


default search action
17th IWDW 2018: Jeju Island, Korea
- Chang D. Yoo, Yun Qing Shi, Hyoung-Joong Kim, Alessandro Piva, Gwangsu Kim:

Digital Forensics and Watermarking - 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings. Lecture Notes in Computer Science 11378, Springer 2019, ISBN 978-3-030-11388-9
Deep Neural Networks for Digital Forensics
- Jingyu Ye

, Yuxi Shi, Guanshuo Xu, Yun-Qing Shi:
A Convolutional Neural Network Based Seam Carving Detection Scheme for Uncompressed Digital Images. 3-13 - Qian Zhang, Xianfeng Zhao

, Changjun Liu:
Convolutional Neural Network for Larger JPEG Images Steganalysis. 14-28 - Huilin Zheng, Xuan Li, Danyang Ruan, Xiangui Kang, Yun-Qing Shi:

Comparison of DCT and Gabor Filters in Residual Extraction of CNN Based JPEG Steganalysis. 29-39 - Shiyang Zhang, Hong Zhang

, Xianfeng Zhao
, Haibo Yu:
A Deep Residual Multi-scale Convolutional Network for Spatial Steganalysis. 40-52
Steganalysis and Identification
- Kuan Yang, Kejiang Chen

, Weiming Zhang, Nenghai Yu:
Provably Secure Generative Steganography Based on Autoregressive Model. 55-68 - Akira Nishimura:

A Novel Steganalysis of Steghide Focused on High-Frequency Region of Audio Waveform. 69-82 - Wei Zhao, Pengpeng Yang, Rongrong Ni, Yao Zhao, Wenjie Li:

Cycle GAN-Based Attack on Recaptured Images to Fool both Human and Machine. 83-92
Watermarking
- Jihyeon Kang, Sang-Keun Ji, Heung-Kyu Lee:

Spherical Panorama Image Watermarking Using Viewpoint Detection. 95-109 - Hannes Mareen, Johan De Praeter, Glenn Van Wallendael

, Peter Lambert:
Traitor Tracing After Visible Watermark Removal. 110-123 - Yiming Xue, Kai Mu, Yan Li, Juan Wen, Ping Zhong, Shaozhang Niu:

Improved High Capacity Spread Spectrum-Based Audio Watermarking by Hadamard Matrices. 124-136 - Nicolò Cardamone, Fabrizio d'Amore:

DWT and QR Code Based Watermarking for Document DRM. 137-150 - David Niyitegeka, Gouenou Coatrieux, Reda Bellafqira, Emmanuelle Génin, Javier Franco-Contreras:

Dynamic Watermarking-Based Integrity Protection of Homomorphically Encrypted Databases - Application to Outsourced Genetic Data. 151-166
Reversible Data Hiding
- Bo Ou

, Xiaolong Li, Wei Li, Yun-Qing Shi:
Pixel-Value-Ordering Based Reversible Data Hiding with Adaptive Texture Classification and Modification. 169-179 - Chang Song, Yifeng Zhang, Guojun Lu

:
Reversible Data Hiding in Encrypted Images Based on Image Partition and Spatial Correlation. 180-194 - Bin Ma, Xiaoyu Wang, Bing Li, Yun-Qing Shi:

A Multiple Linear Regression Based High-Accuracy Error Prediction Algorithm for Reversible Data Hiding. 195-205 - Yinyin Peng, Zhao-Xia Yin:

A Strategy of Distinguishing Texture Feature for Reversible Data Hiding Based on Histogram Shifting. 206-215 - Fan Chen, Yuan Yuan, Yuyu Chen, Hongjie He, Lingfeng Qu

:
Reversible Data Hiding Scheme in Encrypted-Image Based on Prediction and Compression Coding. 216-229
Steganographic Algorithms
- Yi Dong, Tanfeng Sun, Xinghao Jiang:

A High Capacity HEVC Steganographic Algorithm Using Intra Prediction Modes in Multi-sized Prediction Blocks. 233-247 - Xinzhi Yu, Kejiang Chen

, Weiming Zhang, Yaofei Wang
, Nenghai Yu:
Improving the Embedding Strategy for Batch Adaptive Steganography. 248-260 - Shijun Zhou, Weixuan Tang, Shunquan Tan, Bin Li:

Content-Adaptive Steganalysis via Augmented Utilization of Selection-Channel Information. 261-274 - Chen Gong, Xiaowei Yi, Xianfeng Zhao

:
Pitch Delay Based Adaptive Steganography for AMR Speech Stream. 275-289 - Théo Taburet, Louis Filstroff, Patrick Bas, Wadih Sawaya:

An Empirical Study of Steganography and Steganalysis of Color Images in the JPEG Domain. 290-303
Identification and Security
- Yuankun Huang

, Shunquan Tan, Bin Li, Jiwu Huang:
VPCID - A VoIP Phone Call Identification Database. 307-321 - Reda Bellafqira, Gouenou Coatrieux, Emmanuelle Génin, Michel Cozic:

Secure Multilayer Perceptron Based on Homomorphic Encryption. 322-336 - Sondos M. Fadl

, Qi Han, Qiong Li:
Surveillance Video Authentication Using Universal Image Quality Index of Temporal Average. 337-350
Special Session: Deep Generative Models for Forgery and Its Det
- Hakil Kim, Xuenan Cui, Man-Gyu Kim, Thi Hai Binh Nguyen:

Reconstruction of Fingerprints from Minutiae Using Conditional Adversarial Networks. 353-362 - Hyoungwoo Park, Minjeong Ju, Sangkeun Moon, Chang D. Yoo:

Unsupervised Domain Adaptation for Object Detection Using Distribution Matching in Various Feature Level. 363-372 - Muhammad Usama, Dong Eui Chang:

Towards Robust Neural Networks with Lipschitz Continuity. 373-389

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














