Digital-Forensics and Watermarking -

Digital-Forensics and Watermarking

14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers
Buch | Softcover
XVI, 448 Seiten
2016 | 1st ed. 2016
Springer International Publishing (Verlag)
978-3-319-31959-9 (ISBN)
53,49 inkl. MwSt

This book constitutes revised selected papers from the14th International Workshop on Digital-Forensics and Watermarking, IWDW 2015,held in Tokyo, Japan, in October 2015.

The 35 papers presented in this volume were carefullyreviewed and selected from 54 submissions. The contributions are organized intopical sections named: digital forensics; steganography and steganalysis;digital watermarking; reversible data hiding; and visual cryptography.

Digital Forensics.- Image Noise and Digital ImageForensics.- Camera Source Identification with Limited Labeled Training Set.- DetectingVideo Forgery By Estimating Extrinsic Camera Parameters.- Discriminatingbetween Computer-Generated Facial Images and Natural Ones Using SmoothnessProperty and Local Entropy.- Multiple MP3 Compression Detection based on theStatistical Properties of Scale Factors.- Detection of Double compression forHEVC videos based on the Co-occurrence Matrix of DCT coefficients.-An AdvancedTexture Analysis Method for Image Sharpening Detection.- Source Camera ModelIdentification Using Features from contaminated Sensor Noise.- Inter-frameForgery Detection for Static-Background Video Based on MVP Consistency.- AnEffective Detection Method Based On Physical Traits of Recaptured Images On LCDScreens.- Steganography and Steganalysis.- Video Steganalysis Based on IntraPrediction Mode Calibration.- Feature Selection for High DimensionalSteganalysis.- Syntheticspeech detection and audio steganography in VoIPscenarios.- Digital Watermarking.- Fingerprinting for Broadcast ContentDistribution System.- Image Watermarking Based on Reflectance Modification.- DigitalVideo Watermark Optimization for Detecting Replicated Two-Dimensional Barcodes.-An Authentication and Recovery Scheme for Digital Speech Signal based on DWT.- Enrichmentof Visual Appearance of Aesthetic QR Code.- Nondestructive Readout of CopyrightInformation Embedded in Objects Fabricated with 3-D Printers.- BlindWatermarking Based on Adaptive Lattice Quantization Index Modulation.- Self-embeddingWatermarking Scheme Based on MDS Codes.- Watermarking Method using ConcatenatedCode for Scaling and Rotation Attacks.- DCT-OFDM Based Watermarking SchemeRobust against Clipping, Rotation, and Scaling Attacks.- Robust Imperceptible VideoWatermarking for MPEG Compression and DA-AD Conversion Using Visual Masking.- Detectionof frequency-scale modification using robust audio watermarking based onamplitude modulation.- Audio Watermarking Using Different Wavelet Filters.- ReversibleData Hiding.- A Commutative Encryption and Reversible Watermarking forFingerprint Image.- Distortion-Free Robust Reversible Watermarking By Modifyingand Recording IWT Means of Image Blocks.- Reversible Data Hiding for EncryptedAudios by High Order Smoothness.- Completely Separable Reversible Data Hidingin Encrypted Images.- Optimal Histogram-pair and Prediction-error BasedReversible Data Hiding for Medical Images.- Visual Cryptography.- AuthenticatedSecret Sharing Scheme Based on GMEMD.- Robust Content-Based Image HashFunctions Using Nested Lattice Codes.- An Improved Aspect Ratio InvariantVisual Cryptography Scheme with Flexible Pixel Expansion.- A New Constructionof Tagged Visual Cryptography Scheme.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XVI, 448 p. 224 illus.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Applications • Audio Watermarking • biometrics • coding theory • Computer forensics • computer-generated image • Computer Science • conference proceedings • Data Compression • data encryption • data hiding • Digital rights management • Encryption • fingerprint • Hash Functions • image authentication • Informatics • Information Hiding • message authentication codes • Research • Steganography • Support Vector Machine • video steganalysis • visual cryptography • watermark optimization
ISBN-10 3-319-31959-0 / 3319319590
ISBN-13 978-3-319-31959-9 / 9783319319599
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich