Digital-Forensics and Watermarking

13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers

  • Yun-Qing Shi
  • Hyoung Joong Kim
  • Fernando Pérez-González
  • Ching-Nung Yang
Conference proceedings IWDW 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9023)

Also part of the Security and Cryptology book sub series (LNSC, volume 9023)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Forensics

    1. Front Matter
      Pages 1-1
    2. Guanshuo Xu, Jingyu Ye, Yun-Qing Shi
      Pages 3-17
    3. Mauro Barni, Marco Fontani, Benedetta Tondi
      Pages 31-46
    4. Babak Mahdian, Adam Novozámský, Stanislav Saic
      Pages 47-59
    5. Zhili Zhou, Xingming Sun, Yunlong Wang, Zhangjie Fu, Yun-Qing Shi
      Pages 60-71
  3. Watermarking

    1. Front Matter
      Pages 73-73
    2. Hsin Miao, Yu-Hsun Lin, Ja-Ling Wu
      Pages 90-104
    3. Nhut Minh Ngo, Masashi Unoki
      Pages 105-119
    4. Javier Franco-Contreras, Gouenou Coatrieux, Nora Cuppens-Boulahia, Frédéric Cuppens, Christian Roux
      Pages 120-134
    5. Jessada Karnjana, Masashi Unoki, Pakinee Aimmanee, Chai Wutiwiwatchai
      Pages 145-159
    6. Xiumei Qiao, Rongrong Ni, Yao Zhao
      Pages 160-173
    7. Zairan Wang, Jing Dong, Wei Wang, Tieniu Tan
      Pages 174-186
    8. Jianfeng Lu, Qianru Huang, Meng Wang, Li Li, Junping Dai, Chin-Chen Chang
      Pages 187-198
  4. Reversible Data Hiding

    1. Front Matter
      Pages 199-199
    2. Xuefeng Tong, Guangce Shen, Guorong Xuan, Shumeng Li, Zhiqiang Yang, Jian Li et al.
      Pages 201-214

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Digital-Forensics and Watermarking, IWDW 2014, held in Taipei, Taiwan, during October 2014. The 32 full and 14 poster papers, presented together with 1 keynote speech, were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on forensics; watermarking; reversible data hiding; visual cryptography; and steganography and steganalysis.

Keywords

Coding theory Database security Digital forensics Ensemble classifier Fingerprint performance Image encryption Image processing Information hiding Lossless recovery Natural image modeling Privacy protection Reversible data hiding Robustness Secret sharing Self-recovery Social networking services Steganalysis Steganography Visual cryptography Watermarking

Editors and affiliations

  • Yun-Qing Shi
    • 1
  • Hyoung Joong Kim
    • 2
  • Fernando Pérez-González
    • 3
  • Ching-Nung Yang
    • 4
  1. 1.NJITNewarkUSA
  2. 2.Korea UniversitySeoulKorea, Republic of (South Korea)
  3. 3.Universidad de La LagunaLa LagunaSpain
  4. 4.Department of Computer Science and Information EngineeringNational Dong Hwa UniversityHualienTaiwan

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-19321-2
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-19320-5
  • Online ISBN 978-3-319-19321-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace