


default search action
9. IWDW 2010: Seoul, Korea,
- Hyoung-Joong Kim, Yun-Qing Shi, Mauro Barni:

Digital Watermarking - 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6526, Springer 2011, ISBN 978-3-642-18404-8 - Yu Qian Zhao, Frank Y. Shih, Yun Q. Shi:

Passive Detection of Paint-Doctored JPEG Images. 1-11 - Xudong Zhao, Jianhua Li, Shenghong Li, Shilin Wang:

Detecting Digital Image Splicing in Chroma Spaces. 12-22 - Feng Pan, Jiwu Huang:

Discriminating Computer Graphics Images and Natural Images Using Hidden Markov Tree Model. 23-28 - Liang Zhao, Avishek Adhikari, Kouichi Sakurai:

A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane. 29-44 - Liang Zhao, Avishek Adhikari, Di Xiao, Kouichi Sakurai:

Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit. 45-59 - Jonathan Weir, WeiQi Yan:

Plane Transform Visual Cryptography. 60-74 - Gopal Narayanan, Yun-Qing Shi:

A Statistical Model for Quantized AC Block DCT Coefficients in JPEG Compression and its Application to Detecting Potential Compression History in Bitmap Images. 75-89 - Xinting Gao, Bo Qiu

, JingJing Shen, Tian-Tsong Ng
, Yun-Qing Shi:
A Smart Phone Image Database for Single Image Recapture Detection. 90-104 - Hong Cao, Alex C. Kot:

Detection of Tampering Inconsistencies on Mobile Photos. 105-119 - Wei Wang

, Jing Dong, Tieniu Tan:
Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise. 120-133 - Shijun Xiang:

Robust Audio Watermarking by Using Low-Frequency Histogram. 134-147 - H. Y. Leung, Lee-Ming Cheng

:
Robust Blind Watermarking Scheme Using Wave Atoms. 148-158 - Peter Meerwald

, Andreas Uhl:
Robust Watermarking of H.264/SVC-Encoded Video: Quality and Resolution Scalability. 159-169 - Bo Ou

, Yao Zhao, Rongrong Ni:
Reversible Watermarking Using Prediction Error Histogram and Blocking. 170-180 - Keming Dong, Hyoung-Joong Kim:

An Efficient Pattern Substitution Watermarking Method for Binary Images. 181-188 - Fangjun Huang, Yun-Qing Shi, Jiwu Huang:

New JPEG Steganographic Scheme with High Security Performance. 189-201 - Vasiliy Sachnev, Hyoung-Joong Kim:

Ternary Data Hiding Technique for JPEG Steganography. 202-210 - Xuping Zheng, Aixin Zhang, Shenghong Li, Bo Jin, Junhua Tang:

Interleaving Embedding Scheme for ECC-Based Multimedia Fingerprinting. 211-223 - Hefei Ling, Hui Feng, Fuhao Zou, WeiQi Yan, Zhengding Lu:

A Novel Collusion Attack Strategy for Digital Fingerprinting. 224-238 - Esla Timothy Anzaku, Hosik Sohn, Yong Man Ro

:
Privacy Preserving Facial and Fingerprint Multi-biometric Authentication. 239-250 - Zhili Chen, Liusheng Huang, Peng Meng, Wei Yang, Haibo Miao:

Blind Linguistic Steganalysis against Translation Based Steganography. 251-265 - Qingxiao Guan, Jing Dong, Tieniu Tan:

Blind Quantitative Steganalysis Based on Feature Fusion and Gradient Boosting. 266-279 - Takayuki Yamada, Seiichi Gohshi, Isao Echizen:

IR Hiding: A Method to Prevent Video Re-shooting by Exploiting Differences between Human Perceptions and Recording Device Characteristics. 280-292 - Zahra Kavehvash, Shahrokh Ghaemmaghami:

On Limits of Embedding in 3D Images Based on 2D Watson's Model. 293-304 - Xuping Huang, Akira Nishimura, Isao Echizen:

A Reversible Acoustic Steganography for Integrity Verification. 305-316

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














