = {10.1007/978-3-319-31960-5\_32},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KuoKCW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Kuribayashi15,
  author       = {Minoru Kuribayashi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Fingerprinting for Broadcast Content Distribution System},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {163--175},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_14},
  doi          = {10.1007/978-3-319-31960-5\_14},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Kuribayashi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KuribayashiM15,
  author       = {Minoru Kuribayashi and
                  Masakatu Morii},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Enrichment of Visual Appearance of Aesthetic {QR} Code},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {220--231},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_18},
  doi          = {10.1007/978-3-319-31960-5\_18},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KuribayashiM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiNZ15,
  author       = {Ruihan Li and
                  Rongrong Ni and
                  Yao Zhao},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {An Effective Detection Method Based on Physical Traits of Recaptured
                  Images on {LCD} Screens},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {107--116},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_10},
  doi          = {10.1007/978-3-319-31960-5\_10},
  timestamp    = {Thu, 05 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiNZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/MaeharaIO15,
  author       = {Takeru Maehara and
                  Ryo Ikeda and
                  Satoshi Ono},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Digital Video Watermark Optimization for Detecting Replicated Two-Dimensional
                  Barcodes},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {191--205},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_16},
  doi          = {10.1007/978-3-319-31960-5\_16},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/MaeharaIO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/NguyenHK15,
  author       = {Thanh Xuan Nguyen and
                  Ricardo Antonio Parrao Hernandez and
                  Brian M. Kurkoski},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Robust Content-Based Image Hash Functions Using Nested Lattice Codes},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {406--417},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_33},
  doi          = {10.1007/978-3-319-31960-5\_33},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/NguyenHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/NguyenNNE15,
  author       = {Huy H. Nguyen and
                  Hoang{-}Quoc Nguyen{-}Son and
                  Thuc Dinh Nguyen and
                  Isao Echizen},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Discriminating Between Computer-Generated Facial Images and Natural
                  Ones Using Smoothness Property and Local Entropy},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {39--50},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_4},
  doi          = {10.1007/978-3-319-31960-5\_4},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/NguyenNNE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Nishimura15,
  author       = {Akira Nishimura},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Detection of Frequency-Scale Modification Using Robust Audio Watermarking
                  Based on Amplitude Modulation},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {299--311},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_25},
  doi          = {10.1007/978-3-319-31960-5\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Nishimura15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/NiuWCZ15,
  author       = {Dongmei Niu and
                  Hongxia Wang and
                  Minquan Cheng and
                  Linna Zhou},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Self-Embedding Watermarking Scheme Based on {MDS} Codes},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {250--258},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_21},
  doi          = {10.1007/978-3-319-31960-5\_21},
  timestamp    = {Wed, 05 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/NiuWCZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/OgawaKIK15,
  author       = {Hiroaki Ogawa and
                  Minoru Kuribayashi and
                  Motoi Iwata and
                  Koichi Kise},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {{DCT-OFDM} Based Watermarking Scheme Robust Against Clipping, Rotation,
                  and Scaling Attacks},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {271--284},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_23},
  doi          = {10.1007/978-3-319-31960-5\_23},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/OgawaKIK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/QiuLW15,
  author       = {Jing{-}Yong Qiu and
                  Yu{-}Hsun Lin and
                  Ja{-}Ling Wu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Reversible Data Hiding for Encrypted Audios by High Order Smoothness},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {350--364},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_29},
  doi          = {10.1007/978-3-319-31960-5\_29},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/QiuLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/RenLLFW15,
  author       = {YaWei Ren and
                  Feng Liu and
                  Dongdai Lin and
                  Rongquan Feng and
                  Wen Wang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {A New Construction of Tagged Visual Cryptography Scheme},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {433--445},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_35},
  doi          = {10.1007/978-3-319-31960-5\_35},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/RenLLFW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Silapasuphakornwong15,
  author       = {Piyarat Silapasuphakornwong and
                  Masahiro Suzuki and
                  Hiroshi Unno and
                  Hideyuki Torii and
                  Kazutake Uehira and
                  Youichi Takashima},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Nondestructive Readout of Copyright Information Embedded in Objects
                  Fabricated with 3-D Printers},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {232--238},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_19},
  doi          = {10.1007/978-3-319-31960-5\_19},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Silapasuphakornwong15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/TanHH15,
  author       = {Yanping Tan and
                  Fangjun Huang and
                  Jiwu Huang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Feature Selection for High Dimensional Steganalysis},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {134--144},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_12},
  doi          = {10.1007/978-3-319-31960-5\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/TanHH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/TanWLGKS15,
  author       = {Yue Tan and
                  Bo Wang and
                  Ming Li and
                  Yanqing Guo and
                  Xiangwei Kong and
                  Yunqing Shi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Camera Source Identification with Limited Labeled Training Set},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {18--27},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_2},
  doi          = {10.1007/978-3-319-31960-5\_2},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/TanWLGKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/TongWXLS15,
  author       = {Xuefeng Tong and
                  Xin Wang and
                  Guorong Xuan and
                  Shumeng Li and
                  Yun Q. Shi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Optimal Histogram-Pair and Prediction-Error Based Reversible Data
                  Hiding for Medical Images},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {378--391},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_31},
  doi          = {10.1007/978-3-319-31960-5\_31},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/TongWXLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/TuamaCC15,
  author       = {Amel Tuama and
                  Fr{\'{e}}d{\'{e}}ric Comby and
                  Marc Chaumont},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Source Camera Model Identification Using Features from Contaminated
                  Sensor Noise},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {83--93},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_8},
  doi          = {10.1007/978-3-319-31960-5\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/TuamaCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangLHQ15,
  author       = {Jing Wang and
                  Zhenghui Liu and
                  Junjie He and
                  Chuanda Qi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {An Authentication and Recovery Scheme for Digital Speech Signal Based
                  on {DWT}},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {206--219},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_17},
  doi          = {10.1007/978-3-319-31960-5\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangLHQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangLYSG15,
  author       = {Wen Wang and
                  Feng Liu and
                  WeiQi Yan and
                  Gang Shen and
                  Teng Guo},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {An Improved Aspect Ratio Invariant Visual Cryptography Scheme with
                  Flexible Pixel Expansion},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {418--432},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_34},
  doi          = {10.1007/978-3-319-31960-5\_34},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangLYSG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XiangW15,
  author       = {Shijun Xiang and
                  Yi Wang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Distortion-Free Robust Reversible Watermarking by Modifying and Recording
                  {IWT} Means of Image Blocks},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {337--349},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_28},
  doi          = {10.1007/978-3-319-31960-5\_28},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/XiangW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhangHLL15,
  author       = {Zhenzhen Zhang and
                  Jianjun Hou and
                  Zhaohong Li and
                  Dongdong Li},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Inter-frame Forgery Detection for Static-Background Video Based on
                  {MVP} Consistency},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {94--106},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_9},
  doi          = {10.1007/978-3-319-31960-5\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhangHLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhaoZCWZ15,
  author       = {Yanbin Zhao and
                  Hong Zhang and
                  Yun Cao and
                  Peipei Wang and
                  Xianfeng Zhao},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Video Steganalysis Based on Intra Prediction Mode Calibration},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {119--133},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_11},
  doi          = {10.1007/978-3-319-31960-5\_11},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhaoZCWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhouWJY15,
  author       = {Jinglei Zhou and
                  Rangding Wang and
                  Chao Jin and
                  Diqun Yan},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Multiple {MP3} Compression Detection Based on the Statistical Properties
                  of Scale Factors},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {51--60},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_5},
  doi          = {10.1007/978-3-319-31960-5\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhouWJY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2014,
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19321-2},
  doi          = {10.1007/978-3-319-19321-2},
  isbn         = {978-3-319-19320-5},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Al-QershiK14,
  author       = {Osamah M. Al{-}Qershi and
                  Bee Ee Khoo},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Enhanced Matching Method for Copy-Move Forgery Detection by Means
                  of Zernike Moments},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {485--497},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_37},
  doi          = {10.1007/978-3-319-19321-2\_37},
  timestamp    = {Thu, 28 May 2020 12:51:40 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Al-QershiK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/AlfraihBW14,
  author       = {Areej S. Alfraih and
                  Johann A. Briffa and
                  Stephan Wesemeyer},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Cloning Localization Based on Feature Extraction and K-means Clustering},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {410--419},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_31},
  doi          = {10.1007/978-3-319-19321-2\_31},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/AlfraihBW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/BarniFT14,
  author       = {Mauro Barni and
                  Marco Fontani and
                  Benedetta Tondi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Universal Counterforensics of Multiple Compressed {JPEG} Images},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {31--46},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_3},
  doi          = {10.1007/978-3-319-19321-2\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/BarniFT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Cao14,
  author       = {Jian Cao},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Improved Spread Transform Dither Modulation: {A} New Modulation Technique
                  for Secure Watermarking},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {399--409},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_30},
  doi          = {10.1007/978-3-319-19321-2\_30},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Cao14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChangNL14,
  author       = {Chin{-}Chen Chang and
                  Thai Son Nguyen and
                  Chia{-}Chen Lin},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {A Blind Robust Reversible Watermark Scheme for Textual Relational
                  Databases with Virtual Primary Key},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {75--89},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_6},
  doi          = {10.1007/978-3-319-19321-2\_6},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChangNL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChaussyMSE14,
  author       = {Erwan Chaussy and
                  Shimon Machida and
                  Noboru Sonehara and
                  Isao Echizen},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Definition of Private Information for Image Sharing in Social Networking
                  Services},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {544--556},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_42},
  doi          = {10.1007/978-3-319-19321-2\_42},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChaussyMSE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChenLTW14,
  author       = {Yu{-}Chi Chen and
                  Kunhan Lu and
                  Raylin Tso and
                  Mu{-}En Wu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {An Improved Visual Cryptography with Cheating Prevention},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {444--454},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_34},
  doi          = {10.1007/978-3-319-19321-2\_34},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChenLTW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChenSS14,
  author       = {Licong Chen and
                  Yun{-}Qing Shi and
                  Patchara Sutthiwan},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Variable Multi-dimensional Co-occurrence for Steganalysis},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {559--573},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_43},
  doi          = {10.1007/978-3-319-19321-2\_43},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChenSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChenWYL14,
  author       = {Guohui Chen and
                  Chunying Wang and
                  Xuehu Yan and
                  Peng Li},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Progressive Visual Secret Sharing with Multiple Decryptions and Unexpanded
                  Shares},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {376--386},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_28},
  doi          = {10.1007/978-3-319-19321-2\_28},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChenWYL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/FengLDS14,
  author       = {Bingwen Feng and
                  Wei Lu and
                  Lu Dai and
                  Wei Sun},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Steganography Based on High-Dimensional Reference Table},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {574--587},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_44},
  doi          = {10.1007/978-3-319-19321-2\_44},
  timestamp    = {Thu, 22 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/FengLDS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Franco-Contreras14,
  author       = {Javier Franco{-}Contreras and
                  Gouenou Coatrieux and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Christian Roux},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Adapted Quantization Index Modulation for Database Watermarking},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {120--134},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_9},
  doi          = {10.1007/978-3-319-19321-2\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Franco-Contreras14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/GuiLY14,
  author       = {Xinlu Gui and
                  Xiaolong Li and
                  Bin Yang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {High-Dimensional Histogram Utilization for Reversible Data Hiding},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {243--253},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_18},
  doi          = {10.1007/978-3-319-19321-2\_18},
  timestamp    = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/GuiLY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/IshizukaEIS14,
  author       = {Hirokazu Ishizuka and
                  Isao Echizen and
                  Keiichi Iwamura and
                  Kouichi Sakurai},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Evaluation of a Zero-Watermarking-Type Steganography},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {613--624},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_47},
  doi          = {10.1007/978-3-319-19321-2\_47},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/IshizukaEIS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/JaiswalAJGT14,
  author       = {Sunil Prasad Jaiswal and
                  Oscar C. Au and
                  Vinit Jakhetiya and
                  Andy Yuanfang Guo and
                  Anil Kumar Tiwari},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Adaptive Predictor Structure Based Interpolation for Reversible Data
                  Hiding},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {276--288},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_21},
  doi          = {10.1007/978-3-319-19321-2\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/JaiswalAJGT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/JimenezDSME14,
  author       = {Alberto Escalada Jimenez and
                  Adrian Dabrowski and
                  Noboru Sonehara and
                  Juan Manuel Montero{-}Mart{\'{\i}}nez and
                  Isao Echizen},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Tag Detection for Preventing Unauthorized Face Image Processing},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {513--524},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_39},
  doi          = {10.1007/978-3-319-19321-2\_39},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/JimenezDSME14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KaoC14,
  author       = {Da{-}Yu Kao and
                  Ying{-}Hsuan Chiu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {An Iterative Management Model of Exploring Windows Date-Time Stamps
                  in Cloud Storage Forensics},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {498--512},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_38},
  doi          = {10.1007/978-3-319-19321-2\_38},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KaoC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KarnjanaUAW14,
  author       = {Jessada Karnjana and
                  Masashi Unoki and
                  Pakinee Aimmanee and
                  Chai Wutiwiwatchai},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {An Audio Watermarking Scheme Based on Singular-Spectrum Analysis},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {145--159},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_11},
  doi          = {10.1007/978-3-319-19321-2\_11},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KarnjanaUAW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KimY14,
  author       = {Cheonshik Kim and
                  Ching{-}Nung Yang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Steganography Based on Grayscale Images Using (5, 3) Hamming Code},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {588--598},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_45},
  doi          = {10.1007/978-3-319-19321-2\_45},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/KimY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KuoWHC14,
  author       = {Wen{-}Chung Kuo and
                  Chun{-}Cheng Wang and
                  Hong{-}Ching Hou and
                  Chen{-}Tsun Chuang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Reversible Shared Data Hiding Based on Modified Signed Digit {EMD}},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {266--275},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_20},
  doi          = {10.1007/978-3-319-19321-2\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KuoWHC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiS14,
  author       = {Yi Hao Li and
                  Shyong Jian Shyu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Visual Two-Secret Sharing Schemes by Different Superimposition Positions},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {350--363},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_26},
  doi          = {10.1007/978-3-319-19321-2\_26},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiYK14,
  author       = {Peng Li and
                  Ching{-}Nung Yang and
                  Qian Kong},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Two-in-One Image Secret Sharing Scheme Based on Boolean Operations},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {305--318},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_23},
  doi          = {10.1007/978-3-319-19321-2\_23},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiYK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LinFL014,
  author       = {Xu Lin and
                  Bingwen Feng and
                  Wei Lu and
                  Wei Sun},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Content-Adaptive Residual for Steganalysis},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {389--398},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_29},
  doi          = {10.1007/978-3-319-19321-2\_29},
  timestamp    = {Thu, 22 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/LinFL014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LinHT14,
  author       = {Chia{-}Chen Lin and
                  Yuehong Huang and
                  Wei{-}Liang Tai},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {A Novel Hybrid Image Authentication Scheme for AMBTC-Compressed Images},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {433--443},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_33},
  doi          = {10.1007/978-3-319-19321-2\_33},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/LinHT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiuW14,
  author       = {Feng Liu and
                  Chuan Kun Wu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Optimal {XOR} Based (2, n)-Visual Cryptography Schemes},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {333--349},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_25},
  doi          = {10.1007/978-3-319-19321-2\_25},
  timestamp    = {Tue, 22 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiuW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiuX14,
  author       = {Shangyi Liu and
                  Shijun Xiang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Non-integer Expansion Embedding for Prediction-Based Reversible Watermarking},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {535--543},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_41},
  doi          = {10.1007/978-3-319-19321-2\_41},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiuX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LuHWLDC14,
  author       = {Jianfeng Lu and
                  Qianru Huang and
                  Meng Wang and
                  Li Li and
                  Junping Dai and
                  Chin{-}Chen Chang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Zero-Watermarking Based on Improved {ORB} Features Against Print-cam
                  Attack},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {187--198},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_14},
  doi          = {10.1007/978-3-319-19321-2\_14},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LuHWLDC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/MaS14,
  author       = {Bin Ma and
                  Yun{-}Qing Shi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {A Reversible Image Watermarking Scheme Based on Modified Integer-to-Integer
                  Discrete Wavelet Transform and {CDMA} Algorithm},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {420--432},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_32},
  doi          = {10.1007/978-3-319-19321-2\_32},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/MaS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/MahdianNS14,
  author       = {Babak Mahdian and
                  Adam Novoz{\'{a}}msk{\'{y}} and
                  Stanislav Saic},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Determination of Stop-Criterion for Incremental Methods Constructing
                  Camera Sensor Fingerprint},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {47--59},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_4},
  doi          = {10.1007/978-3-319-19321-2\_4},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/MahdianNS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/MiaoLW14,
  author       = {Hsin Miao and
                  Yu{-}Hsun Lin and
                  Ja{-}Ling Wu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Image Descriptor Based Digital Semi-blind Watermarking for {DIBR}
                  3D Images},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {90--104},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_7},
  doi          = {10.1007/978-3-319-19321-2\_7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/MiaoLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/NgoU14,
  author       = {Nhut Minh Ngo and
                  Masashi Unoki},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Watermarking for Digital Audio Based on Adaptive Phase Modulation},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {105--119},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_8},
  doi          = {10.1007/978-3-319-19321-2\_8},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/NgoU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Nishimura14,
  author       = {Akira Nishimura},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Reversible and Robust Audio Watermarking Based on Spread Spectrum
                  and Amplitude Expansion},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {215--229},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_16},
  doi          = {10.1007/978-3-319-19321-2\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Nishimura14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/QiaoNZ14,
  author       = {Xiumei Qiao and
                  Rongrong Ni and
                  Yao Zhao},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Superpixel-Based Watermarking Scheme for Image Authentication and
                  Recovery},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {160--173},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_12},
  doi          = {10.1007/978-3-319-19321-2\_12},
  timestamp    = {Thu, 05 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/QiaoNZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/QuKCHK14,
  author       = {Xiaochao Qu and
                  Suah Kim and
                  Run Cui and
                  Fangjun Huang and
                  Hyoung Joong Kim},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Reversible Data Hiding Based on Combined Predictor and Prediction
                  Error Expansion},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {254--265},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_19},
  doi          = {10.1007/978-3-319-19321-2\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/QuKCHK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/TongSXLYLS14,
  author       = {Xuefeng Tong and
                  Guangce Shen and
                  Guorong Xuan and
                  Shumeng Li and
                  Zhiqiang Yang and
                  Jian Li and
                  Yun{-}Qing Shi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Stereo Image Coding with Histogram-Pair Based Reversible Data Hiding},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {201--214},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_15},
  doi          = {10.1007/978-3-319-19321-2\_15},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/TongSXLYLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/TsaiH14,
  author       = {Fong{-}Maw Tsai and
                  Wen{-}Liang Hsue},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Image Watermarking Based on Various Discrete Fractional Fourier Transforms},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {135--144},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_10},
  doi          = {10.1007/978-3-319-19321-2\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/TsaiH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangDWT14,
  author       = {Zairan Wang and
                  Jing Dong and
                  Wei Wang and
                  Tieniu Tan},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Effects of Fragile and Semi-fragile Watermarking on Iris Recognition
                  System},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {174--186},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_13},
  doi          = {10.1007/978-3-319-19321-2\_13},
  timestamp    = {Tue, 12 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangDWT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangHTW14,
  author       = {Wei{-}Jen Wang and
                  Cheng{-}Ta Huang and
                  Shiau{-}Rung Tsui and
                  Shiuh{-}Jeng Wang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Steganographic Greedy Algorithms for Data Hiding Based on Differences
                  Under {SMVQ}},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {599--612},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_46},
  doi          = {10.1007/978-3-319-19321-2\_46},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangHTW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangYY14,
  author       = {Daoshun Wang and
                  Feng Yi and
