default search action
18th IWDW 2019: Chengdu, China
- Hongxia Wang, Xianfeng Zhao, Yunqing Shi, Hyoung Joong Kim, Alessandro Piva:
Digital Forensics and Watermarking - 18th International Workshop, IWDW 2019, Chengdu, China, November 2-4, 2019, Revised Selected Papers. Lecture Notes in Computer Science 12022, Springer 2020, ISBN 978-3-030-43574-5
Deep Learning for Multimedia Security
- Haibin Wu, Fengyong Li, Xinpeng Zhang, Kui Wu:
GAN-Based Steganography with the Concatenation of Multiple Feature Maps. 3-17 - Zhongliang Yang, Nan Wei, Qinghe Liu, Yongfeng Huang, Yujin Zhang:
GAN-TStega: Text Steganography Based on Generative Adversarial Networks. 18-31 - Yiming Xue, Wan-li Peng, Yuzhu Wang, Juan Wen, Ping Zhong:
Optimized CNN with Point-Wise Parametric Rectified Linear Unit for Spatial Image Steganalysis. 32-42 - Jinghong Zhang, Xiaowei Yi, Xianfeng Zhao, Yun Cao:
Light Multiscale Conventional Neural Network for MP3 Steganalysis. 43-56 - Zhenyu Zhang, Xiaowei Yi, Xianfeng Zhao:
Improving Audio Steganalysis Using Deep Residual Networks. 57-70 - Xunpeng Zhang, Xiangwei Kong, Pengda Wang, Bo Wang:
Cover-Source Mismatch in Deep Spatial Steganalysis. 71-83 - Qiangjie Li, Guorui Feng, Hanzhou Wu, Xinpeng Zhang:
Ensemble Steganalysis Based on Deep Residual Network. 84-95
Digital Forensics and Anti-forensics
- Ludovic Darmet, Kai Wang, François Cayre:
Weakly Supervised Adaptation to Re-sizing for Image Manipulation Detection on Small Patches. 99-114 - Ting Huang, Hongxia Wang, Yi Chen, Peisong He:
GRU-SVM Model for Synthetic Speech Detection. 115-125 - Guiduo Duan, Jiayu Miao, Tianxi Huang:
Median Filtering Detection of Small-Size Image Using AlexCaps-Network. 126-140 - Jinwei Wang, Wei Huang, Xiangyang Luo, Yung-Qing Shi:
Double JPEG Compression Detection Based on Markov Model. 141-149 - Zhangyi Shen, Feng Ding, Yunqing Shi:
Anti-forensics of Image Sharpening Using Generative Adversarial Network. 150-157
Digital Watermarking
- Liwen Qin, Xiaolong Li, Yao Zhao:
A New JPEG Image Watermarking Method Exploiting Spatial JND Model. 161-170 - Minoru Kuribayashi, KokSheik Wong:
Improved DM-QIM Watermarking Scheme for PDF Document. 171-183 - Fang Cao, Tianwei Wu, Chuan Qin, Zhenxing Qian, Xinpeng Zhang:
New Paradigm for Self-embedding Image Watermarking with Poisson Equation. 184-191
Information Hiding
- Haihang Wu, Fangjun Huang:
Reversible Data Hiding Based on Partitioning the Prediction Values. 195-203 - Yang Yang, Xue Cai, Xingxing Xiao, Jinghan Ye, Wenyi Shi:
A Novel Reversible Data Hiding with Skin Tone Smoothing Effect for Face Images. 204-212 - Asad Malik, Hongxia Wang, Ahmad Neyaz Khan, Yanli Chen, Yi Chen:
A Novel Lossless Data Hiding Scheme in Homomorphically Encrypted Images. 213-220 - Linna Zhou, Derui Liao:
Information Hiding Based on Typing Errors. 221-230 - Dawen Xu, Bo Guan, Shubing Su, Xuena Qiu:
High-Capacity Reversible Data Hiding in Encrypted Images Based on MSB Prediction. 231-243
Steganography and Steganalysis
- Yichen Tong, Jiangqun Ni, Wenkang Su:
Image Steganography Using an Eight-Element Neighborhood Gaussian Markov Random Field Model. 247-255 - Mengtian Xu, Hanzhou Wu, Guorui Feng, Xinpeng Zhang, Feng Ding:
Broadcasting Steganography in the Blockchain. 256-267 - Yubo Lu, Liming Zhai, Lina Wang:
Designing Non-additive Distortions for JPEG Steganography Based on Blocking Artifacts Reduction. 268-280 - Wanteng Liu, Xiaolin Yin, Wei Lu, Junhong Zhang:
Halftone Image Steganography with Distortion Measurement Based on Structural Similarity. 281-292 - Mengyuan Guo, Tanfeng Sun, Xinghao Jiang, Yi Dong, Ke Xu:
A Motion Vector-Based Steganographic Algorithm for HEVC with MTB Mapping Strategy. 293-306 - Chen Gong, Xianfeng Zhao:
New Steganalytic Approach for AMR Steganography Based on Block-Wise of Pulse Position Distribution and Neighboring Joint Density. 307-321 - Liran Yang, Jing Zhong, Ping Zhong, Yiming Xue, Juan Wen:
A Novel Feature Selection Model for JPEG Image Steganalysis. 322-336 - Hui Ge, Donghui Hu, Haiyan Xu, Meng Li, Shuli Zheng:
New Steganalytic Features for Spatial Image Steganography Based on Non-negative Matrix Factorization. 337-351 - Zhongliang Yang, Ke Wang, Sai Ma, Yongfeng Huang, Xiangui Kang, Xianfeng Zhao:
IStego100K: Large-Scale Image Steganalysis Dataset. 352-364 - Danyang Zhao, Kaixi Wang:
BNS-CNN: A Blind Network Steganalysis Model Based on Convolutional Neural Network in IPv6 Network. 365-373
Authentication and Security
- Zhongliang Yang, Yuting Hu, Yongfeng Huang, Yujin Zhang:
Behavioral Security in Covert Communication Systems. 377-392 - Longfu Zhou, Sen Bai, Yuqiang Cao, Yinglong Wang:
Image Visually Meaningful Cryptography Based on Julia Set Generating and Information Hiding. 393-406 - Ling Du, Yijing Wang, Anthony T. S. Ho:
Multi-attack Reference Hashing Generation for Image Authentication. 407-420 - Jianfeng Ma, Liping Yin, Peng Li:
Cheating Detection in (k, n) Secret Image Sharing Scheme. 421-428
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.