Digital-Forensics and Watermarking

12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers

  • Yun Qing Shi
  • Hyoung-Joong Kim
  • Fernando Pérez-González
Conference proceedings IWDW 2013

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8389)

Also part of the Security and Cryptology book sub series (LNSC, volume 8389)

Table of contents

  1. Front Matter
    Pages I-XVI
  2. Steganography and Steganalysis

    1. Front Matter
      Pages 1-1
    2. Benjamin Johnson, Pascal Schöttle, Aron Laszka, Jens Grossklags, Rainer Böhme
      Pages 3-18
    3. Hong Zhang, Qingxiao Guan, Xianfeng Zhao
      Pages 32-47
    4. Licong Chen, Yun Q. Shi, Patchara Sutthiwan, Xinxin Niu
      Pages 48-62
    5. Haibo Miao, Liusheng Huang, Yao Shen, Xiaorong Lu, Zhili Chen
      Pages 63-76
  3. Visual Cryptography

    1. Front Matter
      Pages 77-77
    2. Duanhao Ou, Xiaotian Wu, Lu Dai, Wei Sun
      Pages 79-94
    3. Ching-Nung Yang, Yi-Chin Lin, Chih-Cheng Wu
      Pages 95-108
    4. Zheng-xin Fu, Bin Yu
      Pages 109-122
  4. Reversible Data Hiding

    1. Front Matter
      Pages 139-139
    2. Dawen Xu, Rangding Wang, Yun Qing Shi
      Pages 141-152
    3. Xuefeng Tong, Guorong Xuan, Guangce Shen, Xiaoli Huan, Yun Qing Shi
      Pages 153-166
  5. Forensics

    1. Front Matter
      Pages 167-167
    2. Jianquan Yang, Guopu Zhu, Junlong Wang, Yun Qing Shi
      Pages 169-179
    3. Feng Ding, Guopu Zhu, Yun Qing Shi
      Pages 180-191
    4. Anh-Tu Hoang, Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Isao Echizen
      Pages 205-220

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Digital-Forensics and Watermarking, IWDW 2013, held in Auckland, New Zealand, during October 2013. The 24 full and 13 poster papers, presented together with 2 abstracts, were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography and steganalysis; visual cryptography; reversible data hiding; forensics; watermarking; anonymizing and plate recognition.

Keywords

anonymity applied computing data compression digital forensics image processing plate recognition reversible data hiding security services speech processing steganalysis steganography visual cryptography watermarking

Editors and affiliations

  • Yun Qing Shi
    • 1
  • Hyoung-Joong Kim
    • 2
  • Fernando Pérez-González
    • 3
  1. 1.New Jersey Institute of TechnologyNewarkUSA
  2. 2.CISTKorea UniversitySeoulKorea, Republic of (South Korea)
  3. 3.EE TelecomunicacionUniversity of VigoVigoSpain

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-43886-2
  • Copyright Information Springer-Verlag Berlin Heidelberg 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-43885-5
  • Online ISBN 978-3-662-43886-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace