default search action
22nd IWDW 2023: Jinan, China
- Bin Ma, Jian Li, Qi Li:
Digital Forensics and Watermarking - 22nd International Workshop, IWDW 2023, Jinan, China, November 25-26, 2023, Revised Selected Papers. Lecture Notes in Computer Science 14511, Springer 2024, ISBN 978-981-97-2584-7
Digital Forensics and Security
- Yongjin Xian, Ruihe Ma, Pengyu Liu, Linna Zhou:
Image Encryption Scheme Based on New 1D Chaotic System and Blockchain. 3-17 - Jian Li, Huanhuan Zhao, Bin Ma, Chunpeng Wang, Xiaoming Wu, Tao Zuo, Zhengzhong Zhao:
High-Quality PRNU Anonymous Algorithm for JPEG Images. 18-32 - Johannes Schuiki, Christof Kauba, Heinz Hofbauer, Andreas Uhl:
Limiting Factors in Smartphone-Based Cross-Sensor Microstructure Material Classification. 33-47 - Erjin Bao, Ching-Chun Chang, Huy H. Nguyen, Isao Echizen:
From Deconstruction to Reconstruction: A Plug-In Module for Diffusion-Based Purification of Adversarial Examples. 48-62 - Donger Mo, Peijia Zheng, Yufei Zhou, Jingyi Chen, Shan Huang, Weiqi Luo, Wei Lu, Chunfang Yang:
Privacy-Preserving Image Scaling Using Bicubic Interpolation and Homomorphic Encryption. 63-78 - Xiaoling He, Yuanding Zhou, Chuan Qin, Zhenxing Qian, Xinpeng Zhang:
PDMTT: A Plagiarism Detection Model Towards Multi-turn Text Back-Translation. 79-94 - Meihong Yang, Baolin Qi, Yongjin Xian, Jian Li:
An Image Perceptual Hashing Algorithm Based on Convolutional Neural Networks. 95-108 - Andreas Vorderleitner, Jutta Hämmerle-Uhl, Andreas Uhl:
Finger Vein Spoof GANs: Can We Supersede the Production of Presentation Attack Artefacts? 109-124 - Jinchuan Li, Xianfeng Zhao, Yun Cao:
Generalizable Deep Video Inpainting Detection Based on Constrained Convolutional Neural Networks. 125-138 - Fei Peng, Min Long:
3DPS: 3D Printing Signature for Authentication Based on Equipment Distortion Model. 139-150 - Jinkun Huang, Weiqi Luo, Wenmin Huang, Ziyi Xi, Kangkang Wei, Jiwu Huang:
Multi-Scale Enhanced Dual-Stream Network for Facial Attribute Editing Localization. 151-165
Data Hiding
- Yunfei Xie, Zichi Wang:
Neural Network Steganography Using Extractor Matching. 169-179 - Houchen Pu, Xiaowei Yi, Bowen Yang, Xianfeng Zhao, Changjun Liu:
Inversion Image Pairs for Anti-forensics in the Frequency Domain. 180-193 - Bin Ma, Haocheng Wang, Yongjin Xian, Chunpeng Wang, Guanxu Zhao:
Cross-channel Image Steganography Based on Generative Adversarial Network. 194-206 - Chunxin Zhao, Ruihe Ma, Yongjin Xian:
A Reversible Data Hiding Algorithm for JPEG Image Based on Paillier Homomorphic Encryption. 207-222 - Hongtao Duan, Ruihe Ma, Songkun Wang, Yongjin Xian, Chunpeng Wang, Guanxu Zhao:
Convolutional Neural Network Prediction Error Algorithm Based on Block Classification Enhanced. 223-232 - Yan Li, Zhuoran Zheng, Wenqi Ren, Yunfeng Nie, Jingang Zhang, Xiuyi Jia:
Dual-Domain Learning Network for Polyp Segmentation. 233-247 - Yue Wang, Zhanshan Wang, Xiaofeng Ma, Jing He:
Two-Round Private Set Intersection Mechanism and Algorithm Based on Blockchain. 248-261 - Chunpeng Wang, Long Chen, Zhiqiu Xia, Jian Li, Qi Li, Ziqi Wei, Changxu Wang, Bing Han:
Novel Quaternion Orthogonal Fourier-Mellin Moments Using Optimized Factorial Calculation. 262-276 - Zhuang Wang, Jinyi Xia, Kaibo Huang, Shengnan Guo, Chenwei Huang, Zhongliang Yang, Linna Zhou:
DNA Steganalysis Based on Multi-dimensional Feature Extraction and Fusion. 277-291 - Xuan Xu, Shengnan Guo, Zhengyang Fang, Pengcheng Zhou, Zhongliang Yang, Linna Zhou:
VStego800K: Large-Scale Steganalysis Dataset for Streaming Voice. 292-303 - Shengnan Guo, Xuekai Chen, Zhuang Wang, Zhongliang Yang, Linna Zhou:
Linguistic Steganalysis Based on Clustering and Ensemble Learning in Imbalanced Scenario. 304-318
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.