Skip to main content
  • Conference proceedings
  • © 2013

Digital-Forensics and Watermarking

11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers

  • 11th International Workshop on Digital Forensics and Watermarking, IWDW 2012

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7809)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): IWDW: International Workshop on Digital Watermarking

Conference proceedings info: IWDW 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (43 papers)

  1. Invited Lectures (Abstracts)

    1. Session 3: Forensics and Anti-Forensics

      1. Detecting Removed Object from Video with Stationary Background
        • Leida Li, Xuewei Wang, Wei Zhang, Gaobo Yang, Guozhang Hu
        Pages 242-252
      2. Audio Forgery Detection Based on Max Offsets for Cross Correlation between ENF and Reference Signal
        • Yongjian Hu, Chang-Tsun Li, Zhisheng Lv, Bei-Bei Liu
        Pages 253-266
      3. Countering Universal Image Tampering Detection with Histogram Restoration
        • Luyi Chen, Shilin Wang, Shenghong Li, Jianhua Li
        Pages 282-289
      4. Face Verification Using Color Sparse Representation
        • Wook Jin Shin, Seung Ho Lee, Hyun-Seok Min, Hosik Sohn, Yong Man Ro
        Pages 290-299
      5. Rapid Image Splicing Detection Based on Relevance Vector Machine
        • Bo Su, Quanqiao Yuan, Yujin Zhang, Mengying Zhai, Shilin Wang
        Pages 300-310
      6. Saliency-Based Region Log Covariance Feature for Image Copy Detection
        • Xin He, Huiyun Jing, Qi Han, Xiamu Niu
        Pages 327-335
      7. Blind Detection of Electronic Voice Transformation with Natural Disguise
        • Yong Wang, Yanhong Deng, Haojun Wu, Jiwu Huang
        Pages 336-343
      8. Robust Median Filtering Detection Based on Filtered Residual
        • Anjie Peng, Xiangui Kang
        Pages 344-357
    2. Session 4: Reversible Data Hiding

      1. Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence Modulation
        • Xinpeng Zhang, Chuan Qin, Guangling Sun
        Pages 358-367
      2. Optimal Histogram-Pair and Prediction-Error Based Image Reversible Data Hiding
        • Guorong Xuan, Xuefeng Tong, Jianzhong Teng, Xiaojie Zhang, Yun Qing Shi
        Pages 368-383
      3. An Improved Algorithm for Reversible Data Hiding in Encrypted Image
        • Jie Yu, Guopu Zhu, Xiaolong Li, Jianquan Yang
        Pages 384-394
    3. Session 5: Fingerprinting and Authentication

      1. Automatic Anonymous Fingerprinting of Text Posted on Social Networking Services
        • Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Dung Tran Tien, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen
        Pages 410-424
      2. Memoryless Hash-Based Perceptual Image Authentication
        • Fang Liu, Qi-Kai Fu, Lee-Ming Cheng
        Pages 425-434
    4. Session 6: Visual Cryptography

      1. Visual Cryptography Based Watermarking: Definition and Meaning
        • Stelvio Cimato, James Ching-Nung Yang, Chih-Cheng Wu
        Pages 435-448
      2. Region-in-Region Incrementing Visual Cryptography Scheme
        • Ching-Nung Yang, Yi-Chin Lin, Chih-Cheng Wu
        Pages 449-463
      3. A Secret Enriched Visual Cryptography
        • Feng Liu, Wei Q. Yan, Peng Li, Chuankun Wu
        Pages 464-484

Other Volumes

  1. The International Workshop on Digital Forensics and Watermarking 2012

About this book

This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography.

Editors and Affiliations

  • New Jersey Institute of Technology, Newark, USA

    Yun Q. Shi

  • Multimedia Security Lab, Korea University, Seoul, South Korea

    Hyoung-Joong Kim

  • Signal Theory and Communications Department, University of Vigo, Vigo, Spain

    Fernando Pérez-González

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access