Digital forensics and watermaking : 11th International Workshop, IWDW 2012, Shanghai, China, October 31-November 3, 2012 : revised selected papers /

This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70...

Full description

Saved in:
Bibliographic Details
Corporate Authors: IWDW (Conference) Shanghai, China); SpringerLink (Online service)
Group Author: Shi, Yun Q.; Kim, Hyoung Joong, 1954-; Pérez-González, F. (Fernando), 1967-
Published: Springer,
Publisher Address: Heidelberg :
Publication Dates: 2013.
Literature type: eBook
Language: English
Series: Lecture Notes in Computer Science, 7809
LNCS sublibrary. SL 4, Security and cryptology
Subjects:
Online Access: http://dx.doi.org/10.1007/978-3-642-40099-5
Summary: This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography.
Carrier Form: 1 online resource (xx, 532 pages) : illustrations.
Bibliography: Includes bibliographical references and author index.
ISBN: 9783642400995 (electronic bk.)
364240099X (electronic bk.)
3642400981 (Print)
9783642400988 (Print)
Index Number: QA76
CLC: TP309-532
Contents: Invited Lectures (Abstracts) --
Steganography and Steganalysis.
New Channel Selection Criterion for Spatial Domain Steganography /
A Study of Optimal Matrix for Efficient Matrix Embedding in F3 /
A Novel Mapping Scheme for Steganalysis /
Steganalysis of LSB Matching Based on the Sum Features of Average Co-occurrence Matrix Using Image Estimation /
Calibration Based Reliable Detector for Detecting LSB Matching Steganography /
LSB Replacement Steganography Software Detection Based on Model Checking /
An Attempt to Generalize Distortion Measure for JPEG Steganography /
Watermarking and Copyright Protection.
Optimal Data Embedding in 3D Models for Extraction from 2D Views Using Perspective Invariants /
Consideration of the Watermark Inversion Attack and Its Invalidation Framework /
Geometrically Invariant Image Blind Watermarking Based on Speeded-Up Robust Features and DCT Transform /
Self-embedding Fragile Watermarking Scheme Combined Average with VQ Encoding /
An Efficient Fragile Web Pages Watermarking for Integrity Protection of XML Documents /
Image Information Hiding Based on Binary Holography of Iterative Conjugate-Symmetric Extension /
High Capacity Data Hiding for Halftone Image Authentication /
Coded Spread Spectrum Watermarking Scheme /
Enhancement of Method for Preventing Unauthorized Copying of Displayed Information Using Object Surface Reflection /
Forensics and Anti-Forensics.
Image Splicing Verification Based on Pixel-Based Alignment Method /
Multimedia Operator Chain Topology and Ordering Estimation Based on Detection and Information Theoretic Tools /
Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns /
Detecting Removed Object from Video with Stationary Background /
A Novel Video Inter-frame Forgery Model Detection Scheme Based on Optical Flow Consistency /
Countering Universal Image Tampering Detection with Histogram Restoration /
Face Verification Using Color Sparse Representation /
Rapid Image Splicing Detection Based on Relevance Vector Machine /
An Efficient Speech Content Authentication Algorithm Based on Coefficients Self-correlation Degree /
Saliency-Based Region Log Covariance Feature for Image Copy Detection /
Blind Detection of Electronic Voice Transformation with Natural Disguise /
Robust Median Filtering Detection Based on Filtered Residual /
Reversible Data Hiding.
Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence Modulation /
Optimal Histogram-Pair and Prediction-Error Based Image Reversible Data Hiding /
An Improved Algorithm for Reversible Data Hiding in Encrypted Image /
Reversible Watermarking for Audio Authentication Based on Integer DCT and Expansion Embedding /
Fingerprinting and Authentication.
Automatic Anonymous Fingerprinting of Text Posted on Social Networking Services /
Memoryless Hash-Based Perceptual Image Authentication /
Visual Cryptography.
Visual Cryptography Based Watermarking: Definition and Meaning /
Region-in-Region Incrementing Visual Cryptography Scheme /
A Secret Enriched Visual Cryptography /
On the Security of Multi-secret Visual Cryptography Scheme with Ring Shares /
Others.
An Image Super-Resolution Scheme Based on Compressive Sensing with PCA Sparse Representation /
A Robust Image Classification Scheme with Sparse Coding and Multiple Kernel Learning /