IWDW C

38 papers

YearTitle / Authors
2014Digital-Forensics and Watermarking - 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers
Yun-Qing Shi, Hyoung-Joong Kim, Fernando Pérez-González
2013A Cheat-Prevention Visual Secret Sharing Scheme with Minimum Pixel Expansion.
Shenchuan Liu, Masaaki Fujiyoshi, Hitoshi Kiya
2013A Compressive Sensing Based Quantized Watermarking Scheme with Statistical Transparency Constraint.
Claude Delpha, Said Hijazi, Rémy Boyer
2013A Distributed Scheme for Image Splicing Detection.
Xudong Zhao, Shilin Wang, Shenghong Li, Jianhua Li, Xiang Lin
2013A Huffman Table Index Based Approach to Detect Double MP3 Compression.
Pengfei Ma, Rangding Wang, Diqun Yan, Chao Jin
2013A Hybrid Feature Based Method for Distinguishing Computer Graphics and Photo-Graphic Image.
Shang Gao, Cong Zhang, Chanle Wu, Gang Ye, Lei Huang
2013A New Reversible Data Hiding Scheme Based on Efficient Prediction.
Jian Li, Xiaolong Li, Xingming Sun
2013A Novel Method for Detecting Image Sharpening Based on Local Binary Pattern.
Feng Ding, Guopu Zhu, Yun-Qing Shi
2013A Restorable Semi-fragile Watermarking Combined DCT with Interpolation.
Yaoran Huo, Hongjie He, Fan Chen
2013An Image Authentication Scheme for Accurate Localization and Restoration.
Qunting Yang, Tiegang Gao
2013Anonymizing Temporal Phrases in Natural Language Text to be Posted on Social Networking Services.
Hoang-Quoc Nguyen-Son, Anh-Tu Hoang, Minh-Triet Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen
2013Bitspotting: Detecting Optimal Adaptive Steganography.
Benjamin Johnson, Pascal Schöttle, Aron Laszka, Jens Grossklags, Rainer Böhme
2013Camera Source Identification Game with Incomplete Information.
Hui Zeng, Xiangui Kang
2013Cheating Immune Block-Based Progressive Visual Cryptography.
Ching-Nung Yang, Yi-Chin Lin, Chih-Cheng Wu
2013Detecting Non-aligned Double JPEG Compression Based on Refined Intensity Difference and Calibration.
Jianquan Yang, Guopu Zhu, Junlong Wang, Yun-Qing Shi
2013Detecting Traitors in Re-publishing Updated Datasets.
Anh-Tu Hoang, Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Isao Echizen
2013Digital Forensics of Printed Source Identification for Chinese Characters.
Min-Jen Tsai, Jung Liu, Jin-Sheng Yin, Imam Yuadi
2013Effective Video Copy Detection Using Statistics of Quantized Zernike Moments.
Jiehao Chen, Chenglong Chen, Jiangqun Ni
2013Generalized Histogram Shifting-Based Blind Reversible Data Hiding with Balanced and Guarded Double Side Modification.
Masaaki Fujiyoshi
2013Hiding a Secret Pattern into Color Halftone Images.
Yuanfang Guo, Oscar C. Au, Ketan Tang, Jiahao Pang
2013High Capacity Data Hiding Scheme for Binary Images Based on Minimizing Flipping Distortion.
Bingwen Feng, Wei Lu, Wei Sun
2013Identifying Video Forgery Process Using Optical Flow.
Wan Wang, Xinghao Jiang, Shilin Wang, Meng Wan, Tanfeng Sun
2013Improved Algorithm of Edge Adaptive Image Steganography Based on LSB Matching Revisited Algorithm.
Fangjun Huang, Yane Zhong, Jiwu Huang
2013Improved License Plate Recognition for Low-Resolution CCTV Forensics by Integrating Sparse Representation-Based Super-Resolution.
Hyun-seok Min, Seung-Ho Lee, Wesley De Neve, Yong Man Ro
2013Improved Tagged Visual Cryptograms by Using Random Grids.
Duanhao Ou, Xiaotian Wu, Lu Dai, Wei Sun
2013New Forensic Methods for OOXML Format Documents.
Zhangjie Fu, Xingming Sun, Lu Zhou, Jiangang Shu
2013Non-uniform Quantization in Breaking HUGO.
Licong Chen, Yun Q. Shi, Patchara Sutthiwan, Xinxin Niu
2013On User Interaction Behavior as Evidence for Computer Forensic Analysis.
Chao Shen, Zhongmin Cai, Roy A. Maxion, Xiaohong Guan
2013Reversible Audio Information Hiding Based on Integer DCT Coefficients with Adaptive Hiding Locations.
Xuping Huang, Nobutaka Ono, Isao Echizen, Akira Nishimura
2013Reversible Data Hiding in Encrypted H.264/AVC Video Streams.
Dawen Xu, Rangding Wang, Yun-Qing Shi
2013Reversible and Robust Audio Watermarking Based on Quantization Index Modulation and Amplitude Expansion.
Akira Nishimura
2013Secret Sharing in Images Based on Error-Diffused Block Truncation Coding and Error Diffusion.
Duanhao Ou, Xiaotian Wu, Lu Dai, Wei Sun
2013Steganalysis of Compressed Speech Based on Markov and Entropy.
Haibo Miao, Liusheng Huang, Yao Shen, Xiaorong Lu, Zhili Chen
2013Steganography Based on Adaptive Pixel-Value Differencing Scheme Revisited.
Hong Zhang, Qingxiao Guan, Xianfeng Zhao
2013Using RZL Coding to Enhance Histogram-Pair Based Image Reversible Data Hiding.
Xuefeng Tong, Guorong Xuan, Guangce Shen, Xiaoli Huan, Yun-Qing Shi
2013Visual Cryptography Schemes Based in k -Linear Maps.
Agustín Moreno Cañadas, Nelly Paola Palma Vanegas, Margoth Hernández Quitián
2013Visual Cryptography and Random Grids Schemes.
Zhengxin Fu, Bin Yu
2013Watermarking-Based Perceptual Hashing Search Over Encrypted Speech.
Hongxia Wang, Linna Zhou, Wei Zhang, Shuang Liu