default search action
12. IWDW 2013: Auckland, New Zealand
- Yun-Qing Shi, Hyoung-Joong Kim, Fernando Pérez-González:
Digital-Forensics and Watermarking - 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers. Lecture Notes in Computer Science 8389, Springer 2014, ISBN 978-3-662-43885-5
Steganography and Steganalysis
- Benjamin Johnson, Pascal Schöttle, Aron Laszka, Jens Grossklags, Rainer Böhme:
Bitspotting: Detecting Optimal Adaptive Steganography. 3-18 - Fangjun Huang, Yane Zhong, Jiwu Huang:
Improved Algorithm of Edge Adaptive Image Steganography Based on LSB Matching Revisited Algorithm. 19-31 - Hong Zhang, Qingxiao Guan, Xianfeng Zhao:
Steganography Based on Adaptive Pixel-Value Differencing Scheme Revisited. 32-47 - Licong Chen, Yun Q. Shi, Patchara Sutthiwan, Xinxin Niu:
Non-uniform Quantization in Breaking HUGO. 48-62 - Haibo Miao, Liusheng Huang, Yao Shen, Xiaorong Lu, Zhili Chen:
Steganalysis of Compressed Speech Based on Markov and Entropy. 63-76
Visual Cryptography
- Duanhao Ou, Xiaotian Wu, Lu Dai, Wei Sun:
Improved Tagged Visual Cryptograms by Using Random Grids. 79-94 - Ching-Nung Yang, Yi-Chin Lin, Chih-Cheng Wu:
Cheating Immune Block-Based Progressive Visual Cryptography. 95-108 - Zhengxin Fu, Bin Yu:
Visual Cryptography and Random Grids Schemes. 109-122 - Duanhao Ou, Xiaotian Wu, Lu Dai, Wei Sun:
Secret Sharing in Images Based on Error-Diffused Block Truncation Coding and Error Diffusion. 123-138
Reversible Data Hiding
- Dawen Xu, Rangding Wang, Yun-Qing Shi:
Reversible Data Hiding in Encrypted H.264/AVC Video Streams. 141-152 - Xuefeng Tong, Guorong Xuan, Guangce Shen, Xiaoli Huan, Yun-Qing Shi:
Using RZL Coding to Enhance Histogram-Pair Based Image Reversible Data Hiding. 153-166
Forensics
- Jianquan Yang, Guopu Zhu, Junlong Wang, Yun-Qing Shi:
Detecting Non-aligned Double JPEG Compression Based on Refined Intensity Difference and Calibration. 169-179 - Feng Ding, Guopu Zhu, Yun-Qing Shi:
A Novel Method for Detecting Image Sharpening Based on Local Binary Pattern. 180-191 - Hui Zeng, Xiangui Kang:
Camera Source Identification Game with Incomplete Information. 192-204 - Anh-Tu Hoang, Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Isao Echizen:
Detecting Traitors in Re-publishing Updated Datasets. 205-220 - Chao Shen, Zhongmin Cai, Roy A. Maxion, Xiaohong Guan:
On User Interaction Behavior as Evidence for Computer Forensic Analysis. 221-231 - Jiehao Chen, Chenglong Chen, Jiangqun Ni:
Effective Video Copy Detection Using Statistics of Quantized Zernike Moments. 232-243 - Wan Wang, Xinghao Jiang, Shilin Wang, Meng Wan, Tanfeng Sun:
Identifying Video Forgery Process Using Optical Flow. 244-257 - Pengfei Ma, Rangding Wang, Diqun Yan, Chao Jin:
A Huffman Table Index Based Approach to Detect Double MP3 Compression. 258-271
Poster Session
- Akira Nishimura:
Reversible and Robust Audio Watermarking Based on Quantization Index Modulation and Amplitude Expansion. 275-287 - Agustín Moreno Cañadas, Nelly Paola Palma Vanegas, Margoth Hernández Quitián:
Visual Cryptography Schemes Based in k -Linear Maps. 288-302 - Shang Gao, Cong Zhang, Chanle Wu, Gang Ye, Lei Huang:
A Hybrid Feature Based Method for Distinguishing Computer Graphics and Photo-Graphic Image. 303-313 - Xudong Zhao, Shilin Wang, Shenghong Li, Jianhua Li, Xiang Lin:
A Distributed Scheme for Image Splicing Detection. 314-325 - Jian Li, Xiaolong Li, Xingming Sun:
A New Reversible Data Hiding Scheme Based on Efficient Prediction. 326-336 - Min-Jen Tsai, Jung Liu, Jin-Sheng Yin, Imam Yuadi:
Digital Forensics of Printed Source Identification for Chinese Characters. 337-361 - Shenchuan Liu, Masaaki Fujiyoshi, Hitoshi Kiya:
A Cheat-Prevention Visual Secret Sharing Scheme with Minimum Pixel Expansion. 362-375 - Xuping Huang, Nobutaka Ono, Isao Echizen, Akira Nishimura:
Reversible Audio Information Hiding Based on Integer DCT Coefficients with Adaptive Hiding Locations. 376-389
Watermarking
- Yaoran Huo, Hongjie He, Fan Chen:
A Restorable Semi-fragile Watermarking Combined DCT with Interpolation. 393-408 - Claude Delpha, Said Hijazi, Rémy Boyer:
A Compressive Sensing Based Quantized Watermarking Scheme with Statistical Transparency Constraint. 409-422 - Hongxia Wang, Linna Zhou, Wei Zhang, Shuang Liu:
Watermarking-Based Perceptual Hashing Search Over Encrypted Speech. 423-434
Anonymizing and Plate Recognition
- Hoang-Quoc Nguyen-Son, Anh-Tu Hoang, Minh-Triet Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen:
Anonymizing Temporal Phrases in Natural Language Text to be Posted on Social Networking Services. 437-451 - Hyun-seok Min, Seung-Ho Lee, Wesley De Neve, Yong Man Ro:
Improved License Plate Recognition for Low-Resolution CCTV Forensics by Integrating Sparse Representation-Based Super-Resolution. 452-462
Poster Session
- Yuanfang Guo, Oscar C. Au, Ketan Tang, Jiahao Pang:
Hiding a Secret Pattern into Color Halftone Images. 465-474 - Qunting Yang, Tiegang Gao:
An Image Authentication Scheme for Accurate Localization and Restoration. 475-487 - Masaaki Fujiyoshi:
Generalized Histogram Shifting-Based Blind Reversible Data Hiding with Balanced and Guarded Double Side Modification. 488-502 - Zhangjie Fu, Xingming Sun, Lu Zhou, Jiangang Shu:
New Forensic Methods for OOXML Format Documents. 503-513 - Bingwen Feng, Wei Lu, Wei Sun:
High Capacity Data Hiding Scheme for Binary Images Based on Minimizing Flipping Distortion. 514-528
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.