                  Ching{-}Nung Yang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Visual Cryptography Scheme with Autostereogram},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {364--375},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_27},
  doi          = {10.1007/978-3-319-19321-2\_27},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangYY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WuLS14,
  author       = {Hao{-}Tian Wu and
                  Yuan Liu and
                  Yun{-}Qing Shi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Reversible Data Hiding by Median-Preserving Histogram Modification
                  for Image Contrast Enhancement},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {289--301},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_22},
  doi          = {10.1007/978-3-319-19321-2\_22},
  timestamp    = {Thu, 25 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/WuLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WuWHZ14,
  author       = {Hanzhou Wu and
                  Hongxia Wang and
                  Yi Hu and
                  Linna Zhou},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Efficient Reversible Data Hiding Based on Prefix Matching and Directed
                  {LSB} Embedding},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {455--469},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_35},
  doi          = {10.1007/978-3-319-19321-2\_35},
  timestamp    = {Wed, 05 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WuWHZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XuW14,
  author       = {Dawen Xu and
                  Rangding Wang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Reversible Data Hiding in Encrypted Images Using Interpolation and
                  Histogram Shifting},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {230--242},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_17},
  doi          = {10.1007/978-3-319-19321-2\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/XuW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XuYS14,
  author       = {Guanshuo Xu and
                  Jingyu Ye and
                  Yun{-}Qing Shi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {New Developments in Image Tampering Detection},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_1},
  doi          = {10.1007/978-3-319-19321-2\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/XuYS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YanCYC14,
  author       = {Xuehu Yan and
                  Guohui Chen and
                  Ching{-}Nung Yang and
                  Song{-}Ruei Cai},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Random Girds-Based Threshold Visual Secret Sharing with Improved Contrast
                  by Boolean Operations},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {319--332},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_24},
  doi          = {10.1007/978-3-319-19321-2\_24},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YanCYC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhengSS14,
  author       = {Lu Zheng and
                  Tanfeng Sun and
                  Yun{-}Qing Shi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Inter-frame Video Forgery Detection Based on Block-Wise Brightness
                  Variance Descriptor},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {18--30},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_2},
  doi          = {10.1007/978-3-319-19321-2\_2},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhengSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhouSWFS14,
  author       = {Zhili Zhou and
                  Xingming Sun and
                  Yunlong Wang and
                  Zhangjie Fu and
                  Yun{-}Qing Shi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Combination of {SIFT} Feature and Convex Region-Based Global Context
                  Feature for Image Copy Detection},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {60--71},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_5},
  doi          = {10.1007/978-3-319-19321-2\_5},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhouSWFS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhouWJY14,
  author       = {Jinglei Zhou and
                  Rangding Wang and
                  Chao Jin and
                  Diqun Yan},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Detecting Fake-Quality {WAV} Audio Based on Phase Differences},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {525--534},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_40},
  doi          = {10.1007/978-3-319-19321-2\_40},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhouWJY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhuGZ14,
  author       = {Jie Zhu and
                  Qingxiao Guan and
                  Xianfeng Zhao},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Multi-class {JPEG} Image Steganalysis by Ensemble Linear {SVM} Classifier},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {470--484},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_36},
  doi          = {10.1007/978-3-319-19321-2\_36},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhuGZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2013,
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43886-2},
  doi          = {10.1007/978-3-662-43886-2},
  isbn         = {978-3-662-43885-5},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/CanadasVQ13,
  author       = {Agust{\'{\i}}n Moreno Ca{\~{n}}adas and
                  Nelly Paola Palma Vanegas and
                  Margoth Hern{\'{a}}ndez Quiti{\'{a}}n},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Visual Cryptography Schemes Based in k -Linear Maps},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {288--302},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_21},
  doi          = {10.1007/978-3-662-43886-2\_21},
  timestamp    = {Thu, 28 May 2020 12:51:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/CanadasVQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChenCN13,
  author       = {Jiehao Chen and
                  Chenglong Chen and
                  Jiangqun Ni},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Effective Video Copy Detection Using Statistics of Quantized Zernike
                  Moments},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {232--243},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_17},
  doi          = {10.1007/978-3-662-43886-2\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChenCN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChenSSN13,
  author       = {Licong Chen and
                  Yun Q. Shi and
                  Patchara Sutthiwan and
                  Xinxin Niu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Non-uniform Quantization in Breaking {HUGO}},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {48--62},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_4},
  doi          = {10.1007/978-3-662-43886-2\_4},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChenSSN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/DelphaHB13,
  author       = {Claude Delpha and
                  Said Hijazi and
                  R{\'{e}}my Boyer},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {A Compressive Sensing Based Quantized Watermarking Scheme with Statistical
                  Transparency Constraint},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {409--422},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_29},
  doi          = {10.1007/978-3-662-43886-2\_29},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/DelphaHB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/DingZS13,
  author       = {Feng Ding and
                  Guopu Zhu and
                  Yun{-}Qing Shi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {A Novel Method for Detecting Image Sharpening Based on Local Binary
                  Pattern},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {180--191},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_13},
  doi          = {10.1007/978-3-662-43886-2\_13},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/DingZS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/FengL013,
  author       = {Bingwen Feng and
                  Wei Lu and
                  Wei Sun},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {High Capacity Data Hiding Scheme for Binary Images Based on Minimizing
                  Flipping Distortion},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {514--528},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_37},
  doi          = {10.1007/978-3-662-43886-2\_37},
  timestamp    = {Thu, 22 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/FengL013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/FuSZS13,
  author       = {Zhangjie Fu and
                  Xingming Sun and
                  Lu Zhou and
                  Jiangang Shu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {New Forensic Methods for {OOXML} Format Documents},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {503--513},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_36},
  doi          = {10.1007/978-3-662-43886-2\_36},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/FuSZS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/FuY13,
  author       = {Zhengxin Fu and
                  Bin Yu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Visual Cryptography and Random Grids Schemes},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {109--122},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_8},
  doi          = {10.1007/978-3-662-43886-2\_8},
  timestamp    = {Sat, 09 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/FuY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Fujiyoshi13,
  author       = {Masaaki Fujiyoshi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Generalized Histogram Shifting-Based Blind Reversible Data Hiding
                  with Balanced and Guarded Double Side Modification},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {488--502},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_35},
  doi          = {10.1007/978-3-662-43886-2\_35},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Fujiyoshi13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/GaoZWYH13,
  author       = {Shang Gao and
                  Cong Zhang and
                  Chanle Wu and
                  Gang Ye and
                  Lei Huang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {A Hybrid Feature Based Method for Distinguishing Computer Graphics
                  and Photo-Graphic Image},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {303--313},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_22},
  doi          = {10.1007/978-3-662-43886-2\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/GaoZWYH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/GuoATP13,
  author       = {Yuanfang Guo and
                  Oscar C. Au and
                  Ketan Tang and
                  Jiahao Pang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Hiding a Secret Pattern into Color Halftone Images},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {465--474},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_33},
  doi          = {10.1007/978-3-662-43886-2\_33},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/GuoATP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HoangNTE13,
  author       = {Anh{-}Tu Hoang and
                  Hoang{-}Quoc Nguyen{-}Son and
                  Minh{-}Triet Tran and
                  Isao Echizen},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Detecting Traitors in Re-publishing Updated Datasets},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {205--220},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_15},
  doi          = {10.1007/978-3-662-43886-2\_15},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/HoangNTE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuangOEN13,
  author       = {Xuping Huang and
                  Nobutaka Ono and
                  Isao Echizen and
                  Akira Nishimura},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Reversible Audio Information Hiding Based on Integer {DCT} Coefficients
                  with Adaptive Hiding Locations},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {376--389},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_27},
  doi          = {10.1007/978-3-662-43886-2\_27},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuangOEN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuangZH13,
  author       = {Fangjun Huang and
                  Yane Zhong and
                  Jiwu Huang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Improved Algorithm of Edge Adaptive Image Steganography Based on {LSB}
                  Matching Revisited Algorithm},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {19--31},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_2},
  doi          = {10.1007/978-3-662-43886-2\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuangZH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuoHC13,
  author       = {Yaoran Huo and
                  Hongjie He and
                  Fan Chen},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {A Restorable Semi-fragile Watermarking Combined {DCT} with Interpolation},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {393--408},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_28},
  doi          = {10.1007/978-3-662-43886-2\_28},
  timestamp    = {Wed, 03 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuoHC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/JohnsonSLGB13,
  author       = {Benjamin Johnson and
                  Pascal Sch{\"{o}}ttle and
                  Aron Laszka and
                  Jens Grossklags and
                  Rainer B{\"{o}}hme},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Bitspotting: Detecting Optimal Adaptive Steganography},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_1},
  doi          = {10.1007/978-3-662-43886-2\_1},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/JohnsonSLGB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiLS13,
  author       = {Jian Li and
                  Xiaolong Li and
                  Xingming Sun},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {A New Reversible Data Hiding Scheme Based on Efficient Prediction},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {326--336},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_24},
  doi          = {10.1007/978-3-662-43886-2\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiuFK13,
  author       = {Shenchuan Liu and
                  Masaaki Fujiyoshi and
                  Hitoshi Kiya},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {A Cheat-Prevention Visual Secret Sharing Scheme with Minimum Pixel
                  Expansion},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {362--375},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_26},
  doi          = {10.1007/978-3-662-43886-2\_26},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiuFK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/MaWYJ13,
  author       = {Pengfei Ma and
                  Rangding Wang and
                  Diqun Yan and
                  Chao Jin},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {A Huffman Table Index Based Approach to Detect Double {MP3} Compression},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {258--271},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_19},
  doi          = {10.1007/978-3-662-43886-2\_19},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/MaWYJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/MiaoHSLC13,
  author       = {Haibo Miao and
                  Liusheng Huang and
                  Yao Shen and
                  Xiaorong Lu and
                  Zhili Chen},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Steganalysis of Compressed Speech Based on Markov and Entropy},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {63--76},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_5},
  doi          = {10.1007/978-3-662-43886-2\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/MiaoHSLC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/MinLNR13,
  author       = {Hyun{-}seok Min and
                  Seung{-}Ho Lee and
                  Wesley De Neve and
                  Yong Man Ro},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Improved License Plate Recognition for Low-Resolution {CCTV} Forensics
                  by Integrating Sparse Representation-Based Super-Resolution},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {452--462},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_32},
  doi          = {10.1007/978-3-662-43886-2\_32},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/MinLNR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Nguyen-SonHTYSE13,
  author       = {Hoang{-}Quoc Nguyen{-}Son and
                  Anh{-}Tu Hoang and
                  Minh{-}Triet Tran and
                  Hiroshi Yoshiura and
                  Noboru Sonehara and
                  Isao Echizen},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Anonymizing Temporal Phrases in Natural Language Text to be Posted
                  on Social Networking Services},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {437--451},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_31},
  doi          = {10.1007/978-3-662-43886-2\_31},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/Nguyen-SonHTYSE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Nishimura13,
  author       = {Akira Nishimura},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Reversible and Robust Audio Watermarking Based on Quantization Index
                  Modulation and Amplitude Expansion},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {275--287},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_20},
  doi          = {10.1007/978-3-662-43886-2\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Nishimura13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/OuWDS13,
  author       = {Duanhao Ou and
                  Xiaotian Wu and
                  Lu Dai and
                  Wei Sun},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Improved Tagged Visual Cryptograms by Using Random Grids},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {79--94},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_6},
  doi          = {10.1007/978-3-662-43886-2\_6},
  timestamp    = {Mon, 05 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/OuWDS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/OuWDS13a,
  author       = {Duanhao Ou and
                  Xiaotian Wu and
                  Lu Dai and
                  Wei Sun},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Secret Sharing in Images Based on Error-Diffused Block Truncation
                  Coding and Error Diffusion},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {123--138},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_9},
  doi          = {10.1007/978-3-662-43886-2\_9},
  timestamp    = {Mon, 05 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/OuWDS13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ShenCMG13,
  author       = {Chao Shen and
                  Zhongmin Cai and
                  Roy A. Maxion and
                  Xiaohong Guan},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {On User Interaction Behavior as Evidence for Computer Forensic Analysis},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {221--231},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_16},
  doi          = {10.1007/978-3-662-43886-2\_16},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ShenCMG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/TongXSHS13,
  author       = {Xuefeng Tong and
                  Guorong Xuan and
                  Guangce Shen and
                  Xiaoli Huan and
                  Yun{-}Qing Shi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Using {RZL} Coding to Enhance Histogram-Pair Based Image Reversible
                  Data Hiding},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {153--166},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_11},
  doi          = {10.1007/978-3-662-43886-2\_11},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/TongXSHS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/TsaiLYY13,
  author       = {Min{-}Jen Tsai and
                  Jung Liu and
                  Jin{-}Sheng Yin and
                  Imam Yuadi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Digital Forensics of Printed Source Identification for Chinese Characters},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {337--361},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_25},
  doi          = {10.1007/978-3-662-43886-2\_25},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/TsaiLYY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangJWWS13,
  author       = {Wan Wang and
                  Xinghao Jiang and
                  Shilin Wang and
                  Meng Wan and
                  Tanfeng Sun},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Identifying Video Forgery Process Using Optical Flow},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {244--257},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_18},
  doi          = {10.1007/978-3-662-43886-2\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangJWWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangZZL13,
  author       = {Hongxia Wang and
                  Linna Zhou and
                  Wei Zhang and
                  Shuang Liu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Watermarking-Based Perceptual Hashing Search Over Encrypted Speech},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {423--434},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_30},
  doi          = {10.1007/978-3-662-43886-2\_30},
  timestamp    = {Fri, 21 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangZZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XuWS13,
  author       = {Dawen Xu and
                  Rangding Wang and
                  Yun{-}Qing Shi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Reversible Data Hiding in Encrypted {H.264/AVC} Video Streams},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {141--152},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_10},
  doi          = {10.1007/978-3-662-43886-2\_10},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/XuWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YangG13,
  author       = {Qunting Yang and
                  Tiegang Gao},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {An Image Authentication Scheme for Accurate Localization and Restoration},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {475--487},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_34},
  doi          = {10.1007/978-3-662-43886-2\_34},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YangG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YangLW13,
  author       = {Ching{-}Nung Yang and
                  Yi{-}Chin Lin and
                  Chih{-}Cheng Wu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Cheating Immune Block-Based Progressive Visual Cryptography},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {95--108},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_7},
  doi          = {10.1007/978-3-662-43886-2\_7},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YangLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YangZWS13,
  author       = {Jianquan Yang and
                  Guopu Zhu and
                  Junlong Wang and
                  Yun{-}Qing Shi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Detecting Non-aligned Double {JPEG} Compression Based on Refined Intensity
                  Difference and Calibration},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {169--179},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_12},
  doi          = {10.1007/978-3-662-43886-2\_12},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YangZWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZengK13,
  author       = {Hui Zeng and
                  Xiangui Kang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Camera Source Identification Game with Incomplete Information},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {192--204},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_14},
  doi          = {10.1007/978-3-662-43886-2\_14},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZengK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhangGZ13,
  author       = {Hong Zhang and
                  Qingxiao Guan and
                  Xianfeng Zhao},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Steganography Based on Adaptive Pixel-Value Differencing Scheme Revisited},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {32--47},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_3},
  doi          = {10.1007/978-3-662-43886-2\_3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhangGZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhaoWLLL13,
  author       = {Xudong Zhao and
                  Shilin Wang and
                  Shenghong Li and
                  Jianhua Li and
                  Xiang Lin},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {A Distributed Scheme for Image Splicing Detection},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {314--325},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_23},
  doi          = {10.1007/978-3-662-43886-2\_23},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhaoWLLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2012,
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40099-5},
  doi          = {10.1007/978-3-642-40099-5},
  isbn         = {978-3-642-40098-8},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChaoJS12,
  author       = {Juan Chao and
                  Xinghao Jiang and
                  Tanfeng Sun},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {A Novel Video Inter-frame Forgery Model Detection Scheme Based on
                  Optical Flow Consistency},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {267--281},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_22},
  doi          = {10.1007/978-3-642-40099-5\_22},
  timestamp    = {Thu, 28 May 2020 12:51:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChaoJS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChenSSN12,
  author       = {Licong Chen and
                  Yun Q. Shi and
                  Patchara Sutthiwan and
                  Xinxin Niu},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {A Novel Mapping Scheme for Steganalysis},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {19--33},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_3},
  doi          = {10.1007/978-3-642-40099-5\_3},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChenSSN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChenWLL12,
  author       = {Luyi Chen and
                  Shilin Wang and
                  Shenghong Li and
                  Jianhua Li},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Countering Universal Image Tampering Detection with Histogram Restoration},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {282--289},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_23},
  doi          = {10.1007/978-3-642-40099-5\_23},
  timestamp    = {Fri, 27 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChenWLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChenXL12,
  author       = {Quan Chen and
                  Shijun Xiang and
                  Xinrong Luo},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Reversible Watermarking for Audio Authentication Based on Integer
                  {DCT} and Expansion Embedding},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {395--409},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_33},
  doi          = {10.1007/978-3-642-40099-5\_33},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChenXL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChengSJ12,
  author       = {Dongyang Cheng and
                  Tanfeng Sun and
                  Xinghao Jiang},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {A Robust Image Classification Scheme with Sparse Coding and Multiple
                  Kernel Learning},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {520--529},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_42},
  doi          = {10.1007/978-3-642-40099-5\_42},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChengSJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/CimatoYW12,
  author       = {Stelvio Cimato and
                  Ching{-}Nung Yang and
                  Chih{-}Cheng Wu},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Visual Cryptography Based Watermarking: Definition and Meaning},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {435--448},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_36},
  doi          = {10.1007/978-3-642-40099-5\_36},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/CimatoYW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/CiptasariRS12,
  author       = {Rimba Whidiana Ciptasari and
                  Kyung Hyune Rhee and
                  Kouichi Sakurai},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Image Splicing Verification Based on Pixel-Based Alignment Method},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {198--212},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_17},
  doi          = {10.1007/978-3-642-40099-5\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/CiptasariRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ComesanaP12,
  author       = {Pedro Comesa{\~{n}}a and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Multimedia Operator Chain Topology and Ordering Estimation Based on
                  Detection and Information Theoretic Tools},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {213--227},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_18},
  doi          = {10.1007/978-3-642-40099-5\_18},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ComesanaP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/FuY12,
  author       = {Zhengxin Fu and
                  Bin Yu},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {On the Security of Multi-secret Visual Cryptography Scheme with Ring
                  Shares},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {485--494},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_39},
  doi          = {10.1007/978-3-642-40099-5\_39},
  timestamp    = {Sat, 09 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/FuY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/GuoKWX12,
  author       = {Yanqing Guo and
                  Xiangwei Kong and
                  Bo Wang and
                  Qian Xiao},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Steganalysis of {LSB} Matching Based on the Sum Features of Average
                  Co-occurrence Matrix Using Image Estimation},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {34--43},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_4},
  doi          = {10.1007/978-3-642-40099-5\_4},
  timestamp    = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/GuoKWX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/GuoZ12,
  author       = {Meng Guo and
                  Hongbin Zhang},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {High Capacity Data Hiding for Halftone Image Authentication},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {156--168},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_14},
  doi          = {10.1007/978-3-642-40099-5\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/GuoZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HeCH12,
  author       = {Hongjie He and
                  Fan Chen and
                  Yaoran Huo},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Self-embedding Fragile Watermarking Scheme Combined Average with {VQ}
                  Encoding},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {120--134},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_11},
  doi          = {10.1007/978-3-642-40099-5\_11},
  timestamp    = {Wed, 03 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/HeCH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HeJHN12,
  author       = {Xin He and
                  Huiyun Jing and
                  Qi Han and
                  Xiamu Niu},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Saliency-Based Region Log Covariance Feature for Image Copy Detection},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {327--335},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_27},
