skip to content
Digital forensics and watermaking : 11th International Workshop, IWDW 2012, Shanghai, China, October 31-November 3, 2012, Revised selected papers Preview this item
ClosePreview this item
Checking...

Digital forensics and watermaking : 11th International Workshop, IWDW 2012, Shanghai, China, October 31-November 3, 2012, Revised selected papers

Author: Yun Q Shi; Hyoung Joong Kim; F Pérez-González
Publisher: Heidelberg : Springer, 2013.
Series: Lecture notes in computer science, 7809.; LNCS sublibrary., SL 4,, Security and cryptology.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Summary:
This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Congress
Electronic books
Ebook
Conference papers and proceedings
Congresses
Additional Physical Format: Printed edition:
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Yun Q Shi; Hyoung Joong Kim; F Pérez-González
ISBN: 9783642400995 364240099X 3642400981 9783642400988
OCLC Number: 856903317
Description: 1 online resource (xx, 532 pages) : illustrations
Contents: Invited Lectures (Abstracts) --
Session 1: Steganography and Steganalysis. New Channel Selection Criterion for Spatial Domain Steganography / Yane Zhong, Fangjun Huang, Dong Zhang --
A Study of Optimal Matrix for Efficient Matrix Embedding in F3 / Yuanzhi Qi [and others] --
A Novel Mapping Scheme for Steganalysis / Licong Chen [and others] --
Steganalysis of LSB Matching Based on the Sum Features of Average Co-occurrence Matrix Using Image Estimation / Yan-qing Guo [and others] --
Calibration Based Reliable Detector for Detecting LSB Matching Steganography / Fei Peng, Xiaolong Li, Bin Yang --
LSB Replacement Steganography Software Detection Based on Model Checking / Zheng Zhao [and others] --
An Attempt to Generalize Distortion Measure for JPEG Steganography / Vasily Sachnev, Hyoung Joong Kim. Session 2: Watermarking and Copyright Protection. Optimal Data Embedding in 3D Models for Extraction from 2D Views Using Perspective Invariants / Yağız Yaşaroğlu, A. Aydın Alatan --
Consideration of the Watermark Inversion Attack and Its Invalidation Framework / Kazuo Ohzeki [and others] --
Geometrically Invariant Image Blind Watermarking Based on Speeded-Up Robust Features and DCT Transform / Huang Zhang, Xiao-Qiang Li --
Self-embedding Fragile Watermarking Scheme Combined Average with VQ Encoding / Hongjie He, Fan Chen, Yaoran Huo --
An Efficient Fragile Web Pages Watermarking for Integrity Protection of XML Documents / Quan Wen, Yufei Wang --
Image Information Hiding Based on Binary Holography of Iterative Conjugate-Symmetric Extension / Qiyin Zhao [and others] --
High Capacity Data Hiding for Halftone Image Authentication / Meng Guo, Hongbin Zhang --
Coded Spread Spectrum Watermarking Scheme / Minoru Kuribayashi --
Enhancement of Method for Preventing Unauthorized Copying of Displayed Information Using Object Surface Reflection / Takayuki Yamada, Seiichi Gohshi, Isao Echizen. Session 3: Forensics and Anti-Forensics. Image Splicing Verification Based on Pixel-Based Alignment Method / Rimba Whidiana Ciptasari, Kyung-Hyune Rhee, Kouichi Sakurai --
Multimedia Operator Chain Topology and Ordering Estimation Based on Detection and Information Theoretic Tools / Pedro Comesaña, Fernando Pérez-González --
Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns / Zhaohong Li, Jingyu Ye, Yun Qing Shi --
Detecting Removed Object from Video with Stationary Background / Leida Li [and others]Audio Forgery Detection Based on Max Offsets for Cross Correlation between ENF and Reference Signal / Yongjian Hu [and others] --
A Novel Video Inter-frame Forgery Model Detection Scheme Based on Optical Flow Consistency / Juan Chao, Xinghao Jiang, Tanfeng Sun --
Countering Universal Image Tampering Detection with Histogram Restoration / Luyi Chen [and others] --
Face Verification Using Color Sparse Representation / Wook Jin Shin [and others] --
Rapid Image Splicing Detection Based on Relevance Vector Machine / Bo Su [and others] --
An Efficient Speech Content Authentication Algorithm Based on Coefficients Self-correlation Degree / Zhenghui Liu, Hongxia Wang --
Saliency-Based Region Log Covariance Feature for Image Copy Detection / Xin He [and others] --
Blind Detection of Electronic Voice Transformation with Natural Disguise / Yong Wang [and others] --
Robust Median Filtering Detection Based on Filtered Residual / Anjie Peng, Xiangui Kang. Session 4: Reversible Data Hiding. Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence Modulation / Xinpeng Zhang, Chuan Qin, Guangling Sun --
Optimal Histogram-Pair and Prediction-Error Based Image Reversible Data Hiding / Guorong Xuan [and others] --
An Improved Algorithm for Reversible Data Hiding in Encrypted Image / Jie Yu [and others] --
Reversible Watermarking for Audio Authentication Based on Integer DCT and Expansion Embedding / Quan Chen, Shijun Xiang, Xinrong Luo. Session 5: Fingerprinting and Authentication. Automatic Anonymous Fingerprinting of Text Posted on Social Networking Services / Hoang-Quoc Nguyen-Son [and others] --
Memoryless Hash-Based Perceptual Image Authentication / Fang Liu, Qi-Kai Fu, Lee-Ming Cheng. Session 6: Visual Cryptography. Visual Cryptography Based Watermarking: Definition and Meaning / Stelvio Cimato, James Ching-Nung Yang, Chih-Cheng Wu --
Region-in-Region Incrementing Visual Cryptography Scheme / Ching-Nung Yang, Yi-Chin Lin, Chih-Cheng Wu --
A Secret Enriched Visual Cryptography / Feng Liu [and others] --
On the Security of Multi-secret Visual Cryptography Scheme with Ring Shares / Zheng-Xin Fu, Bin Yu. Session 7: Others. An Image Super-Resolution Scheme Based on Compressive Sensing with PCA Sparse Representation / Aixin Zhang [and others]A Novel JFE Scheme for Social Multimedia Distribution in Compressed Domain Using SVD and CA / Conghuan Ye [and others] --
A Robust Image Classification Scheme with Sparse Coding and Multiple Kernel Learning / Dongyang Cheng, Tanfeng Sun, Xinghao Jiang.
Series Title: Lecture notes in computer science, 7809.; LNCS sublibrary., SL 4,, Security and cryptology.
Other Titles: IWDW 2012
Responsibility: Yun Q. Shi, Hyoung-Joong Kim, Fernando Pérez-González (eds.).

Abstract:

This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(3)

User lists with this item (2)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/856903317> # Digital forensics and watermaking : 11th International Workshop, IWDW 2012, Shanghai, China, October 31-November 3, 2012, Revised selected papers
    a schema:MediaObject, schema:CreativeWork, schema:Book ;
    library:oclcnum "856903317" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/3862601735#Topic/computer_security> ; # Computer Security
    schema:about <http://dewey.info/class/005.82/e23/> ;
    schema:about <http://id.worldcat.org/fast/887935> ; # Data encryption (Computer science)
    schema:alternateName "IWDW 2012" ;
    schema:bookFormat schema:EBook ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/3862601735#Meeting/iwdw_conference_11th_2012_shanghai_china> ; # IWDW (Conference) (11th : 2012 : Shanghai, China)
    schema:datePublished "2013" ;
    schema:description "This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography."@en ;
    schema:editor <http://viaf.org/viaf/100446578> ; # Hyoung Joong Kim
    schema:editor <http://viaf.org/viaf/78057398> ; # Fernando Pérez-González
    schema:editor <http://viaf.org/viaf/122299767> ; # Yun Q. Shi
    schema:exampleOfWork <http://worldcat.org/entity/work/id/3862601735> ;
    schema:genre "Ebook"@en ;
    schema:genre "Conference papers and proceedings"@en ;
    schema:genre "Congress"@en ;
    schema:genre "Conference publication"@en ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/3862601735#Series/lecture_notes_in_computer_science> ; # Lecture notes in computer science ;
    schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture Notes in Computer Science,
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/3862601735#Series/lncs_sublibrary> ; # LNCS sublibrary.
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/3862601735#Series/lncs_sublibrary_sl_4_security_and_cryptology> ; # LNCS sublibrary. SL 4, Security and cryptology
    schema:isSimilarTo <http://worldcat.org/entity/work/data/3862601735#CreativeWork/> ;
    schema:name "Digital forensics and watermaking : 11th International Workshop, IWDW 2012, Shanghai, China, October 31-November 3, 2012, Revised selected papers"@en ;
    schema:productID "856903317" ;
    schema:url <http://books.scholarsportal.info/viewdoc.html?id=/ebooks/ebooks3/springer/2013-09-20/1/9783642400995> ;
    schema:url <https://doi.org/10.1007/978-3-642-40099-5> ;
    schema:url <https://link.springer.com/openurl?genre=book&isbn=978-3-642-40098-8> ;
    schema:url <http://link.springer.com/10.1007/978-3-642-40099-5> ;
    schema:url <http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=3093288> ;
    schema:url <http://www.library.yorku.ca/e/resolver/id/2498126> ;
    schema:url <http://link.springer.com/openurl?genre=book&isbn=978-3-642-40098-8> ;
    schema:url <http://www.library.yorku.ca/e/resolver/id/2498127> ;
    schema:url <https://0-link-springer-com.pugwash.lib.warwick.ac.uk/10.1007/978-3-642-40099-5> ;
    schema:workExample <http://worldcat.org/isbn/9783642400988> ;
    schema:workExample <http://dx.doi.org/10.1007/978-3-642-40099-5> ;
    schema:workExample <http://worldcat.org/isbn/9783642400995> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/856903317> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/3862601735#Meeting/iwdw_conference_11th_2012_shanghai_china> # IWDW (Conference) (11th : 2012 : Shanghai, China)
    a bgn:Meeting, schema:Event ;
    schema:location <http://experiment.worldcat.org/entity/work/data/3862601735#Place/shanghai_china> ; # Shanghai, China)
    schema:name "IWDW (Conference) (11th : 2012 : Shanghai, China)" ;
    .

<http://experiment.worldcat.org/entity/work/data/3862601735#Place/shanghai_china> # Shanghai, China)
    a schema:Place ;
    schema:name "Shanghai, China)" ;
    .

<http://experiment.worldcat.org/entity/work/data/3862601735#Series/lecture_notes_in_computer_science> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/856903317> ; # Digital forensics and watermaking : 11th International Workshop, IWDW 2012, Shanghai, China, October 31-November 3, 2012, Revised selected papers
    schema:name "Lecture notes in computer science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/3862601735#Series/lncs_sublibrary> # LNCS sublibrary.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/856903317> ; # Digital forensics and watermaking : 11th International Workshop, IWDW 2012, Shanghai, China, October 31-November 3, 2012, Revised selected papers
    schema:name "LNCS sublibrary." ;
    .

<http://experiment.worldcat.org/entity/work/data/3862601735#Series/lncs_sublibrary_sl_4_security_and_cryptology> # LNCS sublibrary. SL 4, Security and cryptology
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/856903317> ; # Digital forensics and watermaking : 11th International Workshop, IWDW 2012, Shanghai, China, October 31-November 3, 2012, Revised selected papers
    schema:name "LNCS sublibrary. SL 4, Security and cryptology" ;
    .

<http://experiment.worldcat.org/entity/work/data/3862601735#Topic/computer_security> # Computer Security
    a schema:Intangible ;
    schema:name "Computer Security"@en ;
    .

<http://id.worldcat.org/fast/887935> # Data encryption (Computer science)
    a schema:Intangible ;
    schema:name "Data encryption (Computer science)"@en ;
    .

<http://viaf.org/viaf/100446578> # Hyoung Joong Kim
    a schema:Person ;
    schema:birthDate "1954" ;
    schema:familyName "Kim" ;
    schema:givenName "Hyoung Joong" ;
    schema:name "Hyoung Joong Kim" ;
    .

<http://viaf.org/viaf/122299767> # Yun Q. Shi
    a schema:Person ;
    schema:familyName "Shi" ;
    schema:givenName "Yun Q." ;
    schema:name "Yun Q. Shi" ;
    .

<http://viaf.org/viaf/78057398> # Fernando Pérez-González
    a schema:Person ;
    schema:birthDate "1967" ;
    schema:familyName "Pérez-González" ;
    schema:givenName "Fernando" ;
    schema:givenName "F." ;
    schema:name "Fernando Pérez-González" ;
    .

<http://worldcat.org/entity/work/data/3862601735#CreativeWork/>
    a schema:CreativeWork ;
    schema:description "Printed edition:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/856903317> ; # Digital forensics and watermaking : 11th International Workshop, IWDW 2012, Shanghai, China, October 31-November 3, 2012, Revised selected papers
    .

<http://worldcat.org/isbn/9783642400988>
    a schema:ProductModel ;
    schema:isbn "3642400981" ;
    schema:isbn "9783642400988" ;
    .

<http://worldcat.org/isbn/9783642400995>
    a schema:ProductModel ;
    schema:isbn "364240099X" ;
    schema:isbn "9783642400995" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture Notes in Computer Science,
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/856903317> ; # Digital forensics and watermaking : 11th International Workshop, IWDW 2012, Shanghai, China, October 31-November 3, 2012, Revised selected papers
    schema:issn "0302-9743" ;
    schema:name "Lecture Notes in Computer Science," ;
    .

<http://www.worldcat.org/title/-/oclc/856903317>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/856903317> ; # Digital forensics and watermaking : 11th International Workshop, IWDW 2012, Shanghai, China, October 31-November 3, 2012, Revised selected papers
    schema:dateModified "2020-02-02" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.