Digital-Forensics and Watermarking

14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers

  • Yun-Qing Shi
  • Hyoung Joong Kim
  • Fernando Pérez-González
  • Isao Echizen
Conference proceedings IWDW 2015

DOI: 10.1007/978-3-319-31960-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9569)

Table of contents

  1. Front Matter
    Pages I-XVI
  2. Digital Forensics

    1. Front Matter
      Pages 1-1
    2. Thibaut Julliand, Vincent Nozick, Hugues Talbot
      Pages 3-17
    3. Yue Tan, Bo Wang, Ming Li, Yanqing Guo, Xiangwei Kong, Yunqing Shi
      Pages 18-27
    4. Xianglei Hu, Jiangqun Ni, Runbiao Pan
      Pages 28-38
    5. Huy H. Nguyen, Hoang-Quoc Nguyen-Son, Thuc D. Nguyen, Isao Echizen
      Pages 39-50
    6. Jinglei Zhou, Rangding Wang, Chao Jin, Diqun Yan
      Pages 51-60
    7. Meiling Huang, Rangding Wang, Jian Xu, Dawen Xu, Qian Li
      Pages 61-71
    8. Feng Ding, Weiqiang Dong, Guopu Zhu, Yun-Qing Shi
      Pages 72-82
    9. Amel Tuama, Frederic Comby, Marc Chaumont
      Pages 83-93
    10. Zhenzhen Zhang, Jianjun Hou, Zhaohong Li, Dongdong Li
      Pages 94-106
  3. Steganography and Steganalysis

    1. Front Matter
      Pages 117-117
    2. Yanbin Zhao, Hong Zhang, Yun Cao, Peipei Wang, Xianfeng Zhao
      Pages 119-133
    3. Yanping Tan, Fangjun Huang, Jiwu Huang
      Pages 134-144
    4. Daniele Capolupo, Fabrizio d’Amore
      Pages 145-159
  4. Digital Watermarking

    1. Front Matter
      Pages 161-161
    2. Piyanart Chotikawanid, Thumrongrat Amornraksa
      Pages 176-190

About these proceedings

Introduction

This book constitutes revised selected papers from the 14th International Workshop on Digital-Forensics and Watermarking, IWDW 2015, held in Tokyo, Japan, in October 2015.

The 35 papers presented in this volume were carefully reviewed and selected from 54 submissions. The contributions are organized in topical sections named: digital forensics; steganography and steganalysis; digital watermarking; reversible data hiding; and visual cryptography.

Keywords

biometrics computer forensics data encryption digital rights management hash functions audio watermarking coding theory computer-generated image data compression data hiding encryption fingerprint image authentication information hiding message authentication codes steganography support vector machine video steganalysis visual cryptography watermark optimization

Editors and affiliations

  • Yun-Qing Shi
    • 1
  • Hyoung Joong Kim
    • 2
  • Fernando Pérez-González
    • 3
  • Isao Echizen
    • 4
  1. 1.NJITNewarkUSA
  2. 2.Korea UniversitySeoulKorea (Republic of)
  3. 3.University of VigoVigoSpain
  4. 4.National Institute of InformaticsTokyoJapan

Bibliographic information

  • Copyright Information Springer International Publishing Switzerland 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-31959-9
  • Online ISBN 978-3-319-31960-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349