default search action
13. IWDW 2014: Taipei, Taiwan
- Yun-Qing Shi, Hyoung-Joong Kim, Fernando Pérez-González, Ching-Nung Yang:
Digital-Forensics and Watermarking - 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers. Lecture Notes in Computer Science 9023, Springer 2015, ISBN 978-3-319-19320-5
Forensics
- Guanshuo Xu, Jingyu Ye, Yun-Qing Shi:
New Developments in Image Tampering Detection. 3-17 - Lu Zheng, Tanfeng Sun, Yun-Qing Shi:
Inter-frame Video Forgery Detection Based on Block-Wise Brightness Variance Descriptor. 18-30 - Mauro Barni, Marco Fontani, Benedetta Tondi:
Universal Counterforensics of Multiple Compressed JPEG Images. 31-46 - Babak Mahdian, Adam Novozámský, Stanislav Saic:
Determination of Stop-Criterion for Incremental Methods Constructing Camera Sensor Fingerprint. 47-59 - Zhili Zhou, Xingming Sun, Yunlong Wang, Zhangjie Fu, Yun-Qing Shi:
Combination of SIFT Feature and Convex Region-Based Global Context Feature for Image Copy Detection. 60-71
Watermarking
- Chin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin:
A Blind Robust Reversible Watermark Scheme for Textual Relational Databases with Virtual Primary Key. 75-89 - Hsin Miao, Yu-Hsun Lin, Ja-Ling Wu:
Image Descriptor Based Digital Semi-blind Watermarking for DIBR 3D Images. 90-104 - Nhut Minh Ngo, Masashi Unoki:
Watermarking for Digital Audio Based on Adaptive Phase Modulation. 105-119 - Javier Franco-Contreras, Gouenou Coatrieux, Nora Cuppens-Boulahia, Frédéric Cuppens, Christian Roux:
Adapted Quantization Index Modulation for Database Watermarking. 120-134 - Fong-Maw Tsai, Wen-Liang Hsue:
Image Watermarking Based on Various Discrete Fractional Fourier Transforms. 135-144 - Jessada Karnjana, Masashi Unoki, Pakinee Aimmanee, Chai Wutiwiwatchai:
An Audio Watermarking Scheme Based on Singular-Spectrum Analysis. 145-159 - Xiumei Qiao, Rongrong Ni, Yao Zhao:
Superpixel-Based Watermarking Scheme for Image Authentication and Recovery. 160-173 - Zairan Wang, Jing Dong, Wei Wang, Tieniu Tan:
Effects of Fragile and Semi-fragile Watermarking on Iris Recognition System. 174-186 - Jianfeng Lu, Qianru Huang, Meng Wang, Li Li, Junping Dai, Chin-Chen Chang:
Zero-Watermarking Based on Improved ORB Features Against Print-cam Attack. 187-198
Reversible Data Hiding
- Xuefeng Tong, Guangce Shen, Guorong Xuan, Shumeng Li, Zhiqiang Yang, Jian Li, Yun-Qing Shi:
Stereo Image Coding with Histogram-Pair Based Reversible Data Hiding. 201-214 - Akira Nishimura:
Reversible and Robust Audio Watermarking Based on Spread Spectrum and Amplitude Expansion. 215-229 - Dawen Xu, Rangding Wang:
Reversible Data Hiding in Encrypted Images Using Interpolation and Histogram Shifting. 230-242 - Xinlu Gui, Xiaolong Li, Bin Yang:
High-Dimensional Histogram Utilization for Reversible Data Hiding. 243-253 - Xiaochao Qu, Suah Kim, Run Cui, Fangjun Huang, Hyoung Joong Kim:
Reversible Data Hiding Based on Combined Predictor and Prediction Error Expansion. 254-265 - Wen-Chung Kuo, Chun-Cheng Wang, Hong-Ching Hou, Chen-Tsun Chuang:
Reversible Shared Data Hiding Based on Modified Signed Digit EMD. 266-275 - Sunil Prasad Jaiswal, Oscar C. Au, Vinit Jakhetiya, Andy Yuanfang Guo, Anil Kumar Tiwari:
Adaptive Predictor Structure Based Interpolation for Reversible Data Hiding. 276-288 - Hao-Tian Wu, Yuan Liu, Yun-Qing Shi:
Reversible Data Hiding by Median-Preserving Histogram Modification for Image Contrast Enhancement. 289-301
Visual Cryptography
- Peng Li, Ching-Nung Yang, Qian Kong:
Two-in-One Image Secret Sharing Scheme Based on Boolean Operations. 305-318 - Xuehu Yan, Guohui Chen, Ching-Nung Yang, Song-Ruei Cai:
Random Girds-Based Threshold Visual Secret Sharing with Improved Contrast by Boolean Operations. 319-332 - Feng Liu, Chuan Kun Wu:
Optimal XOR Based (2, n)-Visual Cryptography Schemes. 333-349 - Yi Hao Li, Shyong Jian Shyu:
Visual Two-Secret Sharing Schemes by Different Superimposition Positions. 350-363 - Daoshun Wang, Feng Yi, Ching-Nung Yang:
Visual Cryptography Scheme with Autostereogram. 364-375 - Guohui Chen, Chunying Wang, Xuehu Yan, Peng Li:
Progressive Visual Secret Sharing with Multiple Decryptions and Unexpanded Shares. 376-386
Poster Session
- Xu Lin, Bingwen Feng, Wei Lu, Wei Sun:
Content-Adaptive Residual for Steganalysis. 389-398 - Jian Cao:
Improved Spread Transform Dither Modulation: A New Modulation Technique for Secure Watermarking. 399-409 - Areej S. Alfraih, Johann A. Briffa, Stephan Wesemeyer:
Cloning Localization Based on Feature Extraction and K-means Clustering. 410-419 - Bin Ma, Yun-Qing Shi:
A Reversible Image Watermarking Scheme Based on Modified Integer-to-Integer Discrete Wavelet Transform and CDMA Algorithm. 420-432 - Chia-Chen Lin, Yuehong Huang, Wei-Liang Tai:
A Novel Hybrid Image Authentication Scheme for AMBTC-Compressed Images. 433-443 - Yu-Chi Chen, Kunhan Lu, Raylin Tso, Mu-En Wu:
An Improved Visual Cryptography with Cheating Prevention. 444-454 - Hanzhou Wu, Hongxia Wang, Yi Hu, Linna Zhou:
Efficient Reversible Data Hiding Based on Prefix Matching and Directed LSB Embedding. 455-469 - Jie Zhu, Qingxiao Guan, Xianfeng Zhao:
Multi-class JPEG Image Steganalysis by Ensemble Linear SVM Classifier. 470-484 - Osamah M. Al-Qershi, Bee Ee Khoo:
Enhanced Matching Method for Copy-Move Forgery Detection by Means of Zernike Moments. 485-497 - Da-Yu Kao, Ying-Hsuan Chiu:
An Iterative Management Model of Exploring Windows Date-Time Stamps in Cloud Storage Forensics. 498-512 - Alberto Escalada Jimenez, Adrian Dabrowski, Noboru Sonehara, Juan Manuel Montero-Martínez, Isao Echizen:
Tag Detection for Preventing Unauthorized Face Image Processing. 513-524 - Jinglei Zhou, Rangding Wang, Chao Jin, Diqun Yan:
Detecting Fake-Quality WAV Audio Based on Phase Differences. 525-534 - Shangyi Liu, Shijun Xiang:
Non-integer Expansion Embedding for Prediction-Based Reversible Watermarking. 535-543 - Erwan Chaussy, Shimon Machida, Noboru Sonehara, Isao Echizen:
Definition of Private Information for Image Sharing in Social Networking Services. 544-556
Steganography and Steganalysis
- Licong Chen, Yun-Qing Shi, Patchara Sutthiwan:
Variable Multi-dimensional Co-occurrence for Steganalysis. 559-573 - Bingwen Feng, Wei Lu, Lu Dai, Wei Sun:
Steganography Based on High-Dimensional Reference Table. 574-587 - Cheonshik Kim, Ching-Nung Yang:
Steganography Based on Grayscale Images Using (5, 3) Hamming Code. 588-598 - Wei-Jen Wang, Cheng-Ta Huang, Shiau-Rung Tsui, Shiuh-Jeng Wang:
Steganographic Greedy Algorithms for Data Hiding Based on Differences Under SMVQ. 599-612 - Hirokazu Ishizuka, Isao Echizen, Keiichi Iwamura, Kouichi Sakurai:
Evaluation of a Zero-Watermarking-Type Steganography. 613-624
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.