default search action
16. IWDW 2017: Magdeburg, Germany
- Christian Kraetzer, Yun-Qing Shi, Jana Dittmann, Hyoung Joong Kim:
Digital Forensics and Watermarking - 16th International Workshop, IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings. Lecture Notes in Computer Science 10431, Springer 2017, ISBN 978-3-319-64184-3
Forensics
- Qianyi Xu, Tanfeng Sun, Xinghao Jiang, Yi Dong:
HEVC Double Compression Detection Based on SN-PUPM Feature. 3-17 - Michael Kalbitz, Tobias Scheidat, Benjamin Yüksel, Claus Vielhauer:
Towards Automated Forensic Pen Ink Verification by Spectral Analysis. 18-30 - Pengpeng Yang, Ruihan Li, Rongrong Ni, Yao Zhao:
Recaptured Image Forensics Based on Quality Aware and Histogram Feature. 31-41 - Tekachew Gobena Ejeta, Hyoung Joong Kim:
Website Fingerprinting Attack on Psiphon and Its Forensic Analysis. 42-51 - Venkata Udaya Sameer, Ruchira Naskar, Nikhita Musthyala, Kalyan Kokkalla:
Deep Learning Based Counter-Forensic Image Classification for Camera Model Identification. 52-64 - Jianghong Zhou, Jiangqun Ni, Yuan Rao:
Block-Based Convolutional Neural Network for Image Forgery Detection. 65-76 - Jingyu Ye, Yun-Qing Shi:
A Hybrid Feature Model for Seam Carving Detection. 77-89
Biometric Image Tampering Detection
- Tom Neubert:
Face Morphing Detection: An Approach Based on Image Degradation Analysis. 93-106 - Clemens Seibold, Wojciech Samek, Anna Hilsmann, Peter Eisert:
Detection of Face Morphing Attacks by Deep Learning. 107-120 - Lukasz Wandzik, Raul Vicente-Garcia, Gerald Kaeding, Xi Chen:
CNNs Under Attack: On the Vulnerability of Deep Neural Networks Based Face Recognition to Image Morphing. 121-135 - Aras Asaad, Sabah Jassim:
Topological Data Analysis for Image Tampering Detection. 136-146
Steganography and Steganalysis
- Yi Dong, Xinghao Jiang, Tanfeng Sun, Dawen Xu:
Coding Efficiency Preserving Steganography Based on HEVC Steganographic Channel Model. 149-162 - Yu Wang, Yun Cao, Xianfeng Zhao, Linna Zhou:
A Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization. 163-176 - Weiqi Luo, Yue Zhang, Haodong Li:
Adaptive Audio Steganography Based on Advanced Audio Coding and Syndrome-Trellis Coding. 177-186 - Weike You, Yun Cao, Xianfeng Zhao:
Information Hiding Using CAVLC: Misconceptions and a Detection Strategy. 187-201 - Kun Yang, Xiaowei Yi, Xianfeng Zhao, Linna Zhou:
Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution. 202-216 - Yanzhen Ren, Qiaochu Xiong, Lina Wang:
A Steganalysis Scheme for AAC Audio Based on MDCT Difference Between Intra and Inter Frame. 217-231
Emerging Threats of Criminal Use of Information Hiding: Usage Scenarios and Detection Approaches
- Iman Sedeeq, Frans Coenen, Alexei Lisitsa:
A Prediction Model Based Approach to Open Space Steganography Detection in HTML Webpages. 235-247 - Daniel Spiekermann, Jörg Keller, Tobias Eggendorfer:
Towards Covert Channels in Cloud Environments: A Study of Implementations in Virtual Networks. 248-262 - Jianhua Yang, Kai Liu, Xiangui Kang, Edward K. Wong, Yunqing Shi:
Steganalysis Based on Awareness of Selection-Channel and Deep Learning. 263-272
Watermarking
- Bingwen Feng, Jian Weng, Wei Lu:
Improved Algorithms for Robust Histogram Shape-Based Image Watermarking. 275-289 - Hao-Tian Wu, Shaohua Tang, Yun-Qing Shi:
Image Quality Assessment in Reversible Data Hiding with Contrast Enhancement. 290-302 - Guangyuan Yang, Wenfa Qi, Xiaolong Li, Zongming Guo:
Improved Reversible Visible Watermarking Based on Adaptive Block Partition. 303-317 - Chenchen Cui, Rongrong Ni, Yao Zhao:
Robust Zero Watermarking for 3D Triangular Mesh Models Based on Spherical Integral Invariants. 318-330 - Olaf Markus Köhler, Cecilia Pasquini, Rainer Böhme:
On the Statistical Properties of Syndrome Trellis Coding. 331-346 - Masaaki Fujiyoshi, Hitoshi Kiya:
A Blind Reversible Data Hiding Method for High Dynamic Range Images Taking Advantage of Sparse Histogram. 347-361
Other Topics
- Peng Li, Zuquan Liu:
A Novel Visual Cryptography Scheme with Different Importance of Shadows. 365-377 - Xudie Ren, Haonan Guo, Shenghong Li, Shilin Wang, Jianhua Li:
A Novel Image Classification Method with CNN-XGBoost Model. 378-390 - Akira Nishimura:
Improvement and Evaluation of Time-Spread Echo Hiding Technology for Long-Distance Voice Evacuation Systems. 391-405 - Wen Wang, Feng Liu, Teng Guo, YaWei Ren:
Temporal Integration Based Visual Cryptography Scheme and Its Application. 406-419
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.