Digital-Forensics and Watermarking
14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers
Herausgegeben:Shi, Yun-Qing; Kim, Hyoung Joong; Pérez-González, Fernando; Echizen, Isao
Digital-Forensics and Watermarking
14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers
Herausgegeben:Shi, Yun-Qing; Kim, Hyoung Joong; Pérez-González, Fernando; Echizen, Isao
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes revised selected papers from the14th International Workshop on Digital-Forensics and Watermarking, IWDW 2015,held in Tokyo, Japan, in October 2015.
The 35 papers presented in this volume were carefullyreviewed and selected from 54 submissions. The contributions are organized intopical sections named: digital forensics; steganography and steganalysis;digital watermarking; reversible data hiding; and visual cryptography.
Andere Kunden interessierten sich auch für
- Digital Forensics and Watermarking39,99 €
- Digital Forensics and Watermarking39,99 €
- Digital Forensics and Watermarking39,99 €
- Information Hiding39,99 €
- Transactions on Data Hiding and Multimedia Security I41,99 €
- AndersonInformation Hiding41,99 €
- Yun Q. Shi (Volume ed.)Transactions on Data Hiding and Multimedia Security III39,99 €
-
-
-
This book constitutes revised selected papers from the14th International Workshop on Digital-Forensics and Watermarking, IWDW 2015,held in Tokyo, Japan, in October 2015.
The 35 papers presented in this volume were carefullyreviewed and selected from 54 submissions. The contributions are organized intopical sections named: digital forensics; steganography and steganalysis;digital watermarking; reversible data hiding; and visual cryptography.
The 35 papers presented in this volume were carefullyreviewed and selected from 54 submissions. The contributions are organized intopical sections named: digital forensics; steganography and steganalysis;digital watermarking; reversible data hiding; and visual cryptography.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 9569
- Verlag: Springer / Springer International Publishing / Springer, Berlin
- Artikelnr. des Verlages: 978-3-319-31959-9
- 1st ed. 2016
- Seitenzahl: 464
- Erscheinungstermin: 31. März 2016
- Englisch
- Abmessung: 235mm x 155mm x 25mm
- Gewicht: 698g
- ISBN-13: 9783319319599
- ISBN-10: 3319319590
- Artikelnr.: 44612891
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Lecture Notes in Computer Science 9569
- Verlag: Springer / Springer International Publishing / Springer, Berlin
- Artikelnr. des Verlages: 978-3-319-31959-9
- 1st ed. 2016
- Seitenzahl: 464
- Erscheinungstermin: 31. März 2016
- Englisch
- Abmessung: 235mm x 155mm x 25mm
- Gewicht: 698g
- ISBN-13: 9783319319599
- ISBN-10: 3319319590
- Artikelnr.: 44612891
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Digital Forensics.- Image Noise and Digital ImageForensics.- Camera Source Identification with Limited Labeled Training Set.- DetectingVideo Forgery By Estimating Extrinsic Camera Parameters.- Discriminatingbetween Computer-Generated Facial Images and Natural Ones Using SmoothnessProperty and Local Entropy.- Multiple MP3 Compression Detection based on theStatistical Properties of Scale Factors.- Detection of Double compression forHEVC videos based on the Co-occurrence Matrix of DCT coefficients.-An AdvancedTexture Analysis Method for Image Sharpening Detection.- Source Camera ModelIdentification Using Features from contaminated Sensor Noise.- Inter-frameForgery Detection for Static-Background Video Based on MVP Consistency.- AnEffective Detection Method Based On Physical Traits of Recaptured Images On LCDScreens.- Steganography and Steganalysis.- Video Steganalysis Based on IntraPrediction Mode Calibration.- Feature Selection for High DimensionalSteganalysis.- Syntheticspeech detection and audio steganography in VoIPscenarios.- Digital Watermarking.- Fingerprinting for Broadcast ContentDistribution System.- Image Watermarking Based on Reflectance Modification.- DigitalVideo Watermark Optimization for Detecting Replicated Two-Dimensional Barcodes.-An Authentication and Recovery Scheme for Digital Speech Signal based on DWT.- Enrichmentof Visual Appearance of Aesthetic QR Code.- Nondestructive Readout of CopyrightInformation Embedded in Objects Fabricated with 3-D Printers.- BlindWatermarking Based on Adaptive Lattice Quantization Index Modulation.- Self-embeddingWatermarking Scheme Based on MDS Codes.- Watermarking Method using ConcatenatedCode for Scaling and Rotation Attacks.- DCT-OFDM Based Watermarking SchemeRobust against Clipping, Rotation, and Scaling Attacks.- Robust Imperceptible VideoWatermarking for MPEG Compression and DA-AD Conversion Using Visual Masking.- Detectionof frequency-scale modification using robust audio watermarking based onamplitude modulation.- Audio Watermarking Using Different Wavelet Filters.- ReversibleData Hiding.- A Commutative Encryption and Reversible Watermarking forFingerprint Image.- Distortion-Free Robust Reversible Watermarking By Modifyingand Recording IWT Means of Image Blocks.- Reversible Data Hiding for EncryptedAudios by High Order Smoothness.- Completely Separable Reversible Data Hidingin Encrypted Images.- Optimal Histogram-pair and Prediction-error BasedReversible Data Hiding for Medical Images.- Visual Cryptography.- AuthenticatedSecret Sharing Scheme Based on GMEMD.- Robust Content-Based Image HashFunctions Using Nested Lattice Codes.- An Improved Aspect Ratio InvariantVisual Cryptography Scheme with Flexible Pixel Expansion.- A New Constructionof Tagged Visual Cryptography Scheme.
Digital Forensics.- Image Noise and Digital ImageForensics.- Camera Source Identification with Limited Labeled Training Set.- DetectingVideo Forgery By Estimating Extrinsic Camera Parameters.- Discriminatingbetween Computer-Generated Facial Images and Natural Ones Using SmoothnessProperty and Local Entropy.- Multiple MP3 Compression Detection based on theStatistical Properties of Scale Factors.- Detection of Double compression forHEVC videos based on the Co-occurrence Matrix of DCT coefficients.-An AdvancedTexture Analysis Method for Image Sharpening Detection.- Source Camera ModelIdentification Using Features from contaminated Sensor Noise.- Inter-frameForgery Detection for Static-Background Video Based on MVP Consistency.- AnEffective Detection Method Based On Physical Traits of Recaptured Images On LCDScreens.- Steganography and Steganalysis.- Video Steganalysis Based on IntraPrediction Mode Calibration.- Feature Selection for High DimensionalSteganalysis.- Syntheticspeech detection and audio steganography in VoIPscenarios.- Digital Watermarking.- Fingerprinting for Broadcast ContentDistribution System.- Image Watermarking Based on Reflectance Modification.- DigitalVideo Watermark Optimization for Detecting Replicated Two-Dimensional Barcodes.-An Authentication and Recovery Scheme for Digital Speech Signal based on DWT.- Enrichmentof Visual Appearance of Aesthetic QR Code.- Nondestructive Readout of CopyrightInformation Embedded in Objects Fabricated with 3-D Printers.- BlindWatermarking Based on Adaptive Lattice Quantization Index Modulation.- Self-embeddingWatermarking Scheme Based on MDS Codes.- Watermarking Method using ConcatenatedCode for Scaling and Rotation Attacks.- DCT-OFDM Based Watermarking SchemeRobust against Clipping, Rotation, and Scaling Attacks.- Robust Imperceptible VideoWatermarking for MPEG Compression and DA-AD Conversion Using Visual Masking.- Detectionof frequency-scale modification using robust audio watermarking based onamplitude modulation.- Audio Watermarking Using Different Wavelet Filters.- ReversibleData Hiding.- A Commutative Encryption and Reversible Watermarking forFingerprint Image.- Distortion-Free Robust Reversible Watermarking By Modifyingand Recording IWT Means of Image Blocks.- Reversible Data Hiding for EncryptedAudios by High Order Smoothness.- Completely Separable Reversible Data Hidingin Encrypted Images.- Optimal Histogram-pair and Prediction-error BasedReversible Data Hiding for Medical Images.- Visual Cryptography.- AuthenticatedSecret Sharing Scheme Based on GMEMD.- Robust Content-Based Image HashFunctions Using Nested Lattice Codes.- An Improved Aspect Ratio InvariantVisual Cryptography Scheme with Flexible Pixel Expansion.- A New Constructionof Tagged Visual Cryptography Scheme.