IWDW C

43 papers

YearTitle / Authors
2013Digital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected Papers
Yun Q. Shi, Hyoung-Joong Kim, Fernando Pérez-González
2012A Novel JFE Scheme for Social Multimedia Distribution in Compressed Domain Using SVD and CA.
Conghuan Ye, Hefei Ling, Fuhao Zou, Zhengding Lu, Zenggang Xiong, Kaibing Zhang
2012A Novel Mapping Scheme for Steganalysis.
Licong Chen, Yun Q. Shi, Patchara Sutthiwan, Xinxin Niu
2012A Novel Video Inter-frame Forgery Model Detection Scheme Based on Optical Flow Consistency.
Juan Chao, Xinghao Jiang, Tanfeng Sun
2012A Robust Image Classification Scheme with Sparse Coding and Multiple Kernel Learning.
Dongyang Cheng, Tanfeng Sun, Xinghao Jiang
2012A Secret Enriched Visual Cryptography.
Feng Liu, Wei Qi Yan, Peng Li, Chuan Kun Wu
2012A Study of Optimal Matrix for Efficient Matrix Embedding in.
Yuanzhi Qi, Xiaolong Li, Bin Wang, Bin Yang
2012An Attempt to Generalize Distortion Measure for JPEG Steganography.
Vasiliy Sachnev, Hyoung Joong Kim
2012An Efficient Fragile Web Pages Watermarking for Integrity Protection of XML Documents.
Quan Wen, Yufei Wang
2012An Efficient Speech Content Authentication Algorithm Based on Coefficients Self-correlation Degree.
Zhenghui Liu, Hongxia Wang
2012An Image Super-Resolution Scheme Based on Compressive Sensing with PCA Sparse Representation.
Aixin Zhang, Chao Guan, Haomiao Jiang, Jianhua Li
2012An Improved Algorithm for Reversible Data Hiding in Encrypted Image.
Jie Yu, Guopu Zhu, Xiaolong Li, Jianquan Yang
2012Audio Forgery Detection Based on Max Offsets for Cross Correlation between ENF and Reference Signal.
Yongjian Hu, Chang-Tsun Li, Zhisheng Lv, Bei-Bei Liu
2012Automatic Anonymous Fingerprinting of Text Posted on Social Networking Services.
Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Tien Dung Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen
2012Blind Detection of Electronic Voice Transformation with Natural Disguise.
Yong Wang, Yanhong Deng, Haojun Wu, Jiwu Huang
2012Calibration Based Reliable Detector for Detecting LSB Matching Steganography.
Fei Peng, Xiaolong Li, Bin Yang
2012Coded Spread Spectrum Watermarking Scheme.
Minoru Kuribayashi
2012Consideration of the Watermark Inversion Attack and Its Invalidation Framework.
Kazuo Ohzeki, Yuanyu Wei, Yutaka Hirakawa, Kiyotsugu Sato
2012Countering Universal Image Tampering Detection with Histogram Restoration.
Luyi Chen, Shilin Wang, Shenghong Li, Jianhua Li
2012Detecting Removed Object from Video with Stationary Background.
Leida Li, Xuewei Wang, Wei Zhang, Gaobo Yang, Guozhang Hu
2012Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns.
Zhaohong Li, Jingyu Ye, Yun-Qing Shi
2012Enhancement of Method for Preventing Unauthorized Copying of Displayed Information Using Object Surface Reflection.
Takayuki Yamada, Seiichi Gohshi, Isao Echizen
2012Face Verification Using Color Sparse Representation.
Wook Jin Shin, Seung-Ho Lee, Hyun-seok Min, Hosik Sohn, Yong Man Ro
2012Geometrically Invariant Image Blind Watermarking Based on Speeded-Up Robust Features and DCT Transform.
Huang Zhang, Xiaoqiang Li
2012High Capacity Data Hiding for Halftone Image Authentication.
Meng Guo, Hongbin Zhang
2012Image Information Hiding Based on Binary Holography of Iterative Conjugate-Symmetric Extension.
Qiyin Zhao, Daqing Chen, Zhi Tao, Ji-Hua Gu
2012Image Splicing Verification Based on Pixel-Based Alignment Method.
Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai
2012LSB Replacement Steganography Software Detection Based on Model Checking.
Zheng Zhao, Fenlin Liu, Xiangyang Luo, Xin Xie, Lu Yu
2012Memoryless Hash-Based Perceptual Image Authentication.
Fang Liu, Qi-Kai Fu, Lee-Ming Cheng
2012Multimedia Operator Chain Topology and Ordering Estimation Based on Detection and Information Theoretic Tools.
Pedro Comesaña, Fernando Pérez-González
2012New Channel Selection Criterion for Spatial Domain Steganography.
Yane Zhong, Fangjun Huang, Dong Zhang
2012On the Security of Multi-secret Visual Cryptography Scheme with Ring Shares.
Zhengxin Fu, Bin Yu
2012Optimal Data Embedding in 3D Models for Extraction from 2D Views Using Perspective Invariants.
Yagiz Yasaroglu, A. Aydin Alatan
2012Optimal Histogram-Pair and Prediction-Error Based Image Reversible Data Hiding.
Guorong Xuan, Xuefeng Tong, Jianzhong Teng, Xiaojie Zhang, Yun-Qing Shi
2012Rapid Image Splicing Detection Based on Relevance Vector Machine.
Bo Su, Quanqiao Yuan, Yujin Zhang, Mengying Zhai, Shilin Wang
2012Region-in-Region Incrementing Visual Cryptography Scheme.
Ching-Nung Yang, Yi-Chin Lin, Chih-Cheng Wu
2012Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence Modulation.
Xinpeng Zhang, Chuan Qin, Guangling Sun
2012Reversible Watermarking for Audio Authentication Based on Integer DCT and Expansion Embedding.
Quan Chen, Shijun Xiang, Xinrong Luo
2012Robust Median Filtering Detection Based on Filtered Residual.
Anjie Peng, Xiangui Kang
2012Saliency-Based Region Log Covariance Feature for Image Copy Detection.
Xin He, Huiyun Jing, Qi Han, Xiamu Niu
2012Self-embedding Fragile Watermarking Scheme Combined Average with VQ Encoding.
Hongjie He, Fan Chen, Yaoran Huo
2012Steganalysis of LSB Matching Based on the Sum Features of Average Co-occurrence Matrix Using Image Estimation.
Yanqing Guo, Xiangwei Kong, Bo Wang, Qian Xiao
2012Visual Cryptography Based Watermarking: Definition and Meaning.
Stelvio Cimato, Ching-Nung Yang, Chih-Cheng Wu