Book Cover
E-book
Author IWDW (Conference) (10th : 2011 : Atlantic City, N.J.)

Title Digital forensics and watermarking : 10th International Workshop, IWDW 2011, Atlantic City, NY, October 23-26, 2011, Revised selected papers / Yun Qing Shi, Hyoung-Joong Kim, Fernando Perez-Gonzalez (eds.)
Published Berlin ; New York : Springer, ©2012

Copies

Description 1 online resource (xii, 512 pages) : illustrations
Series Lecture notes in computer science, 1611-3349 ; 7128
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7128. 1611-3349
LNCS sublibrary. SL 4, Security and cryptology.
Contents Modern Trends in Steganography and Steganalysis / Jessica Fridrich -- Photo Forensics -- There Is More to a Picture than Meets the Eye / Nasir Memon -- An Improved Matrix Encoding Scheme for JPEG Steganography / Vasily Sachnev and Hyoung Joong Kim -- Steganalysis of LSB Matching Revisited for Consecutive Pixels Using B-Spline Functions / Shunquan Tan -- A Drift Compensation Algorithm for H.264/AVC Video Robust Watermarking Scheme / Xinghao Jiang, Tanfeng Sun, Yue Zhou and Yun Q. Shi -- A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding / Junxiang Wang, Jiangqun Ni and Jinwei Pan -- A New Watermarking Method with Obfuscated Quasi-Chirp Transform / Kazuo Ohzeki, YuanYu Wei, Yutaka Hirakawa and Kiyotsugu Sato -- A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression / Hui Wang, Anthony T.S. Ho and Xi Zhao -- A Robust Audio Watermarking Scheme Based on Lifting Wavelet Transform and Singular Value Decomposition / Baiying Lei, Ing Yann Soon and Zhen Li -- Adaptive Selection of Embedding Locations for Spread Spectrum Watermarking of Compressed Audio / Alper Koz and Claude Delpha -- IR Hiding: Method to Prevent Re-recording Screen Image Built in Short Wavelength Pass Filter Detection Method Using Specular Reflection / Takayuki Yamada, Seiichi Gohshi and Isao Echizen -- IRIW: Image Retrieval Based Image Watermarking for Large-Scale Image Databases / Jong Yun Jun, Kunho Kim, Jae-Pil Heo and Sung-eui Yoon -- Self-recovery Fragile Watermarking Scheme with Variable Watermark Payload / Fan Chen, Hongjie He, Yaoran Huo and Hongxia Wang
Spread Spectrum-Based Multi-bit Watermarking for Free-View Video / Huawei Tian, Zheng Wang, Yao Zhao, Rongrong Ni and Lunming Qin -- Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates / Hongmei Liu, Lei Li, Jian Li and Jiwu Huang -- Use of "Emergable Watermarks" as Copy Indicators for Securing Video Content / Takaaki Yamada and Yoshiyasu Takahashi -- Authenticating Visual Cryptography Shares Using 2D Barcodes / Jonathan Weir and WeiQi Yan -- Flexible Visual Cryptography Scheme without Distortion / Feng Liu, Teng Guo, ChuanKun Wu and Ching-Nung Yang -- An Extended Visual Cryptography Scheme for Continuous-Tone Images / Yasushi Yamaguchi -- A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection / Xudong Zhao, Shilin Wang, Shenghong Li and Jianhua Li -- Blind Copy-Paste Detection Using Improved SIFT Ring Descriptor / Lin-na Zhou, Yun-biao Guo and Xin-gang You -- Camera Model Identification Based on the Characteristic of CFA and Interpolation / Shang Gao, Guanshuo Xu and Rui-Min Hu -- Detecting Re-captured Videos Using Shot-Based Photo Response Non-Uniformity / Dae-Jin Jung, Dai-Kyung Hyun, Seung-Jin Ryu, Ji-Won Lee and Hae-Yeoun Lee, et al. -- Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image Edges / Rong Zhang, Rang-Ding Wang and Tian-Tsong Ng -- Exposing Original and Duplicated Regions Using SIFT Features and Resampling Traces / David Vázquez-Padín and Fernando Pérez-González -- Fingerprint Forensics Application Protocol: Semi-automated Modeling and Verification of Watermark-Based Communication Using CASPER and FDR / Ronny Merkel, Christian Kraetzer, Robert Altschaffel, Eric Clausing and Maik Schott, et al
Image Forensics of High Dynamic Range Imaging / Philip J. Bateman, Anthony T.S. Ho and Johann A. Briffa -- Improved Run Length Based Detection of Digital Image Splicing / Zhongwei He, Wei Lu and Wei Sun -- Median Filtering Detection Using Edge Based Prediction Matrix / Chenglong Chen and Jiangqun Ni -- New Feature Presentation of Transition Probability Matrix for Image Tampering Detection / Luyi Chen, Shilin Wang, Shenghong Li and Jianhua Li -- Performance and Robustness Analysis for Some Re-sampling Detection Techniques in Digital Images / Hieu Cuong Nguyen and Stefan Katzenbeisser -- Alternative Anti-Forensics Method for Contrast Enhancement / Chun-Wing Kwok, O.C. Au and Sung-Him Chui -- Anti-Forensics of Double JPEG Compression Detection / Patchara Sutthiwan and Yun Q. Shi -- (r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images / Xiaofeng Wang, Zhen Li, Xiaoni Zhang, Shangping Wang and Jing Chen -- An Algorithm for k-Anonymity-Based Fingerprinting / Sebastian Schrittwieser, Peter Kieseberg, Isao Echizen, Sven Wohlgemuth and Noboru Sonehara, et al. -- Contribution of Non-scrambled Chroma Information in Privacy-Protected Face Images to Privacy Leakage / Hosik Sohn, Dohyoung Lee, Wesley De Neve, Konstantinos N. Plataniotis and Yong Man Ro -- Perceptual Image Hashing via Wave Atom Transform / Fang Liu and Lee-Ming Cheng -- Witsenhausen's Counterexample and Its Links with Multimedia Security Problems / Pedro Comesaña, Fernando Pérez-González and Chaouki T. Abdallah -- Data Forensics Constructions from Cryptographic Hashing and Coding / Giovanni Di Crescenzo and Gonzalo Arce.006m d
Summary This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on Digital-forensics and Watermarking (IWDW 2011) held in Atlantic City, NJ, USA, during October 23-26, 2011. The 37 revised full papers presented were carefully selected from 59 submissions. Conference papers are organized in 6 technical sessions, covering the topics of steganography and steganalysis, watermarking, visual cryptography, forensics, anti-forensics, fingerprinting, privacy and security
Analysis Computer science
Data structures (Computer science)
Data encryption (Computer science)
Information storage and retrieval systems
Computer graphics
Computer vision
Data Structures, Cryptology and Information Theory
Information Storage and Retrieval
Image Processing and Computer Vision
computerwetenschappen
computer sciences
beeldverwerking
image processing
machine vision
informatieontsluiting
information retrieval
informatieopslag
information storage
informatietheorie
information theory
gegevensstructuren
data structures
computergrafie
gegevensbeheer
data management
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Bibliography Includes bibliographical references and author index
Notes Online resource; title from PDF title page (SpringerLink, viewed August 14, 2012)
Subject Data encryption (Computer science) -- Congresses
Informatique.
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Shi, Yun Q.
Kim, Hyoung Joong, 1954-
Pérez-González, F. (Fernando), 1967-
ISBN 9783642322051
3642322050
Other Titles IWDW 2011