Description |
1 online resource (xii, 512 pages) : illustrations |
Series |
Lecture notes in computer science, 1611-3349 ; 7128 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 7128. 1611-3349
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Modern Trends in Steganography and Steganalysis / Jessica Fridrich -- Photo Forensics -- There Is More to a Picture than Meets the Eye / Nasir Memon -- An Improved Matrix Encoding Scheme for JPEG Steganography / Vasily Sachnev and Hyoung Joong Kim -- Steganalysis of LSB Matching Revisited for Consecutive Pixels Using B-Spline Functions / Shunquan Tan -- A Drift Compensation Algorithm for H.264/AVC Video Robust Watermarking Scheme / Xinghao Jiang, Tanfeng Sun, Yue Zhou and Yun Q. Shi -- A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding / Junxiang Wang, Jiangqun Ni and Jinwei Pan -- A New Watermarking Method with Obfuscated Quasi-Chirp Transform / Kazuo Ohzeki, YuanYu Wei, Yutaka Hirakawa and Kiyotsugu Sato -- A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression / Hui Wang, Anthony T.S. Ho and Xi Zhao -- A Robust Audio Watermarking Scheme Based on Lifting Wavelet Transform and Singular Value Decomposition / Baiying Lei, Ing Yann Soon and Zhen Li -- Adaptive Selection of Embedding Locations for Spread Spectrum Watermarking of Compressed Audio / Alper Koz and Claude Delpha -- IR Hiding: Method to Prevent Re-recording Screen Image Built in Short Wavelength Pass Filter Detection Method Using Specular Reflection / Takayuki Yamada, Seiichi Gohshi and Isao Echizen -- IRIW: Image Retrieval Based Image Watermarking for Large-Scale Image Databases / Jong Yun Jun, Kunho Kim, Jae-Pil Heo and Sung-eui Yoon -- Self-recovery Fragile Watermarking Scheme with Variable Watermark Payload / Fan Chen, Hongjie He, Yaoran Huo and Hongxia Wang |
|
Spread Spectrum-Based Multi-bit Watermarking for Free-View Video / Huawei Tian, Zheng Wang, Yao Zhao, Rongrong Ni and Lunming Qin -- Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates / Hongmei Liu, Lei Li, Jian Li and Jiwu Huang -- Use of "Emergable Watermarks" as Copy Indicators for Securing Video Content / Takaaki Yamada and Yoshiyasu Takahashi -- Authenticating Visual Cryptography Shares Using 2D Barcodes / Jonathan Weir and WeiQi Yan -- Flexible Visual Cryptography Scheme without Distortion / Feng Liu, Teng Guo, ChuanKun Wu and Ching-Nung Yang -- An Extended Visual Cryptography Scheme for Continuous-Tone Images / Yasushi Yamaguchi -- A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection / Xudong Zhao, Shilin Wang, Shenghong Li and Jianhua Li -- Blind Copy-Paste Detection Using Improved SIFT Ring Descriptor / Lin-na Zhou, Yun-biao Guo and Xin-gang You -- Camera Model Identification Based on the Characteristic of CFA and Interpolation / Shang Gao, Guanshuo Xu and Rui-Min Hu -- Detecting Re-captured Videos Using Shot-Based Photo Response Non-Uniformity / Dae-Jin Jung, Dai-Kyung Hyun, Seung-Jin Ryu, Ji-Won Lee and Hae-Yeoun Lee, et al. -- Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image Edges / Rong Zhang, Rang-Ding Wang and Tian-Tsong Ng -- Exposing Original and Duplicated Regions Using SIFT Features and Resampling Traces / David Vázquez-Padín and Fernando Pérez-González -- Fingerprint Forensics Application Protocol: Semi-automated Modeling and Verification of Watermark-Based Communication Using CASPER and FDR / Ronny Merkel, Christian Kraetzer, Robert Altschaffel, Eric Clausing and Maik Schott, et al |
|
Image Forensics of High Dynamic Range Imaging / Philip J. Bateman, Anthony T.S. Ho and Johann A. Briffa -- Improved Run Length Based Detection of Digital Image Splicing / Zhongwei He, Wei Lu and Wei Sun -- Median Filtering Detection Using Edge Based Prediction Matrix / Chenglong Chen and Jiangqun Ni -- New Feature Presentation of Transition Probability Matrix for Image Tampering Detection / Luyi Chen, Shilin Wang, Shenghong Li and Jianhua Li -- Performance and Robustness Analysis for Some Re-sampling Detection Techniques in Digital Images / Hieu Cuong Nguyen and Stefan Katzenbeisser -- Alternative Anti-Forensics Method for Contrast Enhancement / Chun-Wing Kwok, O.C. Au and Sung-Him Chui -- Anti-Forensics of Double JPEG Compression Detection / Patchara Sutthiwan and Yun Q. Shi -- (r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images / Xiaofeng Wang, Zhen Li, Xiaoni Zhang, Shangping Wang and Jing Chen -- An Algorithm for k-Anonymity-Based Fingerprinting / Sebastian Schrittwieser, Peter Kieseberg, Isao Echizen, Sven Wohlgemuth and Noboru Sonehara, et al. -- Contribution of Non-scrambled Chroma Information in Privacy-Protected Face Images to Privacy Leakage / Hosik Sohn, Dohyoung Lee, Wesley De Neve, Konstantinos N. Plataniotis and Yong Man Ro -- Perceptual Image Hashing via Wave Atom Transform / Fang Liu and Lee-Ming Cheng -- Witsenhausen's Counterexample and Its Links with Multimedia Security Problems / Pedro Comesaña, Fernando Pérez-González and Chaouki T. Abdallah -- Data Forensics Constructions from Cryptographic Hashing and Coding / Giovanni Di Crescenzo and Gonzalo Arce.006m d |
Summary |
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on Digital-forensics and Watermarking (IWDW 2011) held in Atlantic City, NJ, USA, during October 23-26, 2011. The 37 revised full papers presented were carefully selected from 59 submissions. Conference papers are organized in 6 technical sessions, covering the topics of steganography and steganalysis, watermarking, visual cryptography, forensics, anti-forensics, fingerprinting, privacy and security |
Analysis |
Computer science |
|
Data structures (Computer science) |
|
Data encryption (Computer science) |
|
Information storage and retrieval systems |
|
Computer graphics |
|
Computer vision |
|
Data Structures, Cryptology and Information Theory |
|
Information Storage and Retrieval |
|
Image Processing and Computer Vision |
|
computerwetenschappen |
|
computer sciences |
|
beeldverwerking |
|
image processing |
|
machine vision |
|
informatieontsluiting |
|
information retrieval |
|
informatieopslag |
|
information storage |
|
informatietheorie |
|
information theory |
|
gegevensstructuren |
|
data structures |
|
computergrafie |
|
gegevensbeheer |
|
data management |
|
Information and Communication Technology (General) |
|
Informatie- en communicatietechnologie (algemeen) |
Bibliography |
Includes bibliographical references and author index |
Notes |
Online resource; title from PDF title page (SpringerLink, viewed August 14, 2012) |
Subject |
Data encryption (Computer science) -- Congresses
|
|
Informatique.
|
|
Data encryption (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Shi, Yun Q.
|
|
Kim, Hyoung Joong, 1954-
|
|
Pérez-González, F. (Fernando), 1967-
|
ISBN |
9783642322051 |
|
3642322050 |
|