Description |
1 online resource (xx, 532 pages) : illustrations |
Series |
Lecture Notes in Computer Science, 0302-9743 ; 7809 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 7809.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Invited Lectures (Abstracts) -- Session 1: Steganography and Steganalysis. New Channel Selection Criterion for Spatial Domain Steganography / Yane Zhong, Fangjun Huang, Dong Zhang -- A Study of Optimal Matrix for Efficient Matrix Embedding in F3 / Yuanzhi Qi [and others] -- A Novel Mapping Scheme for Steganalysis / Licong Chen [and others] -- Steganalysis of LSB Matching Based on the Sum Features of Average Co-occurrence Matrix Using Image Estimation / Yan-qing Guo [and others] -- Calibration Based Reliable Detector for Detecting LSB Matching Steganography / Fei Peng, Xiaolong Li, Bin Yang -- LSB Replacement Steganography Software Detection Based on Model Checking / Zheng Zhao [and others] -- An Attempt to Generalize Distortion Measure for JPEG Steganography / Vasily Sachnev, Hyoung Joong Kim |
|
Session 2: Watermarking and Copyright Protection. Optimal Data Embedding in 3D Models for Extraction from 2D Views Using Perspective Invariants / Yağız Yaşaroğlu, A. Aydın Alatan -- Consideration of the Watermark Inversion Attack and Its Invalidation Framework / Kazuo Ohzeki [and others] -- Geometrically Invariant Image Blind Watermarking Based on Speeded-Up Robust Features and DCT Transform / Huang Zhang, Xiao-Qiang Li -- Self-embedding Fragile Watermarking Scheme Combined Average with VQ Encoding / Hongjie He, Fan Chen, Yaoran Huo -- An Efficient Fragile Web Pages Watermarking for Integrity Protection of XML Documents / Quan Wen, Yufei Wang -- Image Information Hiding Based on Binary Holography of Iterative Conjugate-Symmetric Extension / Qiyin Zhao [and others] -- High Capacity Data Hiding for Halftone Image Authentication / Meng Guo, Hongbin Zhang -- Coded Spread Spectrum Watermarking Scheme / Minoru Kuribayashi -- Enhancement of Method for Preventing Unauthorized Copying of Displayed Information Using Object Surface Reflection / Takayuki Yamada, Seiichi Gohshi, Isao Echizen |
|
Session 3: Forensics and Anti-Forensics. Image Splicing Verification Based on Pixel-Based Alignment Method / Rimba Whidiana Ciptasari, Kyung-Hyune Rhee, Kouichi Sakurai -- Multimedia Operator Chain Topology and Ordering Estimation Based on Detection and Information Theoretic Tools / Pedro Comesaña, Fernando Pérez-González -- Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns / Zhaohong Li, Jingyu Ye, Yun Qing Shi -- Detecting Removed Object from Video with Stationary Background / Leida Li [and others]Audio Forgery Detection Based on Max Offsets for Cross Correlation between ENF and Reference Signal / Yongjian Hu [and others] -- A Novel Video Inter-frame Forgery Model Detection Scheme Based on Optical Flow Consistency / Juan Chao, Xinghao Jiang, Tanfeng Sun -- Countering Universal Image Tampering Detection with Histogram Restoration / Luyi Chen [and others] -- Face Verification Using Color Sparse Representation / Wook Jin Shin [and others] -- Rapid Image Splicing Detection Based on Relevance Vector Machine / Bo Su [and others] -- An Efficient Speech Content Authentication Algorithm Based on Coefficients Self-correlation Degree / Zhenghui Liu, Hongxia Wang -- Saliency-Based Region Log Covariance Feature for Image Copy Detection / Xin He [and others] -- Blind Detection of Electronic Voice Transformation with Natural Disguise / Yong Wang [and others] -- Robust Median Filtering Detection Based on Filtered Residual / Anjie Peng, Xiangui Kang |
|
Session 4: Reversible Data Hiding. Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence Modulation / Xinpeng Zhang, Chuan Qin, Guangling Sun -- Optimal Histogram-Pair and Prediction-Error Based Image Reversible Data Hiding / Guorong Xuan [and others] -- An Improved Algorithm for Reversible Data Hiding in Encrypted Image / Jie Yu [and others] -- Reversible Watermarking for Audio Authentication Based on Integer DCT and Expansion Embedding / Quan Chen, Shijun Xiang, Xinrong Luo |
|
Session 5: Fingerprinting and Authentication. Automatic Anonymous Fingerprinting of Text Posted on Social Networking Services / Hoang-Quoc Nguyen-Son [and others] -- Memoryless Hash-Based Perceptual Image Authentication / Fang Liu, Qi-Kai Fu, Lee-Ming Cheng |
|
Session 6: Visual Cryptography. Visual Cryptography Based Watermarking: Definition and Meaning / Stelvio Cimato, James Ching-Nung Yang, Chih-Cheng Wu -- Region-in-Region Incrementing Visual Cryptography Scheme / Ching-Nung Yang, Yi-Chin Lin, Chih-Cheng Wu -- A Secret Enriched Visual Cryptography / Feng Liu [and others] -- On the Security of Multi-secret Visual Cryptography Scheme with Ring Shares / Zheng-Xin Fu, Bin Yu |
|
Session 7: Others. An Image Super-Resolution Scheme Based on Compressive Sensing with PCA Sparse Representation / Aixin Zhang [and others]A Novel JFE Scheme for Social Multimedia Distribution in Compressed Domain Using SVD and CA / Conghuan Ye [and others] -- A Robust Image Classification Scheme with Sparse Coding and Multiple Kernel Learning / Dongyang Cheng, Tanfeng Sun, Xinghao Jiang |
Summary |
This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography |
Bibliography |
Includes bibliographical references and author index |
Notes |
Online resource; title from PDF title page (SpringerLink, viewed August 20, 2013) |
Subject |
Data encryption (Computer science) -- Congresses
|
|
Computer security.
|
|
Computer Security
|
|
Computer security
|
|
Data encryption (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Shi, Yun Q., editor
|
|
Kim, Hyoung Joong, 1954- editor.
|
|
Pérez-González, F. (Fernando), 1967- editor.
|
ISBN |
9783642400995 |
|
364240099X |
|
3642400981 |
|
9783642400988 |
|