Advertisement

Digital Forensics and Watermarking

15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers

  • Yun Qing Shi
  • Hyoung Joong Kim
  • Fernando Perez-Gonzalez
  • Feng Liu
Conference proceedings IWDW 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10082)

Also part of the Security and Cryptology book sub series (LNSC, volume 10082)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Digital Forensics

    1. Front Matter
      Pages 1-1
    2. Jingjing Yu, Yifeng Zhan, Jianhua Yang, Xiangui Kang
      Pages 3-15
    3. Chao Jin, Rangding Wang, Diqun Yan, Biaoli Tao, Yanan Chen, Anshan Pei
      Pages 29-45
    4. Qing Qian, Hongxia Wang, Sani M. Abdullahi, Huan Wang, Canghong Shi
      Pages 46-60
    5. S. Chen, T. F. Sun, X. H. Jiang, P. S. He, S. L. Wang, Y. Q. Shi
      Pages 61-74
    6. Wencheng Cao, Hongxia Wang, Hong Zhao, Qing Qian, Sani M. Abdullahi
      Pages 75-87
    7. Pengpeng Yang, Rongrong Ni, Yao Zhao
      Pages 119-128
    8. Sani M. Abdullahi, Hongxia Wang, Qing Qian, Wencheng Cao
      Pages 129-144
    9. Xin He, Qingxiao Guan, Yanfei Tong, Xianfeng Zhao, Haibo Yu
      Pages 145-158
    10. Weiwei Zhang, Zhenghong Yang, Shaozhang Niu, Junbin Wang
      Pages 159-171
  3. Visual Cryptography

    1. Front Matter
      Pages 185-185
    2. Teng Guo, Feng Liu, Wen Wang, BingTao Yu
      Pages 187-197
    3. Wen Wang, Feng Liu, Teng Guo, Yawei Ren, Gang Shen
      Pages 198-208
    4. Xuehu Yan, Yuliang Lu, Lintao Liu, Song Wan
      Pages 209-222
    5. Gang Shen, Feng Liu, Zhengxin Fu, Bin Yu, Wen Wang
      Pages 223-237
    6. Sabyasachi Dutta, Partha Sarathi Roy, Avishek Adhikari, Kouichi Sakurai
      Pages 251-262
  4. Reversible Data Hiding

    1. Front Matter
      Pages 263-263
    2. Hak-Yeol Choi, Jeongho Son, Han-Ul Jang, Heung-Kyu Lee
      Pages 280-295
    3. Xin Tang, Yining Qi, Yongfeng Huang
      Pages 296-311
    4. Bingwen Feng, Jian Weng, Wei Lu, Bei Pei
      Pages 312-326
    5. Wisdarmanto Erlangga, Ari Moesriami Barmawi
      Pages 327-342
    6. Javier Franco-Contreras, Gouenou Coatrieux
      Pages 343-357
    7. Xinxin Peng, Jianfeng Lu, Li Li, Chin-Chen Chang, Qili Zhou
      Pages 358-369
    8. Kazutake Uehira, Masahiro Suzuki, Piyarat Silapasuphakornwong, Hideyuki Torii, Youichi Takashima
      Pages 370-378
    9. Minoru Kuribayashi, Ee-Chien Chang, Nobuo Funabiki
      Pages 379-392
    10. Dawen Xu, Yani Zhu, Rangding Wang, Jianjing Fu, Kai Chen
      Pages 393-406
    11. Jiajia Xu, Hang Zhou, Weiming Zhang, Ruiqi Jiang, Guoli Ma, Nenghai Yu
      Pages 407-420
    12. Xuejing Niu, Zhaoxia Yin, Xinpeng Zhang, Jin Tang, Bin Luo
      Pages 436-445
    13. Wengai Liu, Rongrong Ni, Yao Zhao
      Pages 446-455
    14. Jiaxin Yin, Rui Wang, Yuanfang Guo, Feng Liu
      Pages 456-469
    15. Yan Ke, Minqing Zhang, Jia Liu
      Pages 470-484
  5. Steganography and Steganalysis

    1. Front Matter
      Pages 485-485
    2. Zichi Wang, Jinpeng Lv, Qingde Wei, Xinpeng Zhang
      Pages 487-493
    3. Zengzhen Zhao, Qingxiao Guan, Xianfeng Zhao, Haibo Yu, Changjun Liu
      Pages 494-505
    4. Yuan Bian, Guangming Tang, Shuo Wang, Zhanzhan Gao, Shiyuan Chen
      Pages 506-517
    5. Ran Wang, Xijian Ping, Shaozhang Niu, Tao Zhang
      Pages 533-549
    6. Xiaoyu Xu, Yifeng Sun, Guangming Tang, Shiyuan Chen, Jian Zhao
      Pages 564-577
    7. Chin-Chen Chang, Jen-Chun Chang, Yun-Hong Chou, Hsin-Lung Wu
      Pages 578-587
    8. Hong Zhang, Yun Cao, Xianfeng Zhao, Haibo Yu, Changjun Liu
      Pages 588-600

About these proceedings

Introduction

This book constitutes the revised post-conference proceedings of the 15th International Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, China, in September 2016.

The 45 papers presented in this volume were carefully reviewed and selected from 70 submissions. The contributions are organized in topical sections on digital forensics, visual cryptography, reversible data hiding, and steganography and steganalysis.

Keywords

authentication cloud storage deep learning ensemble classifiers fingerprint image encryption image segmentation information security multiple watermarking neural network public key cryptography security steganalysis video encryption watermarking biometrics data hiding encryption information hiding steganography

Editors and affiliations

  • Yun Qing Shi
    • 1
  • Hyoung Joong Kim
    • 2
  • Fernando Perez-Gonzalez
    • 3
  • Feng Liu
    • 4
  1. 1.New Jersey Institute of TechnologyNewarkUSA
  2. 2.Korea UniversitySeoulKorea (Republic of)
  3. 3.University of VigoVigoSpain
  4. 4.Chinese Academy of SciencesBeijingChina

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-53465-7
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-53464-0
  • Online ISBN 978-3-319-53465-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site