  doi          = {10.1007/978-3-642-40099-5\_27},
  timestamp    = {Fri, 31 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/HeJHN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuLLL12,
  author       = {Yongjian Hu and
                  Chang{-}Tsun Li and
                  Zhisheng Lv and
                  Bei{-}Bei Liu},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Audio Forgery Detection Based on Max Offsets for Cross Correlation
                  between {ENF} and Reference Signal},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {253--266},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_21},
  doi          = {10.1007/978-3-642-40099-5\_21},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuLLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Kuribayashi12,
  author       = {Minoru Kuribayashi},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Coded Spread Spectrum Watermarking Scheme},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {169--183},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_15},
  doi          = {10.1007/978-3-642-40099-5\_15},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Kuribayashi12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiWZYH12,
  author       = {Leida Li and
                  Xuewei Wang and
                  Wei Zhang and
                  Gaobo Yang and
                  Guozhang Hu},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Detecting Removed Object from Video with Stationary Background},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {242--252},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_20},
  doi          = {10.1007/978-3-642-40099-5\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiWZYH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiYS12,
  author       = {Zhaohong Li and
                  Jingyu Ye and
                  Yun{-}Qing Shi},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Distinguishing Computer Graphics from Photographic Images Using Local
                  Binary Patterns},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {228--241},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_19},
  doi          = {10.1007/978-3-642-40099-5\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiYS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiuFC12,
  author       = {Fang Liu and
                  Qi{-}Kai Fu and
                  Lee{-}Ming Cheng},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Memoryless Hash-Based Perceptual Image Authentication},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {425--434},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_35},
  doi          = {10.1007/978-3-642-40099-5\_35},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiuFC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiuW12,
  author       = {Zhenghui Liu and
                  Hongxia Wang},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {An Efficient Speech Content Authentication Algorithm Based on Coefficients
                  Self-correlation Degree},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {311--326},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_26},
  doi          = {10.1007/978-3-642-40099-5\_26},
  timestamp    = {Tue, 31 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiuW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiuYLW12,
  author       = {Feng Liu and
                  Wei Qi Yan and
                  Peng Li and
                  Chuan Kun Wu},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {A Secret Enriched Visual Cryptography},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {464--484},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_38},
  doi          = {10.1007/978-3-642-40099-5\_38},
  timestamp    = {Thu, 22 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiuYLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Nguyen-SonTTYSE12,
  author       = {Hoang{-}Quoc Nguyen{-}Son and
                  Minh{-}Triet Tran and
                  Tien Dung Tran and
                  Hiroshi Yoshiura and
                  Noboru Sonehara and
                  Isao Echizen},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Automatic Anonymous Fingerprinting of Text Posted on Social Networking
                  Services},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {410--424},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_34},
  doi          = {10.1007/978-3-642-40099-5\_34},
  timestamp    = {Sat, 18 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/Nguyen-SonTTYSE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/OhzekiWHS12,
  author       = {Kazuo Ohzeki and
                  Yuanyu Wei and
                  Yutaka Hirakawa and
                  Kiyotsugu Sato},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Consideration of the Watermark Inversion Attack and Its Invalidation
                  Framework},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {98--110},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_9},
  doi          = {10.1007/978-3-642-40099-5\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/OhzekiWHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/PengK12,
  author       = {Anjie Peng and
                  Xiangui Kang},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Robust Median Filtering Detection Based on Filtered Residual},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {344--357},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_29},
  doi          = {10.1007/978-3-642-40099-5\_29},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/PengK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/PengLY12,
  author       = {Fei Peng and
                  Xiaolong Li and
                  Bin Yang},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Calibration Based Reliable Detector for Detecting {LSB} Matching Steganography},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {44--53},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_5},
  doi          = {10.1007/978-3-642-40099-5\_5},
  timestamp    = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/PengLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/QiLWY12,
  author       = {Yuanzhi Qi and
                  Xiaolong Li and
                  Bin Wang and
                  Bin Yang},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {A Study of Optimal Matrix for Efficient Matrix Embedding in},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {8--18},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_2},
  doi          = {10.1007/978-3-642-40099-5\_2},
  timestamp    = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/QiLWY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SachnevK12,
  author       = {Vasiliy Sachnev and
                  Hyoung Joong Kim},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {An Attempt to Generalize Distortion Measure for {JPEG} Steganography},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {69--82},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_7},
  doi          = {10.1007/978-3-642-40099-5\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SachnevK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ShinLMSR12,
  author       = {Wook Jin Shin and
                  Seung{-}Ho Lee and
                  Hyun{-}seok Min and
                  Hosik Sohn and
                  Yong Man Ro},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Face Verification Using Color Sparse Representation},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {290--299},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_24},
  doi          = {10.1007/978-3-642-40099-5\_24},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ShinLMSR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SuYZZW12,
  author       = {Bo Su and
                  Quanqiao Yuan and
                  Yujin Zhang and
                  Mengying Zhai and
                  Shilin Wang},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Rapid Image Splicing Detection Based on Relevance Vector Machine},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {300--310},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_25},
  doi          = {10.1007/978-3-642-40099-5\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SuYZZW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangDWH12,
  author       = {Yong Wang and
                  Yanhong Deng and
                  Haojun Wu and
                  Jiwu Huang},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Blind Detection of Electronic Voice Transformation with Natural Disguise},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {336--343},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_28},
  doi          = {10.1007/978-3-642-40099-5\_28},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangDWH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WenW12,
  author       = {Quan Wen and
                  Yufei Wang},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {An Efficient Fragile Web Pages Watermarking for Integrity Protection
                  of {XML} Documents},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {135--144},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_12},
  doi          = {10.1007/978-3-642-40099-5\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WenW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XuanTTZS12,
  author       = {Guorong Xuan and
                  Xuefeng Tong and
                  Jianzhong Teng and
                  Xiaojie Zhang and
                  Yun{-}Qing Shi},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Optimal Histogram-Pair and Prediction-Error Based Image Reversible
                  Data Hiding},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {368--383},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_31},
  doi          = {10.1007/978-3-642-40099-5\_31},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/XuanTTZS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YamadaGE12,
  author       = {Takayuki Yamada and
                  Seiichi Gohshi and
                  Isao Echizen},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Enhancement of Method for Preventing Unauthorized Copying of Displayed
                  Information Using Object Surface Reflection},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {184--197},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_16},
  doi          = {10.1007/978-3-642-40099-5\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YamadaGE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YangLW12,
  author       = {Ching{-}Nung Yang and
                  Yi{-}Chin Lin and
                  Chih{-}Cheng Wu},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Region-in-Region Incrementing Visual Cryptography Scheme},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {449--463},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_37},
  doi          = {10.1007/978-3-642-40099-5\_37},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YangLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YasarogluA12,
  author       = {Yagiz Yasaroglu and
                  A. Aydin Alatan},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Optimal Data Embedding in 3D Models for Extraction from 2D Views Using
                  Perspective Invariants},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {83--97},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_8},
  doi          = {10.1007/978-3-642-40099-5\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YasarogluA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YeLZLXZ12,
  author       = {Conghuan Ye and
                  Hefei Ling and
                  Fuhao Zou and
                  Zhengding Lu and
                  Zenggang Xiong and
                  Kaibing Zhang},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {A Novel {JFE} Scheme for Social Multimedia Distribution in Compressed
                  Domain Using {SVD} and {CA}},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {507--519},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_41},
  doi          = {10.1007/978-3-642-40099-5\_41},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YeLZLXZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YuZLY12,
  author       = {Jie Yu and
                  Guopu Zhu and
                  Xiaolong Li and
                  Jianquan Yang},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {An Improved Algorithm for Reversible Data Hiding in Encrypted Image},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {384--394},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_32},
  doi          = {10.1007/978-3-642-40099-5\_32},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YuZLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhangGJL12,
  author       = {Aixin Zhang and
                  Chao Guan and
                  Haomiao Jiang and
                  Jianhua Li},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {An Image Super-Resolution Scheme Based on Compressive Sensing with
                  {PCA} Sparse Representation},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {495--506},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_40},
  doi          = {10.1007/978-3-642-40099-5\_40},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhangGJL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhangL12,
  author       = {Huang Zhang and
                  Xiaoqiang Li},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Geometrically Invariant Image Blind Watermarking Based on Speeded-Up
                  Robust Features and {DCT} Transform},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {111--119},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_10},
  doi          = {10.1007/978-3-642-40099-5\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhangL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhangQS12,
  author       = {Xinpeng Zhang and
                  Chuan Qin and
                  Guangling Sun},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence
                  Modulation},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {358--367},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_30},
  doi          = {10.1007/978-3-642-40099-5\_30},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhangQS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhaoCTG12,
  author       = {Qiyin Zhao and
                  Daqing Chen and
                  Zhi Tao and
                  Ji{-}Hua Gu},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Image Information Hiding Based on Binary Holography of Iterative Conjugate-Symmetric
                  Extension},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {145--155},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_13},
  doi          = {10.1007/978-3-642-40099-5\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhaoCTG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhaoLLXY12,
  author       = {Zheng Zhao and
                  Fenlin Liu and
                  Xiangyang Luo and
                  Xin Xie and
                  Lu Yu},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {{LSB} Replacement Steganography Software Detection Based on Model
                  Checking},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {54--68},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_6},
  doi          = {10.1007/978-3-642-40099-5\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhaoLLXY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhongHZ12,
  author       = {Yane Zhong and
                  Fangjun Huang and
                  Dong Zhang},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {New Channel Selection Criterion for Spatial Domain Steganography},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {1--7},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_1},
  doi          = {10.1007/978-3-642-40099-5\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhongHZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2011,
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32205-1},
  doi          = {10.1007/978-3-642-32205-1},
  isbn         = {978-3-642-32204-4},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/BatemanHB11,
  author       = {Philip Bateman and
                  Anthony T. S. Ho and
                  Johann A. Briffa},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Image Forensics of High Dynamic Range Imaging},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {336--348},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_27},
  doi          = {10.1007/978-3-642-32205-1\_27},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/BatemanHB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChenHHW11,
  author       = {Fan Chen and
                  Hongjie He and
                  Yaoran Huo and
                  Hongxia Wang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Self-recovery Fragile Watermarking Scheme with Variable Watermark
                  Payload},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {142--155},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_13},
  doi          = {10.1007/978-3-642-32205-1\_13},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChenHHW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChenN11,
  author       = {Chenglong Chen and
                  Jiangqun Ni},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Median Filtering Detection Using Edge Based Prediction Matrix},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {361--375},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_29},
  doi          = {10.1007/978-3-642-32205-1\_29},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChenN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChenWLL11,
  author       = {Luyi Chen and
                  Shilin Wang and
                  Shenghong Li and
                  Jianhua Li},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {New Feature Presentation of Transition Probability Matrix for Image
                  Tampering Detection},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {376--386},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_30},
  doi          = {10.1007/978-3-642-32205-1\_30},
  timestamp    = {Fri, 27 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChenWLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ComesanaPA11,
  author       = {Pedro Comesa{\~{n}}a and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Chaouki T. Abdallah},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Witsenhausen's Counterexample and Its Links with Multimedia Security
                  Problems},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {479--493},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_38},
  doi          = {10.1007/978-3-642-32205-1\_38},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ComesanaPA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/CrescenzoA11,
  author       = {Giovanni Di Crescenzo and
                  Gonzalo R. Arce},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Data Forensics Constructions from Cryptographic Hashing and Coding},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {494--509},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_39},
  doi          = {10.1007/978-3-642-32205-1\_39},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/CrescenzoA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Fridrich11,
  author       = {Jessica J. Fridrich},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Modern Trends in Steganography and Steganalysis},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {1},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_1},
  doi          = {10.1007/978-3-642-32205-1\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Fridrich11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/GaoXH11,
  author       = {Shang Gao and
                  Guanshuo Xu and
                  Ruimin Hu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Camera Model Identification Based on the Characteristic of {CFA} and
                  Interpolation},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {268--280},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_22},
  doi          = {10.1007/978-3-642-32205-1\_22},
  timestamp    = {Fri, 28 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/GaoXH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HeLS11,
  author       = {Zhongwei He and
                  Wei Lu and
                  Wei Sun},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Improved Run Length Based Detection of Digital Image Splicing},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {349--360},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_28},
  doi          = {10.1007/978-3-642-32205-1\_28},
  timestamp    = {Thu, 22 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/HeLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/JiangSZS11,
  author       = {Xinghao Jiang and
                  Tanfeng Sun and
                  Yue Zhou and
                  Yun Q. Shi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {A Drift Compensation Algorithm for {H.264/AVC} Video Robust Watermarking
                  Scheme},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {30--41},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_5},
  doi          = {10.1007/978-3-642-32205-1\_5},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/JiangSZS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/JunKHY11,
  author       = {Jong Yun Jun and
                  Kunho Kim and
                  Jae{-}Pil Heo and
                  Sung{-}Eui Yoon},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {{IRIW:} Image Retrieval Based Image Watermarking for Large-Scale Image
                  Databases},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {126--141},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_12},
  doi          = {10.1007/978-3-642-32205-1\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/JunKHY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/JungHRLLL11,
  author       = {Dae{-}Jin Jung and
                  Dai{-}Kyung Hyun and
                  Seung{-}Jin Ryu and
                  Ji Won Lee and
                  Hae{-}Yeoun Lee and
                  Heung{-}Kyu Lee},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Detecting Re-captured Videos Using Shot-Based Photo Response Non-Uniformity},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {281--291},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_23},
  doi          = {10.1007/978-3-642-32205-1\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/JungHRLLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KozD11,
  author       = {Alper Koz and
                  Claude Delpha},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Adaptive Selection of Embedding Locations for Spread Spectrum Watermarking
                  of Compressed Audio},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {97--110},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_10},
  doi          = {10.1007/978-3-642-32205-1\_10},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KozD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KwokAC11,
  author       = {Chun Wing Kwok and
                  Oscar C. Au and
                  Sung Him Chui},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Alternative Anti-Forensics Method for Contrast Enhancement},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {398--410},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_32},
  doi          = {10.1007/978-3-642-32205-1\_32},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KwokAC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LeiSL11,
  author       = {Bai Ying Lei and
                  Ing Yann Soon and
                  Zhen Li},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {A Robust Audio Watermarking Scheme Based on Lifting Wavelet Transform
                  and Singular Value Decomposition},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {86--96},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_9},
  doi          = {10.1007/978-3-642-32205-1\_9},
  timestamp    = {Thu, 01 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LeiSL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiuC11,
  author       = {Fang Liu and
                  Lee{-}Ming Cheng},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Perceptual Image Hashing via Wave Atom Transform},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {468--478},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_37},
  doi          = {10.1007/978-3-642-32205-1\_37},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiuC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiuGWY11,
  author       = {Feng Liu and
                  Teng Guo and
                  Chuan Kun Wu and
                  Ching{-}Nung Yang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Flexible Visual Cryptography Scheme without Distortion},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {211--227},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_18},
  doi          = {10.1007/978-3-642-32205-1\_18},
  timestamp    = {Tue, 22 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiuGWY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiuLLH11,
  author       = {Hongmei Liu and
                  Lei Li and
                  Jian Li and
                  Jiwu Huang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Three Novel Algorithms for Hiding Data in {PDF} Files Based on Incremental
                  Updates},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {167--180},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_15},
  doi          = {10.1007/978-3-642-32205-1\_15},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiuLLH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Memon11,
  author       = {Nasir D. Memon},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Photo Forensics - There Is More to a Picture than Meets the Eye},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {2},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_2},
  doi          = {10.1007/978-3-642-32205-1\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Memon11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/MerkelKACSD11,
  author       = {Ronny Merkel and
                  Christian Kraetzer and
                  Robert Altschaffel and
                  Eric Clausing and
                  Maik Schott and
                  Jana Dittmann},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Fingerprint Forensics Application Protocol: Semi-automated Modeling
                  and Verification of Watermark-Based Communication Using {CASPER} and
                  {FDR}},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {321--335},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_26},
  doi          = {10.1007/978-3-642-32205-1\_26},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/MerkelKACSD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/NguyenK11,
  author       = {Hieu Cuong Nguyen and
                  Stefan Katzenbeisser},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Performance and Robustness Analysis for Some Re-sampling Detection
                  Techniques in Digital Images},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {387--397},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_31},
  doi          = {10.1007/978-3-642-32205-1\_31},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/NguyenK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/OhzekiWHS11,
  author       = {Kazuo Ohzeki and
                  Yuanyu Wei and
                  Yutaka Hirakawa and
                  Kiyotsugu Sato},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {A New Watermarking Method with Obfuscated Quasi-Chirp Transform},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {57--71},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_7},
  doi          = {10.1007/978-3-642-32205-1\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/OhzekiWHS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SachnevK11,
  author       = {Vasiliy Sachnev and
                  Hyoung Joong Kim},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {An Improved Matrix Encoding Scheme for {JPEG} Steganography},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_3},
  doi          = {10.1007/978-3-642-32205-1\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SachnevK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SchrittwieserKEWSW11,
  author       = {Sebastian Schrittwieser and
                  Peter Kieseberg and
                  Isao Echizen and
                  Sven Wohlgemuth and
                  Noboru Sonehara and
                  Edgar R. Weippl},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {An Algorithm for k-Anonymity-Based Fingerprinting},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {439--452},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_35},
  doi          = {10.1007/978-3-642-32205-1\_35},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SchrittwieserKEWSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SohnLNPR11,
  author       = {Hosik Sohn and
                  Dohyoung Lee and
                  Wesley De Neve and
                  Konstantinos N. Plataniotis and
                  Yong Man Ro},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Contribution of Non-scrambled Chroma Information in Privacy-Protected
                  Face Images to Privacy Leakage},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {453--467},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_36},
  doi          = {10.1007/978-3-642-32205-1\_36},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SohnLNPR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SutthiwanS11,
  author       = {Patchara Sutthiwan and
                  Yun Q. Shi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Anti-Forensics of Double {JPEG} Compression Detection},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {411--424},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_33},
  doi          = {10.1007/978-3-642-32205-1\_33},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SutthiwanS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Tan11,
  author       = {Shunquan Tan},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Steganalysis of {LSB} Matching Revisited for Consecutive Pixels Using
                  B-Spline Functions},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {16--29},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_4},
  doi          = {10.1007/978-3-642-32205-1\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Tan11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/TianWZNQ11,
  author       = {Huawei Tian and
                  Zheng Wang and
                  Yao Zhao and
                  Rongrong Ni and
                  Lunming Qin},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Spread Spectrum-Based Multi-bit Watermarking for Free-View Video},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {156--166},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_14},
  doi          = {10.1007/978-3-642-32205-1\_14},
  timestamp    = {Thu, 05 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/TianWZNQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Vazquez-PadinP11,
  author       = {David Vazquez{-}Padin and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Exposing Original and Duplicated Regions Using {SIFT} Features and
                  Resampling Traces},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {306--320},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_25},
  doi          = {10.1007/978-3-642-32205-1\_25},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Vazquez-PadinP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangHZ11,
  author       = {Hui Wang and
                  Anthony T. S. Ho and
                  Xi Zhao},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm
                  for Image Content Authentication Resistant to {JPEG} Compression},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {72--85},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_8},
  doi          = {10.1007/978-3-642-32205-1\_8},
  timestamp    = {Thu, 18 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangHZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangLZWC11,
  author       = {Xiaofeng Wang and
                  Zhen Li and
                  Xiaoni Zhang and
                  Shangping Wang and
                  Jing Chen},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {425--438},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_34},
  doi          = {10.1007/978-3-642-32205-1\_34},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangLZWC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangNP11,
