Limit search to available items
Book Cover
E-book
Author IWDW (Conference) (11th : 2012 : Shanghai, China)

Title Digital forensics and watermaking : 11th International Workshop, IWDW 2012, Shanghai, China, October 31-November 3, 2012, Revised selected papers / Yun Q. Shi, Hyoung-Joong Kim, Fernando Pérez-González (eds.)
Published Heidelberg : Springer, 2013

Copies

Description 1 online resource (xx, 532 pages) : illustrations
Series Lecture Notes in Computer Science, 0302-9743 ; 7809
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7809.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Invited Lectures (Abstracts) -- Session 1: Steganography and Steganalysis. New Channel Selection Criterion for Spatial Domain Steganography / Yane Zhong, Fangjun Huang, Dong Zhang -- A Study of Optimal Matrix for Efficient Matrix Embedding in F3 / Yuanzhi Qi [and others] -- A Novel Mapping Scheme for Steganalysis / Licong Chen [and others] -- Steganalysis of LSB Matching Based on the Sum Features of Average Co-occurrence Matrix Using Image Estimation / Yan-qing Guo [and others] -- Calibration Based Reliable Detector for Detecting LSB Matching Steganography / Fei Peng, Xiaolong Li, Bin Yang -- LSB Replacement Steganography Software Detection Based on Model Checking / Zheng Zhao [and others] -- An Attempt to Generalize Distortion Measure for JPEG Steganography / Vasily Sachnev, Hyoung Joong Kim
Session 2: Watermarking and Copyright Protection. Optimal Data Embedding in 3D Models for Extraction from 2D Views Using Perspective Invariants / Yağız Yaşaroğlu, A. Aydın Alatan -- Consideration of the Watermark Inversion Attack and Its Invalidation Framework / Kazuo Ohzeki [and others] -- Geometrically Invariant Image Blind Watermarking Based on Speeded-Up Robust Features and DCT Transform / Huang Zhang, Xiao-Qiang Li -- Self-embedding Fragile Watermarking Scheme Combined Average with VQ Encoding / Hongjie He, Fan Chen, Yaoran Huo -- An Efficient Fragile Web Pages Watermarking for Integrity Protection of XML Documents / Quan Wen, Yufei Wang -- Image Information Hiding Based on Binary Holography of Iterative Conjugate-Symmetric Extension / Qiyin Zhao [and others] -- High Capacity Data Hiding for Halftone Image Authentication / Meng Guo, Hongbin Zhang -- Coded Spread Spectrum Watermarking Scheme / Minoru Kuribayashi -- Enhancement of Method for Preventing Unauthorized Copying of Displayed Information Using Object Surface Reflection / Takayuki Yamada, Seiichi Gohshi, Isao Echizen
Session 3: Forensics and Anti-Forensics. Image Splicing Verification Based on Pixel-Based Alignment Method / Rimba Whidiana Ciptasari, Kyung-Hyune Rhee, Kouichi Sakurai -- Multimedia Operator Chain Topology and Ordering Estimation Based on Detection and Information Theoretic Tools / Pedro Comesaña, Fernando Pérez-González -- Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns / Zhaohong Li, Jingyu Ye, Yun Qing Shi -- Detecting Removed Object from Video with Stationary Background / Leida Li [and others]Audio Forgery Detection Based on Max Offsets for Cross Correlation between ENF and Reference Signal / Yongjian Hu [and others] -- A Novel Video Inter-frame Forgery Model Detection Scheme Based on Optical Flow Consistency / Juan Chao, Xinghao Jiang, Tanfeng Sun -- Countering Universal Image Tampering Detection with Histogram Restoration / Luyi Chen [and others] -- Face Verification Using Color Sparse Representation / Wook Jin Shin [and others] -- Rapid Image Splicing Detection Based on Relevance Vector Machine / Bo Su [and others] -- An Efficient Speech Content Authentication Algorithm Based on Coefficients Self-correlation Degree / Zhenghui Liu, Hongxia Wang -- Saliency-Based Region Log Covariance Feature for Image Copy Detection / Xin He [and others] -- Blind Detection of Electronic Voice Transformation with Natural Disguise / Yong Wang [and others] -- Robust Median Filtering Detection Based on Filtered Residual / Anjie Peng, Xiangui Kang
Session 4: Reversible Data Hiding. Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence Modulation / Xinpeng Zhang, Chuan Qin, Guangling Sun -- Optimal Histogram-Pair and Prediction-Error Based Image Reversible Data Hiding / Guorong Xuan [and others] -- An Improved Algorithm for Reversible Data Hiding in Encrypted Image / Jie Yu [and others] -- Reversible Watermarking for Audio Authentication Based on Integer DCT and Expansion Embedding / Quan Chen, Shijun Xiang, Xinrong Luo
Session 5: Fingerprinting and Authentication. Automatic Anonymous Fingerprinting of Text Posted on Social Networking Services / Hoang-Quoc Nguyen-Son [and others] -- Memoryless Hash-Based Perceptual Image Authentication / Fang Liu, Qi-Kai Fu, Lee-Ming Cheng
Session 6: Visual Cryptography. Visual Cryptography Based Watermarking: Definition and Meaning / Stelvio Cimato, James Ching-Nung Yang, Chih-Cheng Wu -- Region-in-Region Incrementing Visual Cryptography Scheme / Ching-Nung Yang, Yi-Chin Lin, Chih-Cheng Wu -- A Secret Enriched Visual Cryptography / Feng Liu [and others] -- On the Security of Multi-secret Visual Cryptography Scheme with Ring Shares / Zheng-Xin Fu, Bin Yu
Session 7: Others. An Image Super-Resolution Scheme Based on Compressive Sensing with PCA Sparse Representation / Aixin Zhang [and others]A Novel JFE Scheme for Social Multimedia Distribution in Compressed Domain Using SVD and CA / Conghuan Ye [and others] -- A Robust Image Classification Scheme with Sparse Coding and Multiple Kernel Learning / Dongyang Cheng, Tanfeng Sun, Xinghao Jiang
Summary This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography
Bibliography Includes bibliographical references and author index
Notes Online resource; title from PDF title page (SpringerLink, viewed August 20, 2013)
Subject Data encryption (Computer science) -- Congresses
Computer security.
Computer Security
Computer security
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Shi, Yun Q., editor
Kim, Hyoung Joong, 1954- editor.
Pérez-González, F. (Fernando), 1967- editor.
ISBN 9783642400995
364240099X
3642400981
9783642400988
Other Titles IWDW 2012