Digital forensics and watermarking : 16th International Workshop, IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings /: 16th International Workshop, IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings. ([2017])
- Record Type:
- Book
- Title:
- Digital forensics and watermarking : 16th International Workshop, IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings /: 16th International Workshop, IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings. ([2017])
- Main Title:
- Digital forensics and watermarking : 16th International Workshop, IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings
- Further Information:
- Note: Christian Kraetzer, Yun-Qing Shi, Jana Dittmann, Hyoung Joong Kim (eds.).
- Editors:
- Kraetzer, Christian
Shi, Yun Q
Dittmann, Jana
Kim, Hyoung Joong, 1954- - Other Names:
- IWDW (Conference), 16th
- Contents:
- HEVC Double Compression Detection Based on SN-PUPM Feature / Qianyi Xu, Tanfeng Sun, Xinghao Jiang, Yi Dong -- Towards Automated Forensic Pen Ink Verification by Spectral Analysis / Michael Kalbitz, Tobias Scheidat, Benjamin Yüksel, Claus Vielhauer -- Recaptured Image Forensics Based on Quality Aware and Histogram Feature / Pengpeng Yang, Ruihan Li, Rongrong Ni, Yao Zhao -- Website Fingerprinting Attack on Psiphon and Its Forensic Analysis / Tekachew Gobena Ejeta, Hyoung Joong Kim -- Deep Learning Based Counter-Forensic Image Classification for Camera Model Identification / Venkata Udaya Sameer, Ruchira Naskar, Nikhita Musthyala, Kalyan Kokkalla -- Block-Based Convolutional Neural Network for Image Forgery Detection / Jianghong Zhou, Jiangqun Ni, Yuan Rao -- A Hybrid Feature Model for Seam Carving Detection / Jingyu Ye, Yun-Qing Shi -- Face Morphing Detection : An Approach Based on Image Degradation Analysis / Tom Neubert -- Detection of Face Morphing Attacks by Deep Learning / Clemens Seibold, Wojciech Samek, Anna Hilsmann, Peter Eisert -- CNNs Under Attack : On the Vulnerability of Deep Neural Networks Based Face Recognition to Image Morphing / Lukasz Wandzik, Raul Vicente Garcia, Gerald Kaeding, Xi Chen -- Topological Data Analysis for Image Tampering Detection / Aras Asaad, Sabah Jassim -- Coding Efficiency Preserving Steganography Based on HEVC Steganographic Channel Model / Yi Dong, Xinghao Jiang, Tanfeng Sun, Dawen Xu -- A Prediction Mode-Based Information HidingHEVC Double Compression Detection Based on SN-PUPM Feature / Qianyi Xu, Tanfeng Sun, Xinghao Jiang, Yi Dong -- Towards Automated Forensic Pen Ink Verification by Spectral Analysis / Michael Kalbitz, Tobias Scheidat, Benjamin Yüksel, Claus Vielhauer -- Recaptured Image Forensics Based on Quality Aware and Histogram Feature / Pengpeng Yang, Ruihan Li, Rongrong Ni, Yao Zhao -- Website Fingerprinting Attack on Psiphon and Its Forensic Analysis / Tekachew Gobena Ejeta, Hyoung Joong Kim -- Deep Learning Based Counter-Forensic Image Classification for Camera Model Identification / Venkata Udaya Sameer, Ruchira Naskar, Nikhita Musthyala, Kalyan Kokkalla -- Block-Based Convolutional Neural Network for Image Forgery Detection / Jianghong Zhou, Jiangqun Ni, Yuan Rao -- A Hybrid Feature Model for Seam Carving Detection / Jingyu Ye, Yun-Qing Shi -- Face Morphing Detection : An Approach Based on Image Degradation Analysis / Tom Neubert -- Detection of Face Morphing Attacks by Deep Learning / Clemens Seibold, Wojciech Samek, Anna Hilsmann, Peter Eisert -- CNNs Under Attack : On the Vulnerability of Deep Neural Networks Based Face Recognition to Image Morphing / Lukasz Wandzik, Raul Vicente Garcia, Gerald Kaeding, Xi Chen -- Topological Data Analysis for Image Tampering Detection / Aras Asaad, Sabah Jassim -- Coding Efficiency Preserving Steganography Based on HEVC Steganographic Channel Model / Yi Dong, Xinghao Jiang, Tanfeng Sun, Dawen Xu -- A Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization / Yu Wang, Yun Cao, Xianfeng Zhao, Linna Zhou -- Adaptive Audio Steganography Based on Advanced Audio Coding and Syndrome-Trellis Coding / Weiqi Luo, Yue Zhang, Haodong Li -- Information Hiding Using CAVLC: Misconceptions and a Detection Strategy / Weike You, Yun Cao, Xianfeng Zhao -- Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution / Kun Yang, Xiaowei Yi, Xianfeng Zhao, Linna Zhou -- A Steganalysis Scheme for AAC Audio Based on MDCT Difference Between Intra and Inter Frame / Yanzhen Ren, Qiaochu Xiong, Lina Wang -- A Prediction Model Based Approach to Open Space Steganography Detection in HTML Webpages / Iman Sedeeq, Frans Coenen, Alexei Lisitsa -- Towards Covert Channels in Cloud Environments : A Study of Implementations in Virtual Networks / Daniel Spiekermann, Jörg Keller, Tobias Eggendorfer -- Steganalysis Based on Awareness of Selection-Channel and Deep Learning / Jianhua Yang, Kai Liu, Xiangui Kang, Edward Wong, Yunqing Shi -- Improved Algorithms for Robust Histogram Shape-Based Image Watermarking / Bingwen Feng, Jian Weng, Wei Lu -- Image Quality Assessment in Reversible Data Hiding with Contrast Enhancement / Hao-Tian Wu, Shaohua Tang, Yun-Qing Shi -- Improved Reversible Visible Watermarking Based on Adaptive Block Partition / Guangyuan Yang, Wenfa Qi, Xiaolong Li, Zongming Guo -- Robust Zero Watermarking for 3D Triangular Mesh Models Based on Spherical Integral Invariants / Chenchen Cui, Rongrong Ni, Yao Zhao -- On the Statistical Properties of Syndrome Trellis Coding / Olaf Markus Köhler, Cecilia Pasquini, Rainer Böhme -- A Blind Reversible Data Hiding Method for High Dynamic Range Images Taking Advantage of Sparse Histogram / Masaaki Fujiyoshi, Hitoshi Kiya -- A Novel Visual Cryptography Scheme with Different Importance of Shadows / Peng Li, Zuquan Liu -- A Novel Image Classification Method with CNN-XGBoost Model / Xudie Ren, Haonan Guo, Shenghong Li, Shilin Wang, Jianhua Li -- Improvement and Evaluation of Time-Spread Echo Hiding Technology for Long-Distance Voice Evacuation Systems / Akira Nishimura -- Temporal Integration Based Visual Cryptography Scheme and Its Application / Wen Wang, Feng Liu, Teng Guo, Yawei Ren. … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2017
- Extent:
- 1 online resource, illustrations
- Subjects:
- 005.8/24
Computer science
Data encryption (Computer science) -- Congresses
Digital watermarking -- Congresses
Algorithms
Coding theory
Computer science
Computer security
Computers and civilization
Data encryption (Computer science)
Image processing
Computer Science
Data Encryption
Systems and Data Security
Algorithm Analysis and Problem Complexity
Image Processing and Computer Vision
Computers and Society
Coding and Information Theory
Computers -- Security -- General
Computers -- Programming -- Algorithms
Computers -- Computer Graphics
Computers -- Social Aspects -- General
Computers -- Information Theory
Computer security
Algorithms & data structures
Image processing
Ethical & social aspects of IT
Coding theory & cryptology
Data encryption (Computer science)
Computer security
Computer software
Computer vision
Coding theory
Electronic books - Languages:
- English
- ISBNs:
- 9783319641850
3319641859 - Related ISBNs:
- 3319641840
9783319641843 - Notes:
- Note: Includes bibliographical references and index.
Note: Online resource; title from digital title page (viewed on June 11, 2018). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.373688
- Ingest File:
- 02_353.xml