  author       = {Junxiang Wang and
                  Jiangqun Ni and
                  Jinwei Pan},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {A High Performance Multi-layer Reversible Data Hiding Scheme Using
                  Two-Step Embedding},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {42--56},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_6},
  doi          = {10.1007/978-3-642-32205-1\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangNP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WeirY11,
  author       = {Jonathan Weir and
                  WeiQi Yan},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Authenticating Visual Cryptography Shares Using 2D Barcodes},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {196--210},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_17},
  doi          = {10.1007/978-3-642-32205-1\_17},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/WeirY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YamadaGE11,
  author       = {Takayuki Yamada and
                  Seiichi Gohshi and
                  Isao Echizen},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {{IR} Hiding: Method to Prevent Re-recording Screen Image Built in
                  Short Wavelength Pass Filter Detection Method Using Specular Reflection},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {111--125},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_11},
  doi          = {10.1007/978-3-642-32205-1\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YamadaGE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YamadaT11,
  author       = {Takaaki Yamada and
                  Yoshiyasu Takahashi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Use of "Emergable Watermarks" as Copy Indicators for Securing Video
                  Content},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {181--195},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_16},
  doi          = {10.1007/978-3-642-32205-1\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YamadaT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Yamaguchi11,
  author       = {Yasushi Yamaguchi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {An Extended Visual Cryptography Scheme for Continuous-Tone Images},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {228--242},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_19},
  doi          = {10.1007/978-3-642-32205-1\_19},
  timestamp    = {Thu, 24 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Yamaguchi11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhangWN11,
  author       = {Rong Zhang and
                  Rangding Wang and
                  Tian{-}Tsong Ng},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Distinguishing Photographic Images and Photorealistic Computer Graphics
                  Using Visual Vocabulary on Local Image Edges},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {292--305},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_24},
  doi          = {10.1007/978-3-642-32205-1\_24},
  timestamp    = {Wed, 03 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhangWN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhaoWLL11,
  author       = {Xudong Zhao and
                  Shilin Wang and
                  Shenghong Li and
                  Jianhua Li},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {A Comprehensive Study on Third Order Statistical Features for Image
                  Splicing Detection},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {243--256},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_20},
  doi          = {10.1007/978-3-642-32205-1\_20},
  timestamp    = {Fri, 27 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhaoWLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhouGY11,
  author       = {Lin{-}Na Zhou and
                  Yunbiao Guo and
                  Xingang You},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Blind Copy-Paste Detection Using Improved {SIFT} Ring Descriptor},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {257--267},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_21},
  doi          = {10.1007/978-3-642-32205-1\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhouGY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2010,
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-18405-5},
  doi          = {10.1007/978-3-642-18405-5},
  isbn         = {978-3-642-18404-8},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/AnzakuSR10,
  author       = {Esla Timothy Anzaku and
                  Hosik Sohn and
                  Yong Man Ro},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {Privacy Preserving Facial and Fingerprint Multi-biometric Authentication},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {239--250},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_20},
  doi          = {10.1007/978-3-642-18405-5\_20},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/AnzakuSR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/CaoK10,
  author       = {Hong Cao and
                  Alex C. Kot},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {Detection of Tampering Inconsistencies on Mobile Photos},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {105--119},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_9},
  doi          = {10.1007/978-3-642-18405-5\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/CaoK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChenHMYM10,
  author       = {Zhili Chen and
                  Liusheng Huang and
                  Peng Meng and
                  Wei Yang and
                  Haibo Miao},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {Blind Linguistic Steganalysis against Translation Based Steganography},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {251--265},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_21},
  doi          = {10.1007/978-3-642-18405-5\_21},
  timestamp    = {Thu, 24 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChenHMYM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/DongK10,
  author       = {Keming Dong and
                  Hyoung{-}Joong Kim},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {An Efficient Pattern Substitution Watermarking Method for Binary Images},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {181--188},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_15},
  doi          = {10.1007/978-3-642-18405-5\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/DongK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/GaoQSNS10,
  author       = {Xinting Gao and
                  Bo Qiu and
                  JingJing Shen and
                  Tian{-}Tsong Ng and
                  Yun{-}Qing Shi},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {A Smart Phone Image Database for Single Image Recapture Detection},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {90--104},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_8},
  doi          = {10.1007/978-3-642-18405-5\_8},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/GaoQSNS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/GuanDT10,
  author       = {Qingxiao Guan and
                  Jing Dong and
                  Tieniu Tan},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {Blind Quantitative Steganalysis Based on Feature Fusion and Gradient
                  Boosting},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {266--279},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_22},
  doi          = {10.1007/978-3-642-18405-5\_22},
  timestamp    = {Tue, 12 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/GuanDT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuangNE10,
  author       = {Xuping Huang and
                  Akira Nishimura and
                  Isao Echizen},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {A Reversible Acoustic Steganography for Integrity Verification},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {305--316},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_25},
  doi          = {10.1007/978-3-642-18405-5\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuangNE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuangSH10,
  author       = {Fangjun Huang and
                  Yun{-}Qing Shi and
                  Jiwu Huang},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {New {JPEG} Steganographic Scheme with High Security Performance},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {189--201},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_16},
  doi          = {10.1007/978-3-642-18405-5\_16},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuangSH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KavehvashG10,
  author       = {Zahra Kavehvash and
                  Shahrokh Ghaemmaghami},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {On Limits of Embedding in 3D Images Based on 2D Watson's Model},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {293--304},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_24},
  doi          = {10.1007/978-3-642-18405-5\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KavehvashG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LeungC10,
  author       = {H. Y. Leung and
                  Lee{-}Ming Cheng},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {Robust Blind Watermarking Scheme Using Wave Atoms},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {148--158},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_12},
  doi          = {10.1007/978-3-642-18405-5\_12},
  timestamp    = {Wed, 07 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/LeungC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LingFZYL10,
  author       = {Hefei Ling and
                  Hui Feng and
                  Fuhao Zou and
                  WeiQi Yan and
                  Zhengding Lu},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {A Novel Collusion Attack Strategy for Digital Fingerprinting},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {224--238},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_19},
  doi          = {10.1007/978-3-642-18405-5\_19},
  timestamp    = {Thu, 12 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LingFZYL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/MeerwaldU10,
  author       = {Peter Meerwald and
                  Andreas Uhl},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {Robust Watermarking of H.264/SVC-Encoded Video: Quality and Resolution
                  Scalability},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {159--169},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_13},
  doi          = {10.1007/978-3-642-18405-5\_13},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/MeerwaldU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/NarayananS10,
  author       = {Gopal Narayanan and
                  Yun{-}Qing Shi},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {A Statistical Model for Quantized {AC} Block {DCT} Coefficients in
                  {JPEG} Compression and its Application to Detecting Potential Compression
                  History in Bitmap Images},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {75--89},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_7},
  doi          = {10.1007/978-3-642-18405-5\_7},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/NarayananS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/OuZN10,
  author       = {Bo Ou and
                  Yao Zhao and
                  Rongrong Ni},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {Reversible Watermarking Using Prediction Error Histogram and Blocking},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {170--180},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_14},
  doi          = {10.1007/978-3-642-18405-5\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/OuZN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/PanH10,
  author       = {Feng Pan and
                  Jiwu Huang},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {Discriminating Computer Graphics Images and Natural Images Using Hidden
                  Markov Tree Model},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {23--28},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_3},
  doi          = {10.1007/978-3-642-18405-5\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/PanH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SachnevK10,
  author       = {Vasiliy Sachnev and
                  Hyoung{-}Joong Kim},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {Ternary Data Hiding Technique for {JPEG} Steganography},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {202--210},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_17},
  doi          = {10.1007/978-3-642-18405-5\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SachnevK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangDT10,
  author       = {Wei Wang and
                  Jing Dong and
                  Tieniu Tan},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {Tampered Region Localization of Digital Color Images Based on {JPEG}
                  Compression Noise},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {120--133},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_10},
  doi          = {10.1007/978-3-642-18405-5\_10},
  timestamp    = {Tue, 12 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangDT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WeirY10,
  author       = {Jonathan Weir and
                  WeiQi Yan},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {Plane Transform Visual Cryptography},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {60--74},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_6},
  doi          = {10.1007/978-3-642-18405-5\_6},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/WeirY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Xiang10,
  author       = {Shijun Xiang},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {Robust Audio Watermarking by Using Low-Frequency Histogram},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {134--147},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_11},
  doi          = {10.1007/978-3-642-18405-5\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Xiang10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YamadaGE10,
  author       = {Takayuki Yamada and
                  Seiichi Gohshi and
                  Isao Echizen},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {{IR} Hiding: {A} Method to Prevent Video Re-shooting by Exploiting
                  Differences between Human Perceptions and Recording Device Characteristics},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {280--292},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_23},
  doi          = {10.1007/978-3-642-18405-5\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YamadaGE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhaoAS10,
  author       = {Liang Zhao and
                  Avishek Adhikari and
                  Kouichi Sakurai},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy
                  and Centroid Difference of Bit-Plane},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {29--44},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_4},
  doi          = {10.1007/978-3-642-18405-5\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhaoAS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhaoAXS10,
  author       = {Liang Zhao and
                  Avishek Adhikari and
                  Di Xiao and
                  Kouichi Sakurai},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel
                  Bit},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {45--59},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_5},
  doi          = {10.1007/978-3-642-18405-5\_5},
  timestamp    = {Fri, 04 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhaoAXS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhaoLLW10,
  author       = {Xudong Zhao and
                  Jianhua Li and
                  Shenghong Li and
                  Shilin Wang},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {Detecting Digital Image Splicing in Chroma Spaces},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {12--22},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_2},
  doi          = {10.1007/978-3-642-18405-5\_2},
  timestamp    = {Fri, 27 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhaoLLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhaoSS10,
  author       = {Yu Qian Zhao and
                  Frank Y. Shih and
                  Yun Q. Shi},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {Passive Detection of Paint-Doctored {JPEG} Images},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {1--11},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_1},
  doi          = {10.1007/978-3-642-18405-5\_1},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhaoSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhengZLJT10,
  author       = {Xuping Zheng and
                  Aixin Zhang and
                  Shenghong Li and
                  Bo Jin and
                  Junhua Tang},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {Interleaving Embedding Scheme for ECC-Based Multimedia Fingerprinting},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {211--223},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_18},
  doi          = {10.1007/978-3-642-18405-5\_18},
  timestamp    = {Fri, 31 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhengZLJT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/AbrardoBC09,
  author       = {Andrea Abrardo and
                  Mauro Barni and
                  Cesare Maria Carretti},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {Watermark Embedding and Recovery in the Presence of {C-LPCD} De-synchronization
                  Attacks},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {54--68},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_8},
  doi          = {10.1007/978-3-642-03688-0\_8},
  timestamp    = {Thu, 28 May 2020 12:51:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/AbrardoBC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/AznavehMT09,
  author       = {Ahmad Mahmoudi Aznaveh and
                  Azadeh Mansouri and
                  Farah Torkamani{-}Azar},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {A New Approach in Reversible Watermarking},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {241--251},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_22},
  doi          = {10.1007/978-3-642-03688-0\_22},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/AznavehMT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/BardynDDS09,
  author       = {Dieter Bardyn and
                  Ann Dooms and
                  Tim Dams and
                  Peter Schelkens},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {Comparative Study of Wavelet Based Lattice {QIM} Techniques and Robustness
                  against {AWGN} and {JPEG} Attacks},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {39--53},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_7},
  doi          = {10.1007/978-3-642-03688-0\_7},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/BardynDDS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Chaumont09,
  author       = {Marc Chaumont},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {Fast Embedding Technique for Dirty Paper Trellis Watermarking},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {110--120},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_12},
  doi          = {10.1007/978-3-642-03688-0\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Chaumont09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChenNH09,
  author       = {Chong Chen and
                  Jiangqun Ni and
                  Jiwu Huang},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {Temporal Statistic Based Video Watermarking Scheme Robust against
                  Geometric Attacks and Frame Dropping},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {81--95},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_10},
  doi          = {10.1007/978-3-642-03688-0\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChenNH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Cox09,
  author       = {Ingemar J. Cox},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {Data Hiding and the Statistics of Images},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {1},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_1},
  doi          = {10.1007/978-3-642-03688-0\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Cox09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Delp09,
  author       = {Edward J. Delp},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {Forensic Techniques for Image Source Classification: {A} Comparative
                  Study},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {3},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_3},
  doi          = {10.1007/978-3-642-03688-0\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Delp09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/DongWT09,
  author       = {Jing Dong and
                  Wei Wang and
                  Tieniu Tan},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {Multi-class Blind Steganalysis Based on Image Run-Length Analysis},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {199--210},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_19},
  doi          = {10.1007/978-3-642-03688-0\_19},
  timestamp    = {Tue, 12 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/DongWT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/IslamPB09,
  author       = {Naveed Islam and
                  William Puech and
                  Robert Brouzet},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {A Homomorphic Method for Sharing Secret Images},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {121--135},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_13},
  doi          = {10.1007/978-3-642-03688-0\_13},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/IslamPB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Ker09,
  author       = {Andrew D. Ker},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {Estimating the Information Theoretic Optimal Stego Noise},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {184--198},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_18},
  doi          = {10.1007/978-3-642-03688-0\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Ker09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KimNR09,
  author       = {Semin Kim and
                  Wesley De Neve and
                  Yong Man Ro},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {A Statistical and Iterative Method for Data Hiding in Palette-Based
                  Images},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {170--183},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_17},
  doi          = {10.1007/978-3-642-03688-0\_17},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KimNR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LeungCC09,
  author       = {H. Y. Leung and
                  Lee{-}Ming Cheng and
                  L. L. Cheng},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {Digital Watermarking Schemes Using Multi-resolution Curvelet and {HVS}
                  Model},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {4--13},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_4},
  doi          = {10.1007/978-3-642-03688-0\_4},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LeungCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiLL09,
  author       = {Huang Li and
                  Jian Li and
                  Hongmei Liu},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {A Robust Watermarking for {MPEG-2}},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {69--80},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_9},
  doi          = {10.1007/978-3-642-03688-0\_9},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LuoWBL09,
  author       = {Ming Luo and
                  Kai Wang and
                  Adrian G. Bors and
                  Guillaume Lavou{\'{e}}},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {Local Patch Blind Spectral Watermarking Method for 3D Graphics},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {211--226},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_20},
  doi          = {10.1007/978-3-642-03688-0\_20},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/LuoWBL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/OhkitaYKF09,
  author       = {Kazuya Ohkita and
                  Maki Yoshida and
                  Itaru Kitamura and
                  Toru Fujiwara},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {Improving Capability of Locating Tampered Pixels of Statistical Fragile
                  Watermarking},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {279--293},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_25},
  doi          = {10.1007/978-3-642-03688-0\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/OhkitaYKF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/OkadaOU09,
  author       = {Mitsuo Okada and
                  Yasuo Okabe and
                  Tetsutaro Uehara},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking
                  Techniques},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {14--28},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_5},
  doi          = {10.1007/978-3-642-03688-0\_5},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/OkadaOU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Piper09,
  author       = {Fred Piper},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {The Changing Face of Cryptography},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {2},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_2},
  doi          = {10.1007/978-3-642-03688-0\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Piper09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/PohM09,
  author       = {Geong Sen Poh and
                  Keith M. Martin},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {Classification Framework for Fair Content Tracing Protocols},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {252--267},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_23},
  doi          = {10.1007/978-3-642-03688-0\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/PohM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/PramilaKS09,
  author       = {Anu Pramila and
                  Anja Keskinarkaus and
                  Tapio Sepp{\"{a}}nen},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {Reading Watermarks from Printed Binary Images with a Camera Phone},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {227--240},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_21},
  doi          = {10.1007/978-3-642-03688-0\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/PramilaKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/PuhanHS09,
  author       = {Niladri B. Puhan and
                  Anthony Tung Shuen Ho and
                  Farook Sattar},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {High Capacity Data Hiding in Binary Document Images},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {149--161},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_15},
  doi          = {10.1007/978-3-642-03688-0\_15},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/PuhanHS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SutthiwanYS09,
  author       = {Patchara Sutthiwan and
                  Jingyu Ye and
                  Yun Q. Shi},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {An Enhanced Statistical Approach to Identifying Photorealistic Images},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {323--335},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_28},
  doi          = {10.1007/978-3-642-03688-0\_28},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SutthiwanYS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangDT09,
  author       = {Wei Wang and
                  Jing Dong and
                  Tieniu Tan},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {A Survey of Passive Image Tampering Detection},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {308--322},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_27},
  doi          = {10.1007/978-3-642-03688-0\_27},
  timestamp    = {Tue, 12 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangDT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangH09,
  author       = {Yong Wang and
                  Jiwu Huang},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {Robust {AVS} Audio Watermarking},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {29--38},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_6},
  doi          = {10.1007/978-3-642-03688-0\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WeirY09,
  author       = {Jonathan Weir and
                  Wei Qi Yan},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {Dot-Size Variant Visual Cryptography},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {136--148},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_14},
  doi          = {10.1007/978-3-642-03688-0\_14},
  timestamp    = {Thu, 22 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/WeirY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XuGSHS09,
  author       = {Guanshuo Xu and
                  Shang Gao and
                  Yun{-}Qing Shi and
                  Ruimin Hu and
                  Wei Su},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {Camera-Model Identification Using Markovian Transition Probability
                  Matrix},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {294--307},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_26},
  doi          = {10.1007/978-3-642-03688-0\_26},
  timestamp    = {Fri, 28 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/XuGSHS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XuWW09,
  author       = {Dawen Xu and
                  Rangding Wang and
                  Jicheng Wang},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {Blind Digital Watermarking of Low Bit-Rate Advanced {H.264/AVC} Compressed
                  Video},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {96--109},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_11},
  doi          = {10.1007/978-3-642-03688-0\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/XuWW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhangWF09,
  author       = {Xinpeng Zhang and
                  Shuozhong Wang and
                  Guorui Feng},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {Fragile Watermarking Scheme with Extensive Content Restoration Capability},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {268--278},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_24},
  doi          = {10.1007/978-3-642-03688-0\_24},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhangWF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhengHCYY09,
  author       = {Xueling Zheng and
                  Liusheng Huang and
                  Zhili Chen and
                  Zhenshan Yu and
                  Wei Yang},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {Hiding Information by Context-Based Synonym Substitution},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {162--169},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_16},
  doi          = {10.1007/978-3-642-03688-0\_16},
  timestamp    = {Thu, 24 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhengHCYY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2008,
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04438-0},
  doi          = {10.1007/978-3-642-04438-0},
  isbn         = {978-3-642-04437-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2009,
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0},
  doi          = {10.1007/978-3-642-03688-0},
  isbn         = {978-3-642-03687-3},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/AmiriJ08,
  author       = {S. Hamid Amiri and
                  Mansour Jamzad},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {An Algorithm for Modeling Print and Scan Operations Used for Watermarking},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {254--265},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_22},
  doi          = {10.1007/978-3-642-04438-0\_22},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/AmiriJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/BarbierM08,
  author       = {Johann Barbier and
