default search action
10. IWDW 2011: Atlantic City, NJ, USA
- Yun-Qing Shi, Hyoung-Joong Kim, Fernando Pérez-González:
Digital Forensics and Watermarking - 10th International Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7128, Springer 2012, ISBN 978-3-642-32204-4
Invited Lectures (Abstracts)
- Jessica J. Fridrich:
Modern Trends in Steganography and Steganalysis. 1 - Nasir D. Memon:
Photo Forensics - There Is More to a Picture than Meets the Eye. 2
Session 1: Steganography and Steganalysis
- Vasiliy Sachnev, Hyoung Joong Kim:
An Improved Matrix Encoding Scheme for JPEG Steganography. 3-15 - Shunquan Tan:
Steganalysis of LSB Matching Revisited for Consecutive Pixels Using B-Spline Functions. 16-29
Session 2: Watermarking
- Xinghao Jiang, Tanfeng Sun, Yue Zhou, Yun Q. Shi:
A Drift Compensation Algorithm for H.264/AVC Video Robust Watermarking Scheme. 30-41 - Junxiang Wang, Jiangqun Ni, Jinwei Pan:
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding. 42-56 - Kazuo Ohzeki, Yuanyu Wei, Yutaka Hirakawa, Kiyotsugu Sato:
A New Watermarking Method with Obfuscated Quasi-Chirp Transform. 57-71 - Hui Wang, Anthony T. S. Ho, Xi Zhao:
A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression. 72-85 - Bai Ying Lei, Ing Yann Soon, Zhen Li:
A Robust Audio Watermarking Scheme Based on Lifting Wavelet Transform and Singular Value Decomposition. 86-96 - Alper Koz, Claude Delpha:
Adaptive Selection of Embedding Locations for Spread Spectrum Watermarking of Compressed Audio. 97-110 - Takayuki Yamada, Seiichi Gohshi, Isao Echizen:
IR Hiding: Method to Prevent Re-recording Screen Image Built in Short Wavelength Pass Filter Detection Method Using Specular Reflection. 111-125 - Jong Yun Jun, Kunho Kim, Jae-Pil Heo, Sung-Eui Yoon:
IRIW: Image Retrieval Based Image Watermarking for Large-Scale Image Databases. 126-141 - Fan Chen, Hongjie He, Yaoran Huo, Hongxia Wang:
Self-recovery Fragile Watermarking Scheme with Variable Watermark Payload. 142-155 - Huawei Tian, Zheng Wang, Yao Zhao, Rongrong Ni, Lunming Qin:
Spread Spectrum-Based Multi-bit Watermarking for Free-View Video. 156-166 - Hongmei Liu, Lei Li, Jian Li, Jiwu Huang:
Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates. 167-180 - Takaaki Yamada, Yoshiyasu Takahashi:
Use of "Emergable Watermarks" as Copy Indicators for Securing Video Content. 181-195
Session 3: Visual Cryptography
- Jonathan Weir, WeiQi Yan:
Authenticating Visual Cryptography Shares Using 2D Barcodes. 196-210 - Feng Liu, Teng Guo, Chuan Kun Wu, Ching-Nung Yang:
Flexible Visual Cryptography Scheme without Distortion. 211-227 - Yasushi Yamaguchi:
An Extended Visual Cryptography Scheme for Continuous-Tone Images. 228-242
Session 4: Forensics
- Xudong Zhao, Shilin Wang, Shenghong Li, Jianhua Li:
A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection. 243-256 - Lin-Na Zhou, Yunbiao Guo, Xingang You:
Blind Copy-Paste Detection Using Improved SIFT Ring Descriptor. 257-267 - Shang Gao, Guanshuo Xu, Ruimin Hu:
Camera Model Identification Based on the Characteristic of CFA and Interpolation. 268-280 - Dae-Jin Jung, Dai-Kyung Hyun, Seung-Jin Ryu, Ji Won Lee, Hae-Yeoun Lee, Heung-Kyu Lee:
Detecting Re-captured Videos Using Shot-Based Photo Response Non-Uniformity. 281-291 - Rong Zhang, Rangding Wang, Tian-Tsong Ng:
Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image Edges. 292-305 - David Vazquez-Padin, Fernando Pérez-González:
Exposing Original and Duplicated Regions Using SIFT Features and Resampling Traces. 306-320 - Ronny Merkel, Christian Kraetzer, Robert Altschaffel, Eric Clausing, Maik Schott, Jana Dittmann:
Fingerprint Forensics Application Protocol: Semi-automated Modeling and Verification of Watermark-Based Communication Using CASPER and FDR. 321-335 - Philip Bateman, Anthony T. S. Ho, Johann A. Briffa:
Image Forensics of High Dynamic Range Imaging. 336-348 - Zhongwei He, Wei Lu, Wei Sun:
Improved Run Length Based Detection of Digital Image Splicing. 349-360 - Chenglong Chen, Jiangqun Ni:
Median Filtering Detection Using Edge Based Prediction Matrix. 361-375 - Luyi Chen, Shilin Wang, Shenghong Li, Jianhua Li:
New Feature Presentation of Transition Probability Matrix for Image Tampering Detection. 376-386 - Hieu Cuong Nguyen, Stefan Katzenbeisser:
Performance and Robustness Analysis for Some Re-sampling Detection Techniques in Digital Images. 387-397
Session 5: Anti-Forensics
- Chun Wing Kwok, Oscar C. Au, Sung Him Chui:
Alternative Anti-Forensics Method for Contrast Enhancement. 398-410 - Patchara Sutthiwan, Yun Q. Shi:
Anti-Forensics of Double JPEG Compression Detection. 411-424
Session 6: Fingerprinting, Privacy, Security
- Xiaofeng Wang, Zhen Li, Xiaoni Zhang, Shangping Wang, Jing Chen:
(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images. 425-438 - Sebastian Schrittwieser, Peter Kieseberg, Isao Echizen, Sven Wohlgemuth, Noboru Sonehara, Edgar R. Weippl:
An Algorithm for k-Anonymity-Based Fingerprinting. 439-452 - Hosik Sohn, Dohyoung Lee, Wesley De Neve, Konstantinos N. Plataniotis, Yong Man Ro:
Contribution of Non-scrambled Chroma Information in Privacy-Protected Face Images to Privacy Leakage. 453-467 - Fang Liu, Lee-Ming Cheng:
Perceptual Image Hashing via Wave Atom Transform. 468-478 - Pedro Comesaña, Fernando Pérez-González, Chaouki T. Abdallah:
Witsenhausen's Counterexample and Its Links with Multimedia Security Problems. 479-493 - Giovanni Di Crescenzo, Gonzalo R. Arce:
Data Forensics Constructions from Cryptographic Hashing and Coding. 494-509
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.