Digital Forensics and Watermaking

11th International Workshop, IWDW 2012, Shanghai, China, October 31 – November 3, 2012, Revised Selected Papers

Editors:

ISBN: 978-3-642-40098-8 (Print) 978-3-642-40099-5 (Online)

Table of contents (42 chapters)

previous Page of 3
  1. Front Matter

    Pages -

  2. Invited Lectures (Abstracts)

    1. Session 1: Steganography and Steganalysis

      1. No Access

        Book Chapter

        Pages 1-7

        New Channel Selection Criterion for Spatial Domain Steganography

      2. No Access

        Book Chapter

        Pages 8-18

        A Study of Optimal Matrix for Efficient Matrix Embedding in $\mathbb{F}_3$

      3. No Access

        Book Chapter

        Pages 19-33

        A Novel Mapping Scheme for Steganalysis

      4. No Access

        Book Chapter

        Pages 34-43

        Steganalysis of LSB Matching Based on the Sum Features of Average Co-occurrence Matrix Using Image Estimation

      5. No Access

        Book Chapter

        Pages 44-53

        Calibration Based Reliable Detector for Detecting LSB Matching Steganography

      6. No Access

        Book Chapter

        Pages 54-68

        LSB Replacement Steganography Software Detection Based on Model Checking

      7. No Access

        Book Chapter

        Pages 69-82

        An Attempt to Generalize Distortion Measure for JPEG Steganography

      Session 2: Watermarking and Copyright Protection

      1. No Access

        Book Chapter

        Pages 83-97

        Optimal Data Embedding in 3D Models for Extraction from 2D Views Using Perspective Invariants

      2. No Access

        Book Chapter

        Pages 98-110

        Consideration of the Watermark Inversion Attack and Its Invalidation Framework

      3. No Access

        Book Chapter

        Pages 111-119

        Geometrically Invariant Image Blind Watermarking Based on Speeded-Up Robust Features and DCT Transform

      4. No Access

        Book Chapter

        Pages 120-134

        Self-embedding Fragile Watermarking Scheme Combined Average with VQ Encoding

      5. No Access

        Book Chapter

        Pages 135-144

        An Efficient Fragile Web Pages Watermarking for Integrity Protection of XML Documents

      6. No Access

        Book Chapter

        Pages 145-155

        Image Information Hiding Based on Binary Holography of Iterative Conjugate-Symmetric Extension

      7. No Access

        Book Chapter

        Pages 156-168

        High Capacity Data Hiding for Halftone Image Authentication

      8. No Access

        Book Chapter

        Pages 169-183

        Coded Spread Spectrum Watermarking Scheme

      9. No Access

        Book Chapter

        Pages 184-197

        Enhancement of Method for Preventing Unauthorized Copying of Displayed Information Using Object Surface Reflection

      Session 3: Forensics and Anti-Forensics

      1. No Access

        Book Chapter

        Pages 198-212

        Image Splicing Verification Based on Pixel-Based Alignment Method

      2. No Access

        Book Chapter

        Pages 213-227

        Multimedia Operator Chain Topology and Ordering Estimation Based on Detection and Information Theoretic Tools

      3. No Access

        Book Chapter

        Pages 228-241

        Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns

      4. No Access

        Book Chapter

        Pages 242-252

        Detecting Removed Object from Video with Stationary Background

previous Page of 3