                  Emmanuel Mayer},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Non-malleable Schemes Resisting Adaptive Adversaries},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {240--253},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_21},
  doi          = {10.1007/978-3-642-04438-0\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/BarbierM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/BehsetaLSW08,
  author       = {Sam Behseta and
                  Charles Lam and
                  Joseph E. Sutton and
                  Robert L. Webb},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {A Time Series Intra-Video Collusion Attack on Frame-by-Frame Video
                  Watermarking},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {31--44},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_3},
  doi          = {10.1007/978-3-642-04438-0\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/BehsetaLSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/BhowmikA08,
  author       = {Deepayan Bhowmik and
                  Charith Abhayaratne},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {A Generalised Model for Distortion Performance Analysis of Wavelet
                  Based Watermarking},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {363--378},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_31},
  doi          = {10.1007/978-3-642-04438-0\_31},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/BhowmikA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChenS08,
  author       = {Wen Chen and
                  Yun Q. Shi},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Detection of Double {MPEG} Compression Based on First Digit Statistics},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {16--30},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_2},
  doi          = {10.1007/978-3-642-04438-0\_2},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChenS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/DongWTS08,
  author       = {Jing Dong and
                  Wei Wang and
                  Tieniu Tan and
                  Yun Q. Shi},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Run-Length and Edge Statistics Based Approach for Image Splicing Detection},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {76--87},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_7},
  doi          = {10.1007/978-3-642-04438-0\_7},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/DongWTS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/FallahpourM08,
  author       = {Mehdi Fallahpour and
                  David Meg{\'{\i}}as},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Reversible Data Hiding Based On {H.264/AVC} Intra Prediction},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {52--60},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_5},
  doi          = {10.1007/978-3-642-04438-0\_5},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/FallahpourM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Goljan08,
  author       = {Miroslav Goljan},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Digital Camera Identification from Images - Estimating False Acceptance
                  Probability},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {454--468},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_38},
  doi          = {10.1007/978-3-642-04438-0\_38},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Goljan08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuangTSL08,
  author       = {Huajun Huang and
                  Junshan Tan and
                  Xingming Sun and
                  Lingxi Liu},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Detection of Hidden Information in Webpage Based on Higher-Order Statistics},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {293--302},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_25},
  doi          = {10.1007/978-3-642-04438-0\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuangTSL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/JiangSLY08,
  author       = {Xinghao Jiang and
                  Tanfeng Sun and
                  Jianhua Li and
                  Ye Yun},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {A Novel Real-Time {MPEG-2} Video Watermarking Scheme in Copyright
                  Protection},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {45--51},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_4},
  doi          = {10.1007/978-3-642-04438-0\_4},
  timestamp    = {Sun, 03 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/JiangSLY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KanekoEY08,
  author       = {Satoshi Kaneko and
                  Isao Echizen and
                  Hiroshi Yoshiura},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Evaluation and Improvement of Digital Watermarking Algorithm Based
                  on Cryptographic Security Models},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {401--418},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_34},
  doi          = {10.1007/978-3-642-04438-0\_34},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KanekoEY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Karabat08,
  author       = {Cagatay Karabat},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Adaptive Threshold Based Robust Watermark Detection Method},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {139--151},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_12},
  doi          = {10.1007/978-3-642-04438-0\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Karabat08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Karabat08a,
  author       = {Cagatay Karabat},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Space Time Block Coding for Spread Spectrum Watermarking Systems},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {266--277},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_23},
  doi          = {10.1007/978-3-642-04438-0\_23},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Karabat08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Kuo08,
  author       = {C.{-}C. Jay Kuo},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Design of Collusion-Resistant Fingerprinting Systems: Review and New
                  Results},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {469},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_39},
  doi          = {10.1007/978-3-642-04438-0\_39},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Kuo08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiGPY08,
  author       = {Lei{-}Da Li and
                  Baolong Guo and
                  Jeng{-}Shyang Pan and
                  Liu Yang},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Scale-Space Feature Based Image Watermarking in Contourlet Domain},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {88--102},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_8},
  doi          = {10.1007/978-3-642-04438-0\_8},
  timestamp    = {Mon, 06 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiGPY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiLHZ08,
  author       = {Jian Li and
                  Hongmei Liu and
                  Jiwu Huang and
                  Yongping Zhang},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {A Robust Watermarking Scheme for {H.264}},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_1},
  doi          = {10.1007/978-3-642-04438-0\_1},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiLHZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiZ08,
  author       = {Zhe Li and
                  Jiangbin Zheng},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Blind Detection of Digital Forgery Image Based on the Local Entropy
                  of the Gradient},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {161--169},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_14},
  doi          = {10.1007/978-3-642-04438-0\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiZC08,
  author       = {Kaituo Li and
                  Dan Zhang and
                  Deren Chen},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Exposure Time Change Attack on Image Watermarking Systems},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {170--183},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_15},
  doi          = {10.1007/978-3-642-04438-0\_15},
  timestamp    = {Fri, 22 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiZC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiZNY08,
  author       = {Ting Li and
                  Yao Zhao and
                  Rongrong Ni and
                  Lifang Yu},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {A High Capacity Steganographic Algorithm in Color Images},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {218--228},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_19},
  doi          = {10.1007/978-3-642-04438-0\_19},
  timestamp    = {Thu, 05 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiZNY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LuoHQ08,
  author       = {Weiqi Luo and
                  Jiwu Huang and
                  Guoping Qiu},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {A Novel Method for Block Size Forensics Based on Morphological Operations},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {229--239},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_20},
  doi          = {10.1007/978-3-642-04438-0\_20},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LuoHQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/MeerwaldU08,
  author       = {Peter Meerwald and
                  Andreas Uhl},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Scalability Evaluation of Blind Spread-Spectrum Image Watermarking},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {61--75},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_6},
  doi          = {10.1007/978-3-642-04438-0\_6},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/MeerwaldU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/PohM08,
  author       = {Geong Sen Poh and
                  Keith M. Martin},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon
                  Encryption},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {433--447},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_36},
  doi          = {10.1007/978-3-642-04438-0\_36},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/PohM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SachnevKZC08,
  author       = {Vasiliy Sachnev and
                  Hyoung{-}Joong Kim and
                  Rongyue Zhang and
                  Yongsoo Choi},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {A Novel Approach for {JPEG} Steganography},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {209--217},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_18},
  doi          = {10.1007/978-3-642-04438-0\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SachnevKZC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Shi08,
  author       = {Yun Q. Shi},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {First Digit Law and Its Application to Digital Forensics},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {448--453},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_37},
  doi          = {10.1007/978-3-642-04438-0\_37},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Shi08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ShirvanianA08,
  author       = {Maliheh Shirvanian and
                  Farah Torkamani{-}Azar},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Adaptive SVD-Based Digital Image Watermarking},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {113--123},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_10},
  doi          = {10.1007/978-3-642-04438-0\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ShirvanianA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SohnRP08,
  author       = {Hosik Sohn and
                  Yong Man Ro and
                  Konstantinos N. Plataniotis},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Content Sharing Based on Personal Information in Virtually Secured
                  Space},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {388--400},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_33},
  doi          = {10.1007/978-3-642-04438-0\_33},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SohnRP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SunLLW08,
  author       = {Yifeng Sun and
                  Fenlin Liu and
                  Bin Liu and
                  Ping Wang},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Steganalysis Based on Difference Image},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {184--198},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_16},
  doi          = {10.1007/978-3-642-04438-0\_16},
  timestamp    = {Fri, 26 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SunLLW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SurGM08,
  author       = {Arijit Sur and
                  Piyush Goel and
                  Jayanta Mukhopadhyay},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {A Novel Steganographic Algorithm Resisting Targeted Steganalytic Attacks
                  on {LSB} Matching},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {199--208},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_17},
  doi          = {10.1007/978-3-642-04438-0\_17},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SurGM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WahabBS08,
  author       = {Ainuddin Wahid Abdul Wahab and
                  Johann A. Briffa and
                  Hans Georg Schaathun},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {On the Performance of Wavelet Decomposition Steganalysis with JSteg
                  Steganography},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {342--349},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_29},
  doi          = {10.1007/978-3-642-04438-0\_29},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WahabBS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WilliamsTHW08,
  author       = {David M. Williams and
                  Helen Treharne and
                  Anthony T. S. Ho and
                  Adrian Waller},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Formal Analysis of Two Buyer-Seller Watermarking Protocols},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {278--292},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_24},
  doi          = {10.1007/978-3-642-04438-0\_24},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WilliamsTHW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XiaoLZL08,
  author       = {Shangqin Xiao and
                  Hefei Ling and
                  Fuhao Zou and
                  Zhengding Lu},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Secret Sharing Based Video Watermark Algorithm for Multiuser},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {303--312},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_26},
  doi          = {10.1007/978-3-642-04438-0\_26},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/XiaoLZL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XiaoW08,
  author       = {Jun Xiao and
                  Ying Wang},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Multiple Watermarking with Side Information},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {379--387},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_32},
  doi          = {10.1007/978-3-642-04438-0\_32},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/XiaoW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XuWW08,
  author       = {Dawen Xu and
                  Rangding Wang and
                  Jicheng Wang},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Video Watermarking Based on Spatio-temporal {JND} Profile},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {327--341},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_28},
  doi          = {10.1007/978-3-642-04438-0\_28},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/XuWW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YangKH08,
  author       = {Rui Yang and
                  Xiangui Kang and
                  Jiwu Huang},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Robust Audio Watermarking Based on Log-Polar Frequency Index},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {124--138},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_11},
  doi          = {10.1007/978-3-642-04438-0\_11},
  timestamp    = {Fri, 07 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YangKH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhangHZQ08,
  author       = {Na Zhang and
                  Hua Huang and
                  Quan Zhou and
                  Chun Qi},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Balanced Multiwavelets Based Digital Image Watermarking},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {350--362},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_30},
  doi          = {10.1007/978-3-642-04438-0\_30},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhangHZQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhangKZ08,
  author       = {Yongping Zhang and
                  Xiangui Kang and
                  Philipp Zhang},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {A Practical Print-and-Scan Resilient Watermarking for High Resolution
                  Images},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {103--112},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_9},
  doi          = {10.1007/978-3-642-04438-0\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhangKZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhangNLH08,
  author       = {Dong Zhang and
                  Jiangqun Ni and
                  Dah{-}Jye Lee and
                  Jiwu Huang},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {{GSM} Based Security Analysis for Add-SS Watermarking},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {313--326},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_27},
  doi          = {10.1007/978-3-642-04438-0\_27},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhangNLH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhengF08,
  author       = {Jiangbin Zheng and
                  Sha Feng},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {A Color Image Watermarking Scheme in the Associated Domain of {DWT}
                  and {DCT} Domains Based on Multi-channel Watermarking Framework},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {419--432},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_35},
  doi          = {10.1007/978-3-642-04438-0\_35},
  timestamp    = {Wed, 22 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhengF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhengL08,
  author       = {Jiangbin Zheng and
                  Miao Liu},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {A Digital Forgery Image Detection Algorithm Based on Wavelet Homomorphic
                  Filtering},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {152--160},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_13},
  doi          = {10.1007/978-3-642-04438-0\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhengL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2007,
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-92238-4},
  doi          = {10.1007/978-3-540-92238-4},
  isbn         = {978-3-540-92237-7},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/BarbierM07,
  author       = {Johann Barbier and
                  Kichenakoumar Mayoura},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Steganalysis of Multi Bit Plane Image Steganography},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {99--111},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_9},
  doi          = {10.1007/978-3-540-92238-4\_9},
  timestamp    = {Thu, 28 May 2020 12:51:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/BarbierM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/BaudryN07,
  author       = {S{\'{e}}verine Baudry and
                  Philippe Nguyen},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {A Theoretical Framework for Watermarking of Compressed Signals},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {410--422},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_32},
  doi          = {10.1007/978-3-540-92238-4\_32},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/BaudryN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/BoatoCN07,
  author       = {Giulia Boato and
                  Valentina Conotter and
                  Francesco G. B. De Natale},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {GA-Based Robustness Evaluation Method for Digital Image Watermarking},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {294--307},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_23},
  doi          = {10.1007/978-3-540-92238-4\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/BoatoCN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChangLW07,
  author       = {Chin{-}Chen Chang and
                  Chih{-}Yang Lin and
                  Yu{-}Zheng Wang},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {A High Payload {VQ} Steganographic Method for Binary Images},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {467--481},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_36},
  doi          = {10.1007/978-3-540-92238-4\_36},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChangLW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChangW07,
  author       = {Chin{-}Chen Chang and
                  Wen{-}Chuan Wu},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Reversible Quantization-Index Modulation Using Neighboring Correlation},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {222--232},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_17},
  doi          = {10.1007/978-3-540-92238-4\_17},
  timestamp    = {Wed, 25 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChangW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ComesanaP07,
  author       = {Pedro Comesa{\~{n}}a and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Dither Modulation in the Logarithmic Domain},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {308--322},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_24},
  doi          = {10.1007/978-3-540-92238-4\_24},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ComesanaP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/CulnaneTH07,
  author       = {Chris Culnane and
                  Helen Treharne and
                  Anthony T. S. Ho},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Authenticating Binary Text Documents Using a Localising {OMAC} Watermark
                  Robust to Printing and Scanning},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {173--187},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_14},
  doi          = {10.1007/978-3-540-92238-4\_14},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/CulnaneTH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/DongCGT07,
  author       = {Jing Dong and
                  Xiaochuan Chen and
                  Lei Guo and
                  Tieniu Tan},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Fusion Based Blind Image Steganalysis by Boosting Feature Selection},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {87--98},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_8},
  doi          = {10.1007/978-3-540-92238-4\_8},
  timestamp    = {Tue, 12 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/DongCGT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/DowlingPMDPBCBC07,
  author       = {Jason Dowling and
                  Birgit M. Planitz and
                  Anthony J. Maeder and
                  Jiang Du and
                  Binh Pham and
                  Colin Boyd and
                  Shaokang Chen and
                  Andrew P. Bradley and
                  Stuart Crozier},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {A Comparison of {DCT} and {DWT} Block Based Watermarking on Medical
                  Image Quality},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {454--466},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_35},
  doi          = {10.1007/978-3-540-92238-4\_35},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/DowlingPMDPBCBC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/DuZS07,
  author       = {Yanfang Du and
                  Jing Zhang and
                  Yuting Su},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Watermarking for Authentication of {LZ-77} Compressed Documents},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {365--372},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_28},
  doi          = {10.1007/978-3-540-92238-4\_28},
  timestamp    = {Mon, 08 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/DuZS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/GeisselhardtI07,
  author       = {Walter Geisselhardt and
                  Taswar Iqbal},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {High-Capacity Invisible Background Encoding for Digital Authentication
                  of Hardcopy Documents},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {203--221},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_16},
  doi          = {10.1007/978-3-540-92238-4\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/GeisselhardtI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuLLC07,
  author       = {Yongjian Hu and
                  Heung{-}Kyu Lee and
                  Jianwei Li and
                  Kaiying Chen},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Reversible Data Hiding Using Prediction Error Values Embedding},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {244--253},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_19},
  doi          = {10.1007/978-3-540-92238-4\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuLLC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/JiangHT07,
  author       = {Weina Jiang and
                  Anthony T. S. Ho and
                  Helen Treharne},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Least Distortion Halftone Image Data Hiding Watermarking by Optimizing
                  an Iterative Linear Gain Control Model},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {423--439},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_33},
  doi          = {10.1007/978-3-540-92238-4\_33},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/JiangHT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/JohnsonF07,
  author       = {Micah K. Johnson and
                  Hany Farid},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Detecting Photographic Composites of People},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {19--33},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_3},
  doi          = {10.1007/978-3-540-92238-4\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/JohnsonF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KimISL07,
  author       = {Kyung{-}Su Kim and
                  Dong{-}Hyuck Im and
                  Young{-}Ho Suh and
                  Heung{-}Kyu Lee},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {A Practical Real-Time Video Watermarking Scheme Robust against Downscaling
                  Attack},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {323--334},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_25},
  doi          = {10.1007/978-3-540-92238-4\_25},
  timestamp    = {Mon, 14 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KimISL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KimJR07,
  author       = {Yeongyun Kim and
                  Sung Ho Jin and
                  Yong Man Ro},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Scalable Security and Conditional Access Control for Multiple Regions
                  of Interest in Scalable Video Coding},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {71--86},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_7},
  doi          = {10.1007/978-3-540-92238-4\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KimJR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Lafaye07,
  author       = {Julien Lafaye},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {On the Complexity of Obtaining Optimal Watermarking Schemes},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {395--409},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_31},
  doi          = {10.1007/978-3-540-92238-4\_31},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Lafaye07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiHTHS07,
  author       = {Bin Li and
                  Fangjun Huang and
                  Shunquan Tan and
                  Jiwu Huang and
                  Yun Q. Shi},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Effect of Different Coding Patterns on Compressed Frequency Domain
                  Based Universal {JPEG} Steganalysis},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {143--157},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_12},
  doi          = {10.1007/978-3-540-92238-4\_12},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiHTHS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LinA07,
  author       = {Yiqing Lin and
                  Waleed H. Abdulla},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Multiple Scrambling and Adaptive Synchronization for Audio Watermarking},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {440--453},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_34},
  doi          = {10.1007/978-3-540-92238-4\_34},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LinA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Liu07,
  author       = {Bede Liu},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Watermarking, a Mature Technology - Retrospect and Prospect},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {1},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_1},
  doi          = {10.1007/978-3-540-92238-4\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Liu07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiuLGWRW07,
  author       = {Zhongxuan Liu and
                  Shiguo Lian and
                  Josselin Gautier and
                  Ronggang Wang and
                  Zhen Ren and
                  Haila Wang},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Secure Video Multicast Based on Desynchronized Fingerprint and Partial
                  Encryption},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {335--349},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_26},
  doi          = {10.1007/978-3-540-92238-4\_26},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiuLGWRW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LuL07,
  author       = {Zhe{-}Ming Lu and
                  Zhen Li},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {High Capacity Reversible Data Hiding for 3D Meshes in the {PVQ} Domain},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {233--243},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_18},
  doi          = {10.1007/978-3-540-92238-4\_18},
  timestamp    = {Wed, 10 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LuL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LuoLP07,
  author       = {Hao Luo and
                  Zhe{-}Ming Lu and
                  Jeng{-}Shyang Pan},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Multiple Watermarking in Visual Cryptography},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {60--70},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_6},
  doi          = {10.1007/978-3-540-92238-4\_6},
  timestamp    = {Mon, 08 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LuoLP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/PhanG07,
  author       = {Raphael Chung{-}Wei Phan and
                  Bok{-}Min Goi},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {(In)Security of an Efficient Fingerprinting Scheme with Symmetric
                  and Commutative Encryption of {IWDW} 2005},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {34--44},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_4},
  doi          = {10.1007/978-3-540-92238-4\_4},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/PhanG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/PramilaKS07,
  author       = {Anu Pramila and
                  Anja Keskinarkaus and
                  Tapio Sepp{\"{a}}nen},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Multiple Domain Watermarking for Print-Scan and {JPEG} Resilient Data
                  Hiding},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {279--293},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_22},
  doi          = {10.1007/978-3-540-92238-4\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/PramilaKS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SachnevKXN07,
  author       = {Vasiliy Sachnev and
                  Hyoung{-}Joong Kim and
                  Shijun Xiang and
                  Jeho Nam},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {An Improved Reversible Difference Expansion Watermarking Algorithm},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {254--263},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_20},
  doi          = {10.1007/978-3-540-92238-4\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SachnevKXN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Sadeghi07,
  author       = {Ahmad{-}Reza Sadeghi},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {The Marriage of Cryptography and Watermarking - Beneficial and Challenging
                  for Secure Watermarking and Detection},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {2--18},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_2},
  doi          = {10.1007/978-3-540-92238-4\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Sadeghi07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Schaathun07,
  author       = {Hans Georg Schaathun},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Attack Analysis for He {\&} Wu's Joint Watermarking/Fingerprinting
                  Scheme},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {45--59},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_5},
  doi          = {10.1007/978-3-540-92238-4\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Schaathun07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ShiCXS07,
  author       = {Yun Q. Shi and
                  Chunhua Chen and
                  Guorong Xuan and
                  Wei Su},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Steganalysis Versus Splicing Detection},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {158--172},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_13},
  doi          = {10.1007/978-3-540-92238-4\_13},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ShiCXS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SunLZKZ07,
  author       = {Shuifa Sun and
                  Bang Jun Lei and
                  Sheng Zheng and
                  Sam Kwong and
                  Xuejun Zhou},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Design an Aperiodic Stochastic Resonance Signal Processor for Digital
                  Watermarking},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {350--364},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_27},
  doi          = {10.1007/978-3-540-92238-4\_27},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SunLZKZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/TanHS07,
  author       = {Shunquan Tan and
                  Jiwu Huang and
                  Yun Q. Shi},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Steganalysis of Enhanced {BPCS} Steganography Using the Hilbert-Huang
                  Transform Based Sequential Analysis},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {112--126},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_10},
  doi          = {10.1007/978-3-540-92238-4\_10},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/TanHS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/TangNWZ07,
  author       = {Linna Tang and
                  Jiangqun Ni and
                  Chuntao Wang and
                  Rongyue Zhang},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm
                  for Halftone Images},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {382--394},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_30},
  doi          = {10.1007/978-3-540-92238-4\_30},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/TangNWZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/UllerichW07,
  author       = {Christian Ullerich and
                  Andreas Westfeld},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Weaknesses of {MB2}},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {127--142},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_11},
  doi          = {10.1007/978-3-540-92238-4\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/UllerichW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangH07,
  author       = {Rangding Wang and
                  Wenji Hu},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Robust Audio Zero-Watermark Based on {LWT} and Chaotic Modulation},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {373--381},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_29},
  doi          = {10.1007/978-3-540-92238-4\_29},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XuanSCCNT07,
  author       = {Guorong Xuan and
                  Yun Q. Shi and
                  Peiqi Chai and
                  Xia Cui and
                  Zhicheng Ni and
                  Xuefeng Tong},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Optimum Histogram Pair Based Image Lossless Data Embedding},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {264--278},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_21},
  doi          = {10.1007/978-3-540-92238-4\_21},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/XuanSCCNT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YangK07,
  author       = {Huijuan Yang and
                  Alex ChiChung Kot},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {A General Data Hiding Framework and Multi-level Signature for Binary
                  Images},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {188--202},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_15},
  doi          = {10.1007/978-3-540-92238-4\_15},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YangK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/BarbierFM06,
  author       = {Johann Barbier and
                  Eric Filiol and
                  Kichenakoumar Mayoura},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Universal {JPEG} Steganalysis in the Compressed Frequency Domain},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {253--267},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_21},
  doi          = {10.1007/11922841\_21},
  timestamp    = {Thu, 28 May 2020 12:51:40 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/BarbierFM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/CoxDF06,
  author       = {Ingemar J. Cox and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Teddy Furon},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Watermarking Is Not Cryptography},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_1},
  doi          = {10.1007/11922841\_1},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/CoxDF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/CulnaneTH06,
  author       = {Chris Culnane and
                  Helen Treharne and
                  Anthony T. S. Ho},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {A New Multi-set Modulation Technique for Increasing Hiding Capacity
                  of Binary Watermark for Print and Scan Processes},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {96--110},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_9},
  doi          = {10.1007/11922841\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/CulnaneTH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/DamnjanovicI06,
  author       = {Ivan Damnjanovic and
                  Ebroul Izquierdo},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Capacity Enhancement of Compressed Domain Watermarking Channel Using
                  Duo-binary Coding},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {162--176},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_14},
  doi          = {10.1007/11922841\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/DamnjanovicI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/FuSS06,
  author       = {Dongdong Fu and
                  Yun Q. Shi and
                  Wei Su},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Detection of Image Splicing Based on Hilbert-Huang Transform and Moments
                  of Characteristic Functions with Wavelet Decomposition},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {177--187},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_15},
  doi          = {10.1007/11922841\_15},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/FuSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/GuptaP06,
  author       = {Gaurav Gupta and
                  Josef Pieprzyk},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {A Low-Cost Attack on Branch-Based Software Watermarking Schemes},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {282--293},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_23},
  doi          = {10.1007/11922841\_23},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/GuptaP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HeZT06,
  author       = {Hongjie He and
                  Jiashu Zhang and
                  Heng{-}Ming Tai},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {422--432},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_34},
  doi          = {10.1007/11922841\_34},
  timestamp    = {Fri, 12 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HeZT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HsuLP06,
  author       = {Chao{-}Yong Hsu and
                  Chun{-}Shien Lu and
                  Soo{-}Chang Pei},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Joint Screening Halftoning and Visual Cryptography for Image Protection},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {212--225},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_18},
  doi          = {10.1007/11922841\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HsuLP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuJLY06,
  author       = {Yongjian Hu and
                  Byeungwoo Jeon and
                  Zhiquan Lin and
                  Hui Yang},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Analysis and Comparison of Typical Reversible Watermarking Methods},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {333--347},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_27},
  doi          = {10.1007/11922841\_27},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuJLY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HwangKC06,
  author       = {JinHa Hwang and
                  Jong{-}Weon Kim and
                  Jong{-}Uk Choi},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {A Reversible Watermarking Based on Histogram Shifting},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {348--361},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_28},
  doi          = {10.1007/11922841\_28},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HwangKC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KalkerM06,
  author       = {Ton Kalker and
                  Michael Malkin},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Secure Quantization Index Modulation Watermark Detection},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {16--18},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_2},
  doi          = {10.1007/11922841\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KalkerM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KeskinarkausPSS06,
  author       = {Anja Keskinarkaus and
                  Anu Pramila and
                  Tapio Sepp{\"{a}}nen and
                  Jaakko J. Sauvola},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Wavelet Domain Print-Scan and {JPEG} Resilient Data Hiding Method},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {82--95},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_8},
  doi          = {10.1007/11922841\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KeskinarkausPSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KimB06,
  author       = {Siho Kim and
                  Keun{-}Sung Bae},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Analysis of Optimal Search Interval for Estimation of Modified Quantization
                  Step Size in Quantization-Based Audio Watermark Detection},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {241--252},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_20},
  doi          = {10.1007/11922841\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KimB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KimCPJ06,
  author       = {Min{-}Su Kim and
                  Jae{-}Won Cho and
                  R{\'{e}}my Prost and
                  Ho{-}Youl Jung},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Wavelet Analysis Based Blind Watermarking for 3-D Surface Meshes},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {123--137},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_11},
  doi          = {10.1007/11922841\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KimCPJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KimDR06,
  author       = {Younhee Kim and
                  Zoran Duric and
                  Dana Richards},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Towards Lower Bounds on Embedding Distortion in Information Hiding},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {362--376},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_29},
  doi          = {10.1007/11922841\_29},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KimDR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KwonJNK06,
  author       = {Goo{-}Rak Kwon and
                  Seung{-}Won Jung and
                  Sang{-}Jae Nam and
                  Sung{-}Jea Ko},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Improved Differential Energy Watermarking for Embedding Watermark},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {377--386},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_30},
  doi          = {10.1007/11922841\_30},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/KwonJNK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KwonLNK06,
  author       = {Goo{-}Rak Kwon and
                  Kwan{-}Hee Lee and
                  Sang{-}Jae Nam and
                  Sung{-}Jea Ko},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Intellectual Property Rights Management Using Combination Encryption
                  in {MPEG-4}},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {188--196},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_16},
  doi          = {10.1007/11922841\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KwonLNK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LeeKK06,
  author       = {Suk Hwan Lee and
                  Ki{-}Ryong Kwon and
                  Dong Kyue Kim},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Watermarking for 3D Keyframe Animation Based on Geometry and Interpolator},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {138--149},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_12},
  doi          = {10.1007/11922841\_12},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/LeeKK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LeeWL06,
  author       = {Kwangsoo Lee and
                  Andreas Westfeld and
                  Sangjin Lee},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Category Attack for {LSB} Steganalysis of {JPEG} Images},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {35--48},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_4},
  doi          = {10.1007/11922841\_4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LeeWL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LemmaKCV06,
  author       = {Aweke N. Lemma and
                  Stefan Katzenbeisser and
                  Mehmet Utku Celik and
                  Michiel van der Veen},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Secure Watermark Embedding Through Partial Encryption},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {433--445},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_35},
  doi          = {10.1007/11922841\_35},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LemmaKCV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiuKHW06,
  author       = {Chih{-}Chieh Liu and
                  Yu{-}Feng Kuo and
                  Chun{-}Hsiang Huang and
                  Ja{-}Ling Wu},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {A Colorization Based Animation Broadcast System with Traitor Tracing
                  Capability},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {387--396},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_31},
  doi          = {10.1007/11922841\_31},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiuKHW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiuLWR06,
  author       = {Zhongxuan Liu and
                  Shiguo Lian and
                  Ronggang Wang and
                  Zhen Ren},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Desynchronization in Compression Process for Collusion Resilient Video
                  Fingerprint},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {308--322},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_25},
  doi          = {10.1007/11922841\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiuLWR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LuLP06,
  author       = {Zhe{-}Ming Lu and
                  Hao Luo and
                  Jeng{-}Shyang Pan},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Reversible Watermarking for Error Diffused Halftone Images Using Statistical
                  Features},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {71--81},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_7},
  doi          = {10.1007/11922841\_7},
  timestamp    = {Mon, 08 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LuLP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/NguyenYL06,
  author       = {Cong Nguyen Bui and
                  Sang Moon Yoon and
                  Heung{-}Kyu Lee},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Multi Bit Plane Image Steganography},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {61--70},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_6},
  doi          = {10.1007/11922841\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/NguyenYL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/NiZHWL06,
  author       = {Jiangqun Ni and
                  Rongyue Zhang and
                  Jiwu Huang and
                  Chuntao Wang and
                  Quanbo Li},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating
                  Steerable Pyramid Transform},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {446--460},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_36},
  doi          = {10.1007/11922841\_36},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/NiZHWL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/OhLL06,
  author       = {Hwajong Oh and
                  Kwangsoo Lee and
                  Sangjin Lee},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Attack on {JPEG2000} Steganography Using {LRCA}},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {268--281},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_22},
  doi          = {10.1007/11922841\_22},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/OhLL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ParkLM06,
  author       = {Hyun Park and
                  Sung Hyun Lee and
                  Young Shik Moon},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Adaptive Video Watermarking Utilizing Video Characteristics in 3D-DCT
                  Domain},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {397--406},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_32},
  doi          = {10.1007/11922841\_32},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ParkLM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Westfeld06,
  author       = {Andreas Westfeld},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Steganalysis in the Presence of Weak Cryptography and Encoding},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {19--34},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_3},
  doi          = {10.1007/11922841\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Westfeld06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WonBR06,
  author       = {Yong Geun Won and
                  Tae Meon Bae and
                  Yong Man Ro},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Scalable Protection and Access Control in Full Scalable Video Coding},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {407--421},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_33},
  doi          = {10.1007/11922841\_33},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WonBR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WooDP06,
  author       = {Chaw{-}Seng Woo and
                  Jiang Du and
                  Binh Pham},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Geometric Invariant Domain for Image Watermarking},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {294--307},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_24},
  doi          = {10.1007/11922841\_24},
  timestamp    = {Thu, 09 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WooDP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XiangHYWL06,
  author       = {Shijun Xiang and
                  Jiwu Huang and
                  Rui Yang and
                  Chuntao Wang and
                  Hongmei Liu},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Robust Audio Watermarking Based on Low-Order Zernike Moments},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {226--240},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_19},
  doi          = {10.1007/11922841\_19},
  timestamp    = {Fri, 07 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/XiangHYWL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XuanSHFZCG06,
  author       = {Guorong Xuan and
                  Yun Q. Shi and
                  Cong Huang and
                  Dongdong Fu and
                  Xiuming Zhu and
                  Peiqi Chai and
                  Jianjiong Gao},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Steganalysis Using High-Dimensional Features Derived from Co-occurrence
                  Matrix and Class-Wise Non-Principal Components Analysis {(CNPCA)}},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {49--60},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_5},
  doi          = {10.1007/11922841\_5},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/XuanSHFZCG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XuanYYGCSN06,
  author       = {Guorong Xuan and
                  Qiuming Yao and
                  Chengyun Yang and
                  Jianjiong Gao and
                  Peiqi Chai and
                  Yun Q. Shi and
                  Zhicheng Ni},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Lossless Data Hiding Using Histogram Shifting Method Based on Integer
                  Wavelets},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {323--332},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_26},
  doi          = {10.1007/11922841\_26},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/XuanYYGCSN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YangG06,
  author       = {Liesen Yang and
                  Zongming Guo},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {A Robust Video Watermarking Scheme Via Temporal Segmentation and Middle
                  Frequency Component Adaptive Modification},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {150--161},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_13},
  doi          = {10.1007/11922841\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YangG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YeSC06,
  author       = {Shuiming Ye and
                  Qibin Sun and
                  Ee{-}Chien Chang},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Error Resilient Image Authentication Using Feature Statistical and
                  Spatial Properties},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {461--472},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_37},
  doi          = {10.1007/11922841\_37},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YeSC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhuTY06,
  author       = {Xinshan Zhu and
                  Zhi Tang and
                  Liesen Yang},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {A Novel Multibit Watermarking Scheme Combining Spread Spectrum and
                  Quantization},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {111--122},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_10},
  doi          = {10.1007/11922841\_10},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhuTY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZouTBZ06,
  author       = {Dekun Zou and
                  Jun Tian and
                  Jeffrey A. Bloom and
                  Jiefu Zhai},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Data Hiding in Film Grain},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {197--211},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_17},
  doi          = {10.1007/11922841\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZouTBZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2006,
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841},
  doi          = {10.1007/11922841},
  isbn         = {3-540-48825-1},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/AbrardoBPM05,
  author       = {Andrea Abrardo and
                  Mauro Barni and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Carlos Mosquera},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Trellis-Coded Rational Dither Modulation for Digital Watermarking},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {351--360},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_27},
  doi          = {10.1007/11551492\_27},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/AbrardoBPM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Balado05,
  author       = {F{\'{e}}lix Balado},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {New Geometric Analysis of Spread-Spectrum Data Hiding with Repetition
                  Coding, with Implications for Side-Informed Schemes},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {336--350},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_26},
  doi          = {10.1007/11551492\_26},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Balado05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/BasH05,
  author       = {Patrick Bas and
                  Jarmo Hurri},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Security of {DM} Quantization Watermarking Schemes: {A} Practical
                  Study for Digital Images},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {186--200},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_15},
  doi          = {10.1007/11551492\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/BasH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/CaldelliPBC05,
  author       = {Roberto Caldelli and
                  Alessandro Piva and
                  Mauro Barni and
                  Andrea Carboni},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Effectiveness of {ST-DM} Watermarking Against Intra-video Collusion},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {158--170},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_13},
  doi          = {10.1007/11551492\_13},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/CaldelliPBC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/CampisiN05,
  author       = {Patrizio Campisi and
                  Alessandro Neri},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Perceptual Video Watermarking in the 3D-DWT Domain Using a Multiplicative
                  Approach},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {432--443},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_33},
  doi          = {10.1007/11551492\_33},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/CampisiN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Chun05,
  author       = {In{-}Gook Chun},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Look Up Table(LUT) Method for Halftone Image Watermarking},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {275--285},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_21},
  doi          = {10.1007/11551492\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Chun05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ComesanaPP05,
  author       = {Pedro Comesa{\~{n}}a and
                  Luis P{\'{e}}rez{-}Freire and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {The Return of the Sensitivity Attack},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {260--274},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_20},
  doi          = {10.1007/11551492\_20},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ComesanaPP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/CoxKPS05,
  author       = {Ingemar J. Cox and
                  Ton Kalker and
                  Georg Pakura and
                  Mathias Scheel},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Information Transmission and Steganography},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {15--29},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_2},
  doi          = {10.1007/11551492\_2},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/CoxKPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/DoerrD05,
  author       = {Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Jean{-}Luc Dugelay},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {216--230},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_17},
  doi          = {10.1007/11551492\_17},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/DoerrD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Furon05,
  author       = {Teddy Furon},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {A Survey of Watermarking Security},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {201--215},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_16},
  doi          = {10.1007/11551492\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Furon05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HeHQ05,
  author       = {Junhui He and
                  Jiwu Huang and
                  Guoping Qiu},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {A New Approach to Estimating Hidden Message Length in Stochastic Modulation
                  Steganography},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_1},
  doi          = {10.1007/11551492\_1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HeHQ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HeW05,
  author       = {Shan He and
                  Min Wu},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Performance Study on Multimedia Fingerprinting Employing Traceability
                  Codes},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {84--96},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_7},
  doi          = {10.1007/11551492\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HeW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HoganBHS05,
  author       = {Mark T. Hogan and
                  F{\'{e}}lix Balado and
                  Neil J. Hurley and
                  Guenole C. M. Silvestre},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {On the Achievable Rate of Side Informed Embedding Techniques with
                  Steganographic Constraints},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {387--402},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_30},
  doi          = {10.1007/11551492\_30},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HoganBHS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuangZ05,
  author       = {Xingliang Huang and
                  Bo Zhang},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Robust Detection of Transform Domain Additive Watermarks},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {124--138},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_10},
  doi          = {10.1007/11551492\_10},
  timestamp    = {Sun, 03 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuangZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KangSHZ05,
  author       = {Xiangui Kang and
                  Yun Q. Shi and
                  Jiwu Huang and
                  Wenjun Zeng},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Multi-band Wavelet Based Digital Watermarking Using Principal Component
                  Analysis},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {139--146},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_11},
  doi          = {10.1007/11551492\_11},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KangSHZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KimVJP05,
  author       = {Min{-}Su Kim and
                  S{\'{e}}bastien Valette and
                  Ho{-}Youl Jung and
                  R{\'{e}}my Prost},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Watermarking of 3D Irregular Meshes Based on Wavelet Multiresolution
                  Analysis},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {313--324},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_24},
  doi          = {10.1007/11551492\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KimVJP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KiyavashM05,
  author       = {Negar Kiyavash and
                  Pierre Moulin},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Regular Simplex Fingerprints and Their Optimality Properties},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {97--109},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_8},
  doi          = {10.1007/11551492\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KiyavashM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KorzhikML05,
  author       = {Valery I. Korzhik and
                  Guillermo Morales{-}Luna and
                  Moon Ho Lee},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {On the Existence of Perfect Stegosystems},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {30--38},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_3},
  doi          = {10.1007/11551492\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KorzhikML05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LeeKLS05,
  author       = {Hae{-}Yeoun Lee and
                  In Koo Kang and
                  Heung{-}Kyu Lee and
                  Young{-}Ho Suh},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Evaluation of Feature Extraction Techniques for Robust Watermarking},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {418--431},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_32},
  doi          = {10.1007/11551492\_32},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LeeKLS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/MoulinW05,
  author       = {Pierre Moulin and
                  Ying Wang},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Improved {QIM} Strategies for Gaussian Watermarking},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {372--386},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_29},
  doi          = {10.1007/11551492\_29},
  timestamp    = {Wed, 11 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/MoulinW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/NiZHW05,
  author       = {Jiangqun Ni and
                  Rongyue Zhang and
                  Jiwu Huang and
                  Chuntao Wang},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {A Robust Multi-bit Image Watermarking Algorithm Based on {HMM} in
                  Wavelet Domain},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {110--123},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_9},
  doi          = {10.1007/11551492\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/NiZHW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/PacittiF05,
  author       = {Marcos de Castro Pacitti and
                  Weiler Alves Finamore},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Digital Watermarking Robustness and Fragility Characteristics: New
                  Modelling and Coding Influence},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {325--335},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_25},
  doi          = {10.1007/11551492\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/PacittiF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/PacittiF05a,
  author       = {Marcos de Castro Pacitti and
                  Weiler Alves Finamore},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Performance Lower Bounds for Existing and New Uncoded Digital Watermarking
                  Modulation Techniques},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {403--417},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_31},
  doi          = {10.1007/11551492\_31},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/PacittiF05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/PamboukianK05,
  author       = {Sergio Vicente Denser Pamboukian and
                  Hae Yong Kim},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {New Public-Key Authentication Watermarking for {JBIG2} Resistant to
                  Parity Attacks},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {286--298},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_22},
  doi          = {10.1007/11551492\_22},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/PamboukianK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/PevnuF05,
  author       = {Tom{\'{a}}s Pevn{\'{y}} and
                  Jessica J. Fridrich},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Towards Multi-class Blind Steganalyzer for {JPEG} Images},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {39--53},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_4},
  doi          = {10.1007/11551492\_4},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/PevnuF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SadrG05,
  author       = {Amir Houman Sadr and
                  Shahrokh Ghaemmaghami},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Robustness Enhancement of Content-Based Watermarks Using Entropy Masking
                  Effect},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {444--458},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_34},
  doi          = {10.1007/11551492\_34},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SadrG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SorianoFN05,
  author       = {Miguel Soriano and
                  Marcel Fernandez and
                  Josep Cotrina Navau},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Fingerprinting Schemes. Identifying the Guilty Sources Using Side
                  Information},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {231--243},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_18},
  doi          = {10.1007/11551492\_18},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SorianoFN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SunY05,
  author       = {Wei Sun and
                  En{-}Hui Yang},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Closed-Form Formulas for Private Watermarking Capacities of Laplacian
                  Sources with the Magnitude-Error Distortion Measure and Under Additive
                  Attacks},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {361--371},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_28},
  doi          = {10.1007/11551492\_28},
  timestamp    = {Tue, 07 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SunY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/TopkaraKAN05,
  author       = {Mercan Topkara and
                  Ashish Kamra and
                  Mikhail J. Atallah and
                  Cristina Nita{-}Rotaru},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {ViWiD : Visible Watermarking Based Defense Against Phishing},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {470--483},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_36},
  doi          = {10.1007/11551492\_36},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/TopkaraKAN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Venkatachalam05,
  author       = {Balaji Venkatachalam},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Software Watermarking as a Proof of Identity: {A} Study of Zero Knowledge
                  Proof Based Software Watermarking},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {299--312},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_23},
  doi          = {10.1007/11551492\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Venkatachalam05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Venturini05,
  author       = {Ilaria Venturini},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Oracle Attacks and Covert Channels},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {171--185},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_14},
  doi          = {10.1007/11551492\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Venturini05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Vila-ForcenVKPP05,
  author       = {Jos{\'{e}}{-}Emilio Vila{-}Forc{\'{e}}n and
                  Sviatoslav Voloshynovskiy and
                  Oleksiy J. Koval and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Thierry Pun},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Practical Data-Hiding: Additive Attacks Performance Analysis},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {244--259},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_19},
  doi          = {10.1007/11551492\_19},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/Vila-ForcenVKPP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/VinodB05,
  author       = {P. Vinod and
                  Prabin Kumar Bora},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {A New Inter-frame Collusion Attack and a Countermeasure},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {147--157},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_12},
  doi          = {10.1007/11551492\_12},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/VinodB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WongSC05,
  author       = {Angela S. L. Wong and
                  Matthew Sorell and
                  Robert Clarke},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Secure Mutual Distrust Transaction Tracking Using Cryptographic Elements},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {459--469},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_35},
  doi          = {10.1007/11551492\_35},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WongSC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YongL05,
  author       = {Seunglim Yong and
                  Sang{-}Ho Lee},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {An Efficient Fingerprinting Scheme with Symmetric and Commutative
                  Encryption},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {54--66},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_5},
  doi          = {10.1007/11551492\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YongL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhuFZ05,
  author       = {Yan Zhu and
                  Dengguo Feng and
                  Wei Zou},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Collusion Secure Convolutional Spread Spectrum Fingerprinting},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {67--83},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_6},
  doi          = {10.1007/11551492\_6},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhuFZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2004,
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b106346},
  doi          = {10.1007/B106346},
  isbn         = {3-540-24839-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2005,
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492},
  doi          = {10.1007/11551492},
  isbn         = {3-540-28768-X},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/BaeKR04,
  author       = {Tae Meon Bae and
                  Seok Jun Kang and
                  Yong Man Ro},
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {Watermarking System for QoS Aware Content Adaptation},
  booktitle    = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  pages        = {77--88},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31805-7\_7},
  doi          = {10.1007/978-3-540-31805-7\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/BaeKR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/BloomM04,
  author       = {Jeffrey A. Bloom and
                  Matthew L. Miller},
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {Informed Detection Revisited},
  booktitle    = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  pages        = {29--41},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31805-7\_3},
  doi          = {10.1007/978-3-540-31805-7\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/BloomM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/CayreFF04,
  author       = {Fran{\c{c}}ois Cayre and
                  Caroline Fontaine and
                  Teddy Furon},
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {Watermarking Attack: Security of {WSS} Techniques},
  booktitle    = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  pages        = {171--183},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31805-7\_15},
  doi          = {10.1007/978-3-540-31805-7\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/CayreFF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChangDFLK04,
  author       = {Kisik Chang and
                  Robert H. Deng and
                  Feng Bao and
                  Sangjin Lee and
                  HyungJun Kim},
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {On Security Notions of Steganographic Systems},
  booktitle    = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  pages        = {137--151},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31805-7\_12},
  doi          = {10.1007/978-3-540-31805-7\_12},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChangDFLK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChoKPCJ04,
  author       = {Jae{-}Won Cho and
                  Min{-}Su Kim and
                  R{\'{e}}my Prost and
                  Hyun{-}Yeol Chung and
                  Ho{-}Youl Jung},
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {Robust Watermarking on Polygonal Meshes Using Distribution of Vertex
                  Norms},
  booktitle    = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  pages        = {283--293},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31805-7\_24},
  doi          = {10.1007/978-3-540-31805-7\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChoKPCJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChoLLP04,
  author       = {Wan Hyun Cho and
                  Myung{-}Eun Lee and
                  Hyun Lim and
                  Soon{-}Young Park},
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {Watermarking Technique for Authentication of 3-D Polygonal Meshes},
  booktitle    = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  pages        = {259--270},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31805-7\_22},
  doi          = {10.1007/978-3-540-31805-7\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChoLLP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChoiP04,
  author       = {Jae{-}Gwi Choi and
                  Ji{-}Hwan Park},
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {A Generalization of an Anonymous Buyer-Seller Watermarking Protocol
                  and Its Application to Mobile Communications},
  booktitle    = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  pages        = {232--243},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31805-7\_20},
  doi          = {10.1007/978-3-540-31805-7\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChoiP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/DasZM04,
  author       = {Tanmoy Kanti Das and
                  Jianying Zhou and
                  Subhamoy Maitra},
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {Cryptanalysis of a Wavelet Based Watermarking Scheme},
  booktitle    = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  pages        = {192--203},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31805-7\_17},
  doi          = {10.1007/978-3-540-31805-7\_17},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/DasZM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Deng-PanYYZ04,
  author       = {Deng{-}Pan Ye and
                  Yaobin Mao and
                  Yuewei Dai and
                  Zhiquan Wang},
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {A Multi-feature Based Invertible Authentication Watermarking for {JPEG}
                  Images},
  booktitle    = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  pages        = {152--162},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31805-7\_13},
  doi          = {10.1007/978-3-540-31805-7\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Deng-PanYYZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/GouW04,
  author       = {Hongmei Gou and
                  Min Wu},
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {Fingerprinting Curves},
  booktitle    = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  pages        = {13--28},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31805-7\_2},
  doi          = {10.1007/978-3-540-31805-7\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/GouW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuangSW04,
  author       = {Chun{-}Hsiang Huang and
                  Chih{-}Hao Shen and
                  Ja{-}Ling Wu},
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {Fidelity-Controlled Robustness Enhancement of Blind Watermarking Schemes
                  Using Evolutionary Computational Techniques},
  booktitle    = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  pages        = {271--282},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31805-7\_23},
  doi          = {10.1007/978-3-540-31805-7\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuangSW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KimB04,
  author       = {Siho Kim and
                  Keun{-}Sung Bae},
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {Robust Estimation of Amplitude Modification for Scalar Costa Scheme
                  Based Audio Watermark Detection},
  booktitle    = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  pages        = {101--114},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31805-7\_9},
  doi          = {10.1007/978-3-540-31805-7\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KimB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KimLKKL04,
  author       = {Seung{-}Jin Kim and
                  Suk Hwan Lee and
                  Tae{-}Su Kim and
                  Ki{-}Ryong Kwon and
                  Kuhn{-}Il Lee},
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {A Video Watermarking Using the 3-D Wavelet Transform and Two Perceptual
                  Watermarks},
  booktitle    = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  pages        = {294--303},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31805-7\_25},
  doi          = {10.1007/978-3-540-31805-7\_25},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/KimLKKL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KimQ04,
  author       = {Hae Yong Kim and
                  Ricardo L. de Queiroz},
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {Alteration-Locating Authentication Watermarking for Binary Images},
  booktitle    = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  pages        = {125--136},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31805-7\_11},
  doi          = {10.1007/978-3-540-31805-7\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KimQ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/MegiasHM04,
  author       = {David Meg{\'{\i}}as and
                  Jordi Herrera{-}Joancomart{\'{\i}} and
                  Juli{\`{a}} Minguill{\'{o}}n},
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {Robust Frequency Domain Audio Watermarking: {A} Tuning Analysis},
  booktitle    = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  pages        = {244--258},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31805-7\_21},
  doi          = {10.1007/978-3-540-31805-7\_21},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/MegiasHM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/PhanL04,
  author       = {Raphael Chung{-}Wei Phan and
                  Huo{-}Chong Ling},
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {Flaws in Generic Watermarking Protocols Based on Zero-Knowledge Proofs},
  booktitle    = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  pages        = {184--191},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31805-7\_16},
  doi          = {10.1007/978-3-540-31805-7\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/PhanL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Shi04,
  author       = {Yun Q. Shi},
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {Reversible Data Hiding},
  booktitle    = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31805-7\_1},
  doi          = {10.1007/978-3-540-31805-7\_1},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Shi04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WheelerSS04,
  author       = {Glen E. Wheeler and
                  Reihaneh Safavi{-}Naini and
                  Nicholas Paul Sheppard},
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {Weighted Segmented Digital Watermarking},
  booktitle    = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  pages        = {89--100},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31805-7\_8},
  doi          = {10.1007/978-3-540-31805-7\_8},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/WheelerSS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XuanYZSN04,
  author       = {Guorong Xuan and
                  Chengyun Yang and
                  Yizhan Zhen and
                  Yun Q. Shi and
                  Zhicheng Ni},
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {Reversible Data Hiding Using Integer Wavelet Transform and Companding
                  Technique},
  booktitle    = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  pages        = {115--124},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31805-7\_10},
  doi          = {10.1007/978-3-540-31805-7\_10},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/XuanYZSN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XuanZYSZLW04,
  author       = {Guorong Xuan and
                  Junxiang Zheng and
                  Chengyun Yang and
                  Yun Q. Shi and
                  Dekun Zou and
                  Liansheng Liu and
                  Weichao Bai},
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {A Secure Internet-Based Personal Identity Verification System Using
                  Lossless Watermarking and Fingerprint Recognition},
  booktitle    = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  pages        = {55--65},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31805-7\_5},
  doi          = {10.1007/978-3-540-31805-7\_5},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/XuanZYSZLW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XueLW04,
  author       = {Gang Xue and
                  Peizhong Lu and
                  Jinlian Wang},
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {A Counter-Geometric Distortions Data Hiding Scheme Using Double Channels
                  in Color Images},
  booktitle    = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  pages        = {42--54},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31805-7\_4},
  doi          = {10.1007/978-3-540-31805-7\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/XueLW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YuJYL04,
  author       = {Jeong Jae Yu and
                  Changho Jung and
                  Seok{-}Koo Yoon and
                  Sangjin Lee},
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {Steganographic Scheme Using a Block Cipher},
  booktitle    = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  pages        = {163--170},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31805-7\_14},
  doi          = {10.1007/978-3-540-31805-7\_14},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YuJYL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhaoDF04,
  author       = {Xianfeng Zhao and
                  Yingxia Dai and
                  Dengguo Feng},
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {A Generalized Method for Constructing and Proving Zero-Knowledge Watermark
                  Proof Systems},
  booktitle    = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  pages        = {204--217},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31805-7\_18},
  doi          = {10.1007/978-3-540-31805-7\_18},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhaoDF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhaoDF04a,
  author       = {Xianfeng Zhao and
                  Yingxia Dai and
                  Dengguo Feng},
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {Towards the Public but Noninvertible Watermarking},
  booktitle    = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  pages        = {218--231},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31805-7\_19},
  doi          = {10.1007/978-3-540-31805-7\_19},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhaoDF04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhuW04,
  author       = {Xinshan Zhu and
                  Yangsheng Wang},
  editor       = {Ingemar J. Cox and
                  Ton Kalker and
                  Heung{-}Kyu Lee},
  title        = {Better Use of Human Visual Model in Watermarking Based on Linear Prediction
                  Synthesis Filter},
  booktitle    = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
                  SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3304},
  pages        = {66--76},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31805-7\_6},
  doi          = {10.1007/978-3-540-31805-7\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhuW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2003,
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b95658},
  doi          = {10.1007/B95658},
  isbn         = {3-540-21061-X},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Abdel-AzizC03,
  author       = {Bassem Abdel{-}Aziz and
                  Jean{-}Yves Chouinard},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {On Perceptual Quality of Watermarked Images - An Experimental Approach},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {277--288},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_21},
  doi          = {10.1007/978-3-540-24624-4\_21},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Abdel-AzizC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/AdelsbachKS03,
  author       = {Andr{\'{e}} Adelsbach and
                  Stefan Katzenbeisser and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {On the Insecurity of Non-invertible Watermarking Schemes for Dispute
                  Resolving},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {355--369},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_27},
  doi          = {10.1007/978-3-540-24624-4\_27},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/AdelsbachKS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/AwrangjebK03,
  author       = {Mohammad Awrangjeb and
                  Mohan S. Kankanhalli},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Lossless Watermarking Considering the Human Visual System},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {581--592},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_47},
  doi          = {10.1007/978-3-540-24624-4\_47},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/AwrangjebK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChandramouliKM03,
  author       = {Rajarathnam Chandramouli and
                  Mehdi Kharrazi and
                  Nasir D. Memon},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Image Steganography and Steganalysis: Concepts and Practice},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {35--49},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_3},
  doi          = {10.1007/978-3-540-24624-4\_3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChandramouliKM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChangJLY03,
  author       = {Kisik Chang and
                  Changho Jung and
                  Sangjin Lee and
                  Wooil Yang},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {High Quality Perceptual Steganographic Techniques},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {518--531},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_42},
  doi          = {10.1007/978-3-540-24624-4\_42},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChangJLY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChiangCHC03,
  author       = {Yuei{-}Lin Chiang and
                  Lu{-}Ping Chang and
                  Wen{-}Tai Hsieh and
                  Wen{-}Chih Chen},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Natural Language Watermarking Using Semantic Substitution for Chinese
                  Text},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {129--140},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_10},
  doi          = {10.1007/978-3-540-24624-4\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChiangCHC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChoPHCJ03,
  author       = {Jae{-}Won Cho and
                  Ha{-}Joong Park and
                  Young Huh and
                  Hyun{-}Yeol Chung and
                  Ho{-}Youl Jung},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Echo Watermarking in Sub-band Domain},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {447--455},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_35},
  doi          = {10.1007/978-3-540-24624-4\_35},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChoPHCJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChooK03,
  author       = {Hyon{-}Gon Choo and
                  Whoi{-}Yul Kim},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Data-Hiding Capacity Improvement for Text Watermarking Using Space
                  Coding Method},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {593--599},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_48},
  doi          = {10.1007/978-3-540-24624-4\_48},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChooK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChunH03,
  author       = {In{-}Gook Chun and
                  Sangho Ha},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {A Robust Printed Image Watermarking Based on Iterative Halftoning
                  Method},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {200--211},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_15},
  doi          = {10.1007/978-3-540-24624-4\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChunH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ComesanaPB03,
  author       = {Pedro Comesa{\~{n}}a and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  F{\'{e}}lix Balado},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Optimal Data-Hiding Strategies for Games with {BER} Payoffs},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {101--116},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_8},
  doi          = {10.1007/978-3-540-24624-4\_8},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ComesanaPB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/CvejicS03,
  author       = {Nedeljko Cvejic and
                  Tapio Sepp{\"{a}}nen},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Increasing Robustness of an Improved Spread Spectrum Audio Watermarking
                  Method Using Attack Characterization},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {467--473},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_37},
  doi          = {10.1007/978-3-540-24624-4\_37},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/CvejicS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/DoerrD03,
  author       = {Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Jean{-}Luc Dugelay},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Secure Video Watermarking via Embedding Strength Modulation},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {340--354},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_26},
  doi          = {10.1007/978-3-540-24624-4\_26},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/DoerrD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/EchizenYFT03,
  author       = {Isao Echizen and
                  Hiroshi Yoshiura and
                  Yasuhiro Fujii and
                  Satoru Tezuka},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Use of Motion Estimation to Improve Video Watermarking for {MPEG}
                  Encoders},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {184--199},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_14},
  doi          = {10.1007/978-3-540-24624-4\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/EchizenYFT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HanCP03,
  author       = {Sang{-}Jin Han and
                  In Su Chang and
                  Rae{-}Hong Park},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Semi-fragile Watermarking for Tamper Proofing and Authentication of
                  Still Images},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {328--339},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_25},
  doi          = {10.1007/978-3-540-24624-4\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HanCP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HienNC03,
  author       = {Thai Duy Hien and
                  Zensho Nakao and
                  Yen{-}Wei Chen},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {A Robust Logo Multiresolution Watermarking Based on Independent Component
                  Analysis Extraction},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {408--422},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_32},
  doi          = {10.1007/978-3-540-24624-4\_32},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/HienNC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuHKC03,
  author       = {Yongjian Hu and
                  Jiwu Huang and
                  Sam Kwong and
                  Yiu{-}Keung Chan},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Image Fusion Based Visible Watermarking Using Dual-Tree Complex Wavelet
                  Transform},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {86--100},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_7},
  doi          = {10.1007/978-3-540-24624-4\_7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuHKC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HwangKHKK03,
  author       = {Won Young Hwang and
                  Hwan Il Kang and
                  Seung{-}Soo Han and
                  Kab Il Kim and
                  Hwan Soo Kang},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Robust Audio Watermarking Using Both {DWT} and Masking Effect},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {382--389},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_29},
  doi          = {10.1007/978-3-540-24624-4\_29},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HwangKHKK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/JangMHK03,
  author       = {Bong{-}Ju Jang and
                  Kwang{-}Seok Moon and
                  Young Huh and
                  Ki{-}Ryong Kwon},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {A New Digital Watermarking for Architectural Design Drawing Using
                  LINEs and ARCs Based on Vertex},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {544--557},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_44},
  doi          = {10.1007/978-3-540-24624-4\_44},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/JangMHK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/JeonLH03,
  author       = {Jeonghee Jeon and
                  Sang{-}Kwang Lee and
                  Yo{-}Sung Ho},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {A Three-Dimensional Watermarking Algorithm Using the {DCT} Transform
                  of Triangle Strips},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {508--517},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_41},
  doi          = {10.1007/978-3-540-24624-4\_41},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/JeonLH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/JungKR03,
  author       = {Yong Ju Jung and
                  Ho Kyung Kang and
                  Yong Man Ro},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Metadata Hiding for Content Adaptation},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {435--446},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_34},
  doi          = {10.1007/978-3-540-24624-4\_34},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/JungKR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KangHSZ03,
  author       = {Xiangui Kang and
                  Jiwu Huang and
                  Yun Q. Shi and
                  Jianxiang Zhu},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Robust Watermarking with Adaptive Receiving},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {396--407},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_31},
  doi          = {10.1007/978-3-540-24624-4\_31},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KangHSZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Katzenbeisser03,
  author       = {Stefan Katzenbeisser},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {On the Integration of Watermarks and Cryptography},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {50--60},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_4},
  doi          = {10.1007/978-3-540-24624-4\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Katzenbeisser03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KimCP03,
  author       = {Bum{-}Soo Kim and
                  Jae{-}Gark Choi and
                  Kil{-}Houm Park},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {RST-Resistant Image Watermarking Using Invariant Centroid and Reordered
                  Fourier-Mellin Transform},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {370--381},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_28},
  doi          = {10.1007/978-3-540-24624-4\_28},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KimCP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KimK03,
  author       = {Hyungshin Kim and
                  B. V. K. Vijaya Kumar},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Rotation-Tolerant Watermark Detection Using Circular Harmonic Function
                  Correlation Filter},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {263--276},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_20},
  doi          = {10.1007/978-3-540-24624-4\_20},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/KimK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KimKB03,
  author       = {Siho Kim and
                  Hong{-}Seok Kwon and
                  Keun{-}Sung Bae},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Modification of Polar Echo Kernel for Performance Improvement of Audio
                  Watermarking},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {456--466},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_36},
  doi          = {10.1007/978-3-540-24624-4\_36},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KimKB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KimR03,
  author       = {Ki Hyun Kim and
                  Yong Man Ro},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Enhancement Methods of Image Quality in Screen Mark Attack},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {474--482},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_38},
  doi          = {10.1007/978-3-540-24624-4\_38},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KimR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KukK03,
  author       = {Hyojeong Kuk and
                  Yong Cheol Kim},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Performance Analysis of Order Statistical Patchwork},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {247--262},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_19},
  doi          = {10.1007/978-3-540-24624-4\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KukK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KuribayashiT03,
  author       = {Minoru Kuribayashi and
                  Hatsukazu Tanaka},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {A Watermarking Scheme Applicable for Fingerprinting Protocol},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {532--543},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_43},
  doi          = {10.1007/978-3-540-24624-4\_43},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KuribayashiT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KwonPLT03,
  author       = {Ki{-}Ryong Kwon and
                  Ji{-}Hwan Park and
                  Eung{-}Joo Lee and
                  Ahmed H. Tewfik},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Highly Reliable Stochastic Perceptual Watermarking Model Based on
                  Multiwavelet Transform},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {423--434},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_33},
  doi          = {10.1007/978-3-540-24624-4\_33},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KwonPLT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LeeCKHK03,
  author       = {Si{-}Woong Lee and
                  Jae{-}Gark Choi and
                  Hyun Soo Kang and
                  Jin Woo Hong and
                  Hyoung Joong Kim},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Normalization Domain Watermarking Method Based on Pattern Extraction},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {390--395},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_30},
  doi          = {10.1007/978-3-540-24624-4\_30},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LeeCKHK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LeeJL03,
  author       = {Young{-}Yoon Lee and
                  Han{-}Seung Jung and
                  Sang Uk Lee},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Multi-bit Video Watermarking Based on 3D {DFT} Using Perceptual Models},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {301--315},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_23},
  doi          = {10.1007/978-3-540-24624-4\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LeeJL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LeeKKM03,
  author       = {Kiryung Lee and
                  Dong Sik Kim and
                  Taejeong Kim and
                  Kyung{-}Ae Moon},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {{EM} Estimation of Scale Factor for Quantization-Based Audio Watermarking},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {316--327},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_24},
  doi          = {10.1007/978-3-540-24624-4\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LeeKKM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiA03,
  author       = {Wei Li and
                  Xiangyang Xue},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Audio Watermarking Based on Music Content Analysis: Robust against
                  Time Scale Modification},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {289--300},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_22},
  doi          = {10.1007/978-3-540-24624-4\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiC03,
  author       = {Qiming Li and
                  Ee{-}Chien Chang},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Public Watermark Detection Using Multiple Proxies and Secret Sharing},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {558--569},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_45},
  doi          = {10.1007/978-3-540-24624-4\_45},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiKCXZZ03,
  author       = {Zhang Li and
                  Sam Kwong and
                  Marian Choy and
                  Wei{-}wei Xiao and
                  Ji Zhen and
                  Ji{-}hong Zhang},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {An Intelligent Watermark Detection Decoder Based on Independent Component
                  Analysis},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {223--234},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_17},
  doi          = {10.1007/978-3-540-24624-4\_17},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiKCXZZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LinLLL03,
  author       = {Hsueh{-}Yi Sean Lin and
                  Hong{-}Yuan Mark Liao and
                  Chun{-}Shien Lu and
                  Ja{-}Chen Lin},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Authentication of 3-D Polygonal Meshes},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {168--183},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_13},
  doi          = {10.1007/978-3-540-24624-4\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LinLLL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LuH03,
  author       = {Chun{-}Shien Lu and
                  Chao{-}Yong Hsu},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Content-Dependent Anti-disclosure Image Watermark},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {61--76},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_5},
  doi          = {10.1007/978-3-540-24624-4\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LuH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Perez-Gonzalez03,
  author       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {The Importance of Aliasing in Structured Quantization Index Modulation
                  Data Hiding},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_1},
  doi          = {10.1007/978-3-540-24624-4\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Perez-Gonzalez03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/PiperSM03,
  author       = {Angela Piper and
                  Reihaneh Safavi{-}Naini and
                  Alfred Mertins},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Coefficient Selection Methods for Scalable Spread Spectrum Watermarking},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {235--246},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_18},
  doi          = {10.1007/978-3-540-24624-4\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/PiperSM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Sallee03,
  author       = {Phil Sallee},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Model-Based Steganography},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {154--167},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_12},
  doi          = {10.1007/978-3-540-24624-4\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Sallee03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ScealySS03,
  author       = {Robert Scealy and
                  Reihaneh Safavi{-}Naini and
                  Nicholas Paul Sheppard},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Performance Measurement of Watermark Embedding Patterns},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {77--85},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_6},
  doi          = {10.1007/978-3-540-24624-4\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ScealySS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SionAP03,
  author       = {Radu Sion and
                  Mikhail J. Atallah and
                  Sunil Prabhakar},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Resilient Information Hiding for Abstract Semi-structures},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {141--153},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_11},
  doi          = {10.1007/978-3-540-24624-4\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SionAP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ThenW03,
  author       = {Patrick Hang Hui Then and
                  Wang Yin Chai},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Towards Generic Detection Scheme in Zero Knowledge Protocol for Blind
                  Watermark Detection},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {570--580},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_46},
  doi          = {10.1007/978-3-540-24624-4\_46},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ThenW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangDTW03,
  author       = {Jinshen Wang and
                  Yuewei Dai and
                  Stefan Thiemert and
                  Zhiquan Wang},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {A Feature-Watermarking Scheme for {JPEG} Image Authentication},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {212--222},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_16},
  doi          = {10.1007/978-3-540-24624-4\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangDTW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WuHL03,
  author       = {Mei{-}Yi Wu and
                  Yu{-}Kun Ho and
                  Jia{-}Hong Lee},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {A Method to Improve the Stego-Image Quality for Palette-Based Image
                  Steganography},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {483--496},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_39},
  doi          = {10.1007/978-3-540-24624-4\_39},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WuHL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YiLKH03,
  author       = {Yu Yi and
                  Moon Ho Lee and
                  Ji Hyun Kim and
                  Gi Yean Hwang},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Robust Wavelet-Based Information Hiding through Low-Density Parity-Check
                  {(LDPC)} Codes},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {117--128},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_9},
  doi          = {10.1007/978-3-540-24624-4\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YiLKH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YuHLOLP03,
  author       = {Jeong Jae Yu and
                  Jae Won Han and
                  Kwang Su Lee and
                  Seung Cheol O and
                  Sangjin Lee and
                  Il Hwan Park},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {A Secure Steganographic Scheme against Statistical Analyses},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {497--507},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_40},
  doi          = {10.1007/978-3-540-24624-4\_40},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YuHLOLP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2002,
  editor       = {Fabien A. P. Petitcolas and
                  Hyoung Joong Kim},
  title        = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul,
                  Korea, November 21-22, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2613},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36617-2},
  doi          = {10.1007/3-540-36617-2},
  isbn         = {3-540-01217-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ByunLTA02,
  author       = {Sung{-}Cheal Byun and
                  Sang{-}Kwang Lee and
                  Ahmed H. Tewfik and
                  Byung{-}Ha Ahn},
  editor       = {Fabien A. P. Petitcolas and
                  Hyoung Joong Kim},
  title        = {A SVD-Based Fragile Watermarking Scheme for Image Authentication},
  booktitle    = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul,
                  Korea, November 21-22, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2613},
  pages        = {170--178},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36617-2\_14},
  doi          = {10.1007/3-540-36617-2\_14},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ByunLTA02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/CharbonT02,
  author       = {Edoardo Charbon and
                  Ilhami Torunoglu},
  editor       = {Fabien A. P. Petitcolas and
                  Hyoung Joong Kim},
  title        = {Watermarking Techniques for Electronic Circuit Design},
  booktitle    = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul,
                  Korea, November 21-22, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2613},
  pages        = {147--169},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36617-2\_13},
  doi          = {10.1007/3-540-36617-2\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/CharbonT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/FengI02,
  author       = {Yi Feng and
                  Ebroul Izquierdo},
  editor       = {Fabien A. P. Petitcolas and
                  Hyoung Joong Kim},
  title        = {Robust Local Watermarking on Salient Image Areas},
  booktitle    = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul,
                  Korea, November 21-22, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2613},
  pages        = {189--201},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36617-2\_16},
  doi          = {10.1007/3-540-36617-2\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/FengI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/FlesiaD02,
  author       = {Ana Georgina Flesia and
                  David L. Donoho},
  editor       = {Fabien A. P. Petitcolas and
                  Hyoung Joong Kim},
  title        = {Implications for Image Watermarking of Recent Work in Image Analysis
                  and Representation},
  booktitle    = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul,
                  Korea, November 21-22, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2613},
  pages        = {113--129},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36617-2\_11},
  doi          = {10.1007/3-540-36617-2\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/FlesiaD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuHHS02,
  author       = {Junquan Hu and
                  Jiwu Huang and
                  Daren Huang and
                  Yun Q. Shi},
  editor       = {Fabien A. P. Petitcolas and
                  Hyoung Joong Kim},
  title        = {A DWT-Based Fragile Watermarking Tolerant of {JPEG} Compression},
  booktitle    = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul,
                  Korea, November 21-22, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2613},
  pages        = {179--188},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36617-2\_15},
  doi          = {10.1007/3-540-36617-2\_15},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuHHS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuKC02,
  author       = {Yongjian Hu and
                  Sam Kwong and
                  Yiu{-}Keung Chan},
  editor       = {Fabien A. P. Petitcolas and
                  Hyoung Joong Kim},
  title        = {The Design and Application of DWT-Domain Optimum Decoders},
  booktitle    = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul,
                  Korea, November 21-22, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2613},
  pages        = {22--30},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36617-2\_3},
  doi          = {10.1007/3-540-36617-2\_3},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuKC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/JungHR02,
  author       = {Yong Ju Jung and
                  Minsoo Hahn and
                  Yong Man Ro},
  editor       = {Fabien A. P. Petitcolas and
                  Hyoung Joong Kim},
  title        = {Spatial Frequency Band Division in Human Visual System Based-Watermarking},
  booktitle    = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul,
                  Korea, November 21-22, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2613},
  pages        = {224--234},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36617-2\_19},
  doi          = {10.1007/3-540-36617-2\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/JungHR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KangHK02,
  author       = {Hyun Soo Kang and
                  Jinwoo Hong and
                  Kwang Yong Kim},
  editor       = {Fabien A. P. Petitcolas and
                  Hyoung Joong Kim},
  title        = {Enhanced Watermarking Scheme Based on Removal of Local Means},
  booktitle    = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul,
                  Korea, November 21-22, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2613},
  pages        = {31--39},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36617-2\_4},
  doi          = {10.1007/3-540-36617-2\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KangHK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KangHS02,
  author       = {Xiangui Kang and
                  Jiwu Huang and
                  Yun Q. Shi},
  editor       = {Fabien A. P. Petitcolas and
                  Hyoung Joong Kim},
  title        = {An Image Watermarking Algorithm Robust to Geometric Distortion},
  booktitle    = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul,
                  Korea, November 21-22, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2613},
  pages        = {212--223},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36617-2\_18},
  doi          = {10.1007/3-540-36617-2\_18},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KangHS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KimC02,
  author       = {Yong C. Kim and
                  Byeong C. Choi},
  editor       = {Fabien A. P. Petitcolas and
                  Hyoung Joong Kim},
  title        = {Two-Step Detection Algorithm in a HVS-Based Blind Watermarking of
                  Still Images},
  booktitle    = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul,
                  Korea, November 21-22, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2613},
  pages        = {235--248},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36617-2\_20},
  doi          = {10.1007/3-540-36617-2\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KimC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KimCP02,
  author       = {Bum{-}Soo Kim and
                  Jae{-}Gark Choi and
                  Kil{-}Houm Park},
  editor       = {Fabien A. P. Petitcolas and
                  Hyoung Joong Kim},
  title        = {Image Normalization Using Invariant Centroid for {RST} Invariant Digital
                  Image Watermarking},
  booktitle    = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul,
                  Korea, November 21-22, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2613},
  pages        = {202--211},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36617-2\_17},
  doi          = {10.1007/3-540-36617-2\_17},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KimCP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KwonKNT02,
  author       = {Ki{-}Ryong Kwon and
                  Seong Geun Kwon and
                  Jeho Nam and
                  Ahmed H. Tewfik},
  editor       = {Fabien A. P. Petitcolas and
                  Hyoung Joong Kim},
  title        = {Content Adaptive Watermark Embedding in the Multiwavelet Transform
                  Using a Stochastic Image Model},
  booktitle    = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul,
                  Korea, November 21-22, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2613},
  pages        = {249--263},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36617-2\_21},
  doi          = {10.1007/3-540-36617-2\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KwonKNT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/MillerDC02,
  author       = {Matthew L. Miller and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Ingemar J. Cox},
  editor       = {Fabien A. P. Petitcolas and
                  Hyoung Joong Kim},
  title        = {Informed Embedding for Multi-bit Watermarks},
  booktitle    = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul,
                  Korea, November 21-22, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2613},
  pages        = {13--21},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36617-2\_2},
  doi          = {10.1007/3-540-36617-2\_2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/MillerDC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Moulin02,
  author       = {Pierre Moulin},
  editor       = {Fabien A. P. Petitcolas and
                  Hyoung Joong Kim},
  title        = {Information-Hiding Games},
  booktitle    = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul,
                  Korea, November 21-22, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2613},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36617-2\_1},
  doi          = {10.1007/3-540-36617-2\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Moulin02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/PanWJI02,
  author       = {Jeng{-}Shyang Pan and
                  Feng{-}Hsing Wang and
                  Lakhmi C. Jain and
                  Nikhil Ichalkaranje},
  editor       = {Fabien A. P. Petitcolas and
                  Hyoung Joong Kim},
  title        = {A Multistage {VQ} Based Watermarking Technique with Fake Watermarks},
  booktitle    = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul,
                  Korea, November 21-22, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2613},
  pages        = {81--90},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36617-2\_8},
  doi          = {10.1007/3-540-36617-2\_8},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/PanWJI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/PranataGC02,
  author       = {Sugiri Pranata and
                  Yong Liang Guan and
                  Hock Chuan Chua},
  editor       = {Fabien A. P. Petitcolas and
                  Hyoung Joong Kim},
  title        = {{BER} Formulation for the Blind Retrieval of {MPEG} Video Watermark},
  booktitle    = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul,
                  Korea, November 21-22, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2613},
  pages        = {91--104},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36617-2\_9},
  doi          = {10.1007/3-540-36617-2\_9},
  timestamp    = {Mon, 07 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/PranataGC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ShaoWL02,
  author       = {Yafei Shao and
                  Guowei Wu and
                  Xinggang Lin},
  editor       = {Fabien A. P. Petitcolas and
                  Hyoung Joong Kim},
  title        = {Optimal Detection of Transform Domain Additive Watermark by Using
                  Low Density Diversity},
  booktitle    = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul,
                  Korea, November 21-22, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2613},
  pages        = {105--112},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36617-2\_10},
  doi          = {10.1007/3-540-36617-2\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ShaoWL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/SionAP02,
  author       = {Radu Sion and
                  Mikhail J. Atallah and
                  Sunil Prabhakar},
  editor       = {Fabien A. P. Petitcolas and
                  Hyoung Joong Kim},
  title        = {On Watermarking Numeric Sets},
  booktitle    = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul,
                  Korea, November 21-22, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2613},
  pages        = {130--146},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36617-2\_12},
  doi          = {10.1007/3-540-36617-2\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/SionAP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WahadaniahGC02,
  author       = {Viktor Wahadaniah and
                  Yong Liang Guan and
                  Hock Chuan Chua},
  editor       = {Fabien A. P. Petitcolas and
                  Hyoung Joong Kim},
  title        = {A New Collusion Attack and Its Performance Evaluation},
  booktitle    = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul,
                  Korea, November 21-22, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2613},
  pages        = {64--80},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36617-2\_7},
  doi          = {10.1007/3-540-36617-2\_7},
  timestamp    = {Mon, 07 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WahadaniahGC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangJP02,
  author       = {Feng{-}Hsing Wang and
                  Lakhmi C. Jain and
                  Jeng{-}Shyang Pan},
  editor       = {Fabien A. P. Petitcolas and
                  Hyoung Joong Kim},
  title        = {A Multi-user Based Watermarking System with Two-Security-Level Keys},
  booktitle    = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul,
                  Korea, November 21-22, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2613},
  pages        = {40--50},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36617-2\_5},
  doi          = {10.1007/3-540-36617-2\_5},
  timestamp    = {Mon, 06 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangJP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YuS02,
  author       = {Dan Yu and
                  Farook Sattar},
  editor       = {Fabien A. P. Petitcolas and
                  Hyoung Joong Kim},
  title        = {A New Blind Watermarking Technique Based on Independent Component
                  Analysis},
  booktitle    = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul,
                  Korea, November 21-22, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2613},
  pages        = {51--63},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36617-2\_6},
  doi          = {10.1007/3-540-36617-2\_6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YuS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}