Advertisement

Digital-Forensics and Watermarking

13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers

  • Yun-Qing Shi
  • Hyoung Joong Kim
  • Fernando Pérez-González
  • Ching-Nung Yang
Conference proceedings IWDW 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9023)

Also part of the Security and Cryptology book sub series (LNSC, volume 9023)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Forensics

    1. Front Matter
      Pages 1-1
    2. Guanshuo Xu, Jingyu Ye, Yun-Qing Shi
      Pages 3-17
    3. Mauro Barni, Marco Fontani, Benedetta Tondi
      Pages 31-46
    4. Babak Mahdian, Adam Novozámský, Stanislav Saic
      Pages 47-59
    5. Zhili Zhou, Xingming Sun, Yunlong Wang, Zhangjie Fu, Yun-Qing Shi
      Pages 60-71
  3. Watermarking

    1. Front Matter
      Pages 73-73
    2. Hsin Miao, Yu-Hsun Lin, Ja-Ling Wu
      Pages 90-104
    3. Nhut Minh Ngo, Masashi Unoki
      Pages 105-119
    4. Javier Franco-Contreras, Gouenou Coatrieux, Nora Cuppens-Boulahia, Frédéric Cuppens, Christian Roux
      Pages 120-134
    5. Jessada Karnjana, Masashi Unoki, Pakinee Aimmanee, Chai Wutiwiwatchai
      Pages 145-159
    6. Xiumei Qiao, Rongrong Ni, Yao Zhao
      Pages 160-173
    7. Zairan Wang, Jing Dong, Wei Wang, Tieniu Tan
      Pages 174-186
    8. Jianfeng Lu, Qianru Huang, Meng Wang, Li Li, Junping Dai, Chin-Chen Chang
      Pages 187-198
  4. Reversible Data Hiding

    1. Front Matter
      Pages 199-199
    2. Xuefeng Tong, Guangce Shen, Guorong Xuan, Shumeng Li, Zhiqiang Yang, Jian Li et al.
      Pages 201-214
    3. Xinlu Gui, Xiaolong Li, Bin Yang
      Pages 243-253
    4. Xiaochao Qu, Suah Kim, Run Cui, Fangjun Huang, Hyoung Joong Kim
      Pages 254-265
    5. Wen-Chung Kuo, Chun-Cheng Wang, Hong-Ching Hou, Chen-Tsun Chuang
      Pages 266-275
    6. Sunil Prasad Jaiswal, Oscar Au, Vinit Jakhetiya, Andy Yuanfang Guo, Anil K. Tiwari
      Pages 276-288
  5. Visual Cryptography

    1. Front Matter
      Pages 303-303
    2. Peng Li, Ching-Nung Yang, Qian Kong
      Pages 305-318
    3. Xuehu Yan, Guohui Chen, Ching-Nung Yang, Song-Ruei Cai
      Pages 319-332
    4. Feng Liu, ChuanKun Wu
      Pages 333-349
    5. Dao-Shun Wang, Feng Yi, Ching-Nung Yang
      Pages 364-375
    6. Guohui Chen, Chunying Wang, Xuehu Yan, Peng Li
      Pages 376-386
  6. Poster Session

    1. Front Matter
      Pages 387-387
    2. Xu Lin, Bingwen Feng, Wei Lu, Wei Sun
      Pages 389-398
    3. Areej S. Alfraih, Johann A. Briffa, Stephan Wesemeyer
      Pages 410-419
    4. Chia-Chen Lin, Yuehong Huang, Wei-Liang Tai
      Pages 433-443
    5. Yu-Chi Chen, Kunhan Lu, Raylin Tso, Mu-En Wu
      Pages 444-454
    6. Hanzhou Wu, Hongxia Wang, Yi Hu, Linna Zhou
      Pages 455-469
    7. Jie Zhu, Qingxiao Guan, Xianfeng Zhao
      Pages 470-484
    8. Alberto Escalada Jimenez, Adrian Dabrowski, Noburu Sonehara, Juan M. Montero Martinez, Isao Echizen
      Pages 513-524
    9. Jinglei Zhou, Rangding Wang, Chao Jin, Diqun Yan
      Pages 525-534
    10. Erwan Chaussy, Shimon Machida, Noboru Sonehara, Isao Echizen
      Pages 544-556
  7. Steganography and Steganalysis

    1. Front Matter
      Pages 557-557
    2. Licong Chen, Yun-Qing Shi, Patchara Sutthiwan
      Pages 559-573

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Digital-Forensics and Watermarking, IWDW 2014, held in Taipei, Taiwan, during October 2014. The 32 full and 14 poster papers, presented together with 1 keynote speech, were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on forensics; watermarking; reversible data hiding; visual cryptography; and steganography and steganalysis.

Keywords

Coding theory Database security Digital forensics Ensemble classifier Fingerprint performance Image encryption Image processing Information hiding Lossless recovery Natural image modeling Privacy protection Reversible data hiding Robustness Secret sharing Self-recovery Social networking services Steganalysis Steganography Visual cryptography Watermarking

Editors and affiliations

  • Yun-Qing Shi
    • 1
  • Hyoung Joong Kim
    • 2
  • Fernando Pérez-González
    • 3
  • Ching-Nung Yang
    • 4
  1. 1.NJITNewarkUSA
  2. 2.Korea UniversitySeoulKorea, Republic of (South Korea)
  3. 3.Universidad de La LagunaLa LagunaSpain
  4. 4.Department of Computer Science and Information EngineeringNational Dong Hwa UniversityHualienTaiwan

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-19321-2
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-19320-5
  • Online ISBN 978-3-319-19321-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace