


default search action
19th IWDW 2020: Melbourne, VIC, Australia
- Xianfeng Zhao

, Yun-Qing Shi, Alessandro Piva
, Hyoung Joong Kim
:
Digital Forensics and Watermarking - 19th International Workshop, IWDW 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12617, Springer 2021, ISBN 978-3-030-69448-7
Steganography and Steganalysis
- Yuting Hu, Zhongliang Yang, Han Cao, Yongfeng Huang

:
Multi-modal Steganography Based on Semantic Relevancy. 3-14 - Bingwen Feng, Zhiquan Liu

, Kaimin Wei, Wei Lu, Yuchun Lin:
Variable Rate Syndrome-Trellis Codes for Steganography on Bursty Channels. 15-30 - Zichi Wang, Guorui Feng, Xinpeng Zhang:

Steganographic Distortion Function for Enhanced Images. 31-40 - Yuting Hu, Han Cao, Zhongliang Yang, Yongfeng Huang

:
Improving Text-Image Matching with Adversarial Learning and Circle Loss for Multi-modal Steganography. 41-52 - Hongxia Wang, Zhilong Chen, Peisong He:

Constructing Immune Cover for Secure Steganography Based on an Artificial Immune System Approach. 53-67 - Sai Ma, Xianfeng Zhao

:
Generating JPEG Steganographic Adversarial Example via Segmented Adversarial Embedding. 68-79 - Jiajun Zou

, Zhongliang Yang, Si-yu Zhang, Sadaqat ur Rehman, Yongfeng Huang
:
High-Performance Linguistic Steganalysis, Capacity Estimation and Steganographic Positioning. 80-93 - Xianfeng Zhao

, Chunfang Yang, Fenlin Liu:
On the Sharing-Based Model of Steganography. 94-105
Watermarking
- Sebastian Gruber

, Bernd Neumayr, Christoph Fabianek, Eduard Gringinger
, Christoph Georg Schütz, Michael Schrefl:
Towards Informed Watermarking of Personal Health Sensor Data for Data Leakage Detection. 109-124 - KokSheik Wong

, Mohamed N. M. Nazeeb, Jean-Luc Dugelay:
Complete Quality Preserving Data Hiding in Animated GIF with Reversibility and Scalable Capacity Functionalities. 125-135 - Fei Peng

, Wenjie Qian, Min Long:
Visible Reversible Watermarking for 3D Models Based on Mesh Subdivision. 136-149
Multimedia Forensics
- Xiaoyu Zhao, Yakun Niu, Rongrong Ni, Yao Zhao:

Defocused Image Splicing Localization by Distinguishing Multiple Cues between Raw Naturally Blur and Artificial Blur. 153-167 - Yewei Gu, Xianfeng Zhao

, Chen Gong, Xiaowei Yi:
Deepfake Video Detection Using Audio-Visual Consistency. 168-180 - Robert Jöchl

, Andreas Uhl
:
A Machine Learning Approach to Approximate the Age of a Digital Image. 181-195 - Daniele Baracchi, Massimo Iuliani, Andrea G. Nencini, Alessandro Piva

:
Facing Image Source Attribution on iPhone X. 196-207 - Ivan Castillo Camacho, Kai Wang:

Data-Dependent Scaling of CNN's First Layer for Improved Image Manipulation Detection. 208-223 - Hui Zeng

, Kang Deng, Anjie Peng:
ISO Setting Estimation Based on Convolutional Neural Network and its Application in Image Forensics. 224-236 - Qilin Yin, Jinwei Wang, Xiangyang Luo:

A Hybrid Loss Network for Localization of Image Manipulation. 237-247
Security of AI-based Multimedia Applications
- Donghua Wang

, Rangding Wang
, Li Dong
, Diqun Yan
, Yiming Ren
:
Efficient Generation of Speech Adversarial Examples with Generative Model. 251-264 - Junjie Zhao, Jinwei Wang:

Lightweight DCT-Like Domain Forensics Model for Adversarial Example. 265-279

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














