default search action
9. IWDW 2010: Seoul, Korea,
- Hyoung-Joong Kim, Yun-Qing Shi, Mauro Barni:
Digital Watermarking - 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6526, Springer 2011, ISBN 978-3-642-18404-8 - Yu Qian Zhao, Frank Y. Shih, Yun Q. Shi:
Passive Detection of Paint-Doctored JPEG Images. 1-11 - Xudong Zhao, Jianhua Li, Shenghong Li, Shilin Wang:
Detecting Digital Image Splicing in Chroma Spaces. 12-22 - Feng Pan, Jiwu Huang:
Discriminating Computer Graphics Images and Natural Images Using Hidden Markov Tree Model. 23-28 - Liang Zhao, Avishek Adhikari, Kouichi Sakurai:
A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane. 29-44 - Liang Zhao, Avishek Adhikari, Di Xiao, Kouichi Sakurai:
Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit. 45-59 - Jonathan Weir, WeiQi Yan:
Plane Transform Visual Cryptography. 60-74 - Gopal Narayanan, Yun-Qing Shi:
A Statistical Model for Quantized AC Block DCT Coefficients in JPEG Compression and its Application to Detecting Potential Compression History in Bitmap Images. 75-89 - Xinting Gao, Bo Qiu, JingJing Shen, Tian-Tsong Ng, Yun-Qing Shi:
A Smart Phone Image Database for Single Image Recapture Detection. 90-104 - Hong Cao, Alex C. Kot:
Detection of Tampering Inconsistencies on Mobile Photos. 105-119 - Wei Wang, Jing Dong, Tieniu Tan:
Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise. 120-133 - Shijun Xiang:
Robust Audio Watermarking by Using Low-Frequency Histogram. 134-147 - H. Y. Leung, Lee-Ming Cheng:
Robust Blind Watermarking Scheme Using Wave Atoms. 148-158 - Peter Meerwald, Andreas Uhl:
Robust Watermarking of H.264/SVC-Encoded Video: Quality and Resolution Scalability. 159-169 - Bo Ou, Yao Zhao, Rongrong Ni:
Reversible Watermarking Using Prediction Error Histogram and Blocking. 170-180 - Keming Dong, Hyoung-Joong Kim:
An Efficient Pattern Substitution Watermarking Method for Binary Images. 181-188 - Fangjun Huang, Yun-Qing Shi, Jiwu Huang:
New JPEG Steganographic Scheme with High Security Performance. 189-201 - Vasiliy Sachnev, Hyoung-Joong Kim:
Ternary Data Hiding Technique for JPEG Steganography. 202-210 - Xuping Zheng, Aixin Zhang, Shenghong Li, Bo Jin, Junhua Tang:
Interleaving Embedding Scheme for ECC-Based Multimedia Fingerprinting. 211-223 - Hefei Ling, Hui Feng, Fuhao Zou, WeiQi Yan, Zhengding Lu:
A Novel Collusion Attack Strategy for Digital Fingerprinting. 224-238 - Esla Timothy Anzaku, Hosik Sohn, Yong Man Ro:
Privacy Preserving Facial and Fingerprint Multi-biometric Authentication. 239-250 - Zhili Chen, Liusheng Huang, Peng Meng, Wei Yang, Haibo Miao:
Blind Linguistic Steganalysis against Translation Based Steganography. 251-265 - Qingxiao Guan, Jing Dong, Tieniu Tan:
Blind Quantitative Steganalysis Based on Feature Fusion and Gradient Boosting. 266-279 - Takayuki Yamada, Seiichi Gohshi, Isao Echizen:
IR Hiding: A Method to Prevent Video Re-shooting by Exploiting Differences between Human Perceptions and Recording Device Characteristics. 280-292 - Zahra Kavehvash, Shahrokh Ghaemmaghami:
On Limits of Embedding in 3D Images Based on 2D Watson's Model. 293-304 - Xuping Huang, Akira Nishimura, Isao Echizen:
A Reversible Acoustic Steganography for Integrity Verification. 305-316
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.