Digital forensics and watermarking : 16th International Workshop, IWDW 2017, Magdeburg, Germany, August 23-25, 2017, proceedings / IWDW 2017 Christian Kraetzer, Yun-Qing Shi, Jana Dittmann, Hyoung Joong Kim (Eds.). - 1 online resource : illustrations - Lecture notes in computer science ; 10431 LNCS sublibrary. SL 4, Security and cryptology Serienbezeichnung . - Lecture notes in computer science ; 10431. LNCS sublibrary. SL 4, Security and cryptology. .

Includes bibliographical references and index.

HEVC Double Compression Detection Based on SN-PUPM Feature / Qianyi Xu, Tanfeng Sun, Xinghao Jiang, Yi Dong -- Towards Automated Forensic Pen Ink Verification by Spectral Analysis / Michael Kalbitz, Tobias Scheidat, Benjamin Yüksel, Claus Vielhauer -- Recaptured Image Forensics Based on Quality Aware and Histogram Feature / Pengpeng Yang, Ruihan Li, Rongrong Ni, Yao Zhao -- Website Fingerprinting Attack on Psiphon and Its Forensic Analysis / Tekachew Gobena Ejeta, Hyoung Joong Kim -- Deep Learning Based Counter-Forensic Image Classification for Camera Model Identification / Venkata Udaya Sameer, Ruchira Naskar, Nikhita Musthyala, Kalyan Kokkalla -- Block-Based Convolutional Neural Network for Image Forgery Detection / Jianghong Zhou, Jiangqun Ni, Yuan Rao -- A Hybrid Feature Model for Seam Carving Detection / Jingyu Ye, Yun-Qing Shi -- Face Morphing Detection : An Approach Based on Image Degradation Analysis / Tom Neubert -- Detection of Face Morphing Attacks by Deep Learning / Clemens Seibold, Wojciech Samek, Anna Hilsmann, Peter Eisert -- CNNs Under Attack : On the Vulnerability of Deep Neural Networks Based Face Recognition to Image Morphing / Lukasz Wandzik, Raul Vicente Garcia, Gerald Kaeding, Xi Chen -- Topological Data Analysis for Image Tampering Detection / Aras Asaad, Sabah Jassim -- Coding Efficiency Preserving Steganography Based on HEVC Steganographic Channel Model / Yi Dong, Xinghao Jiang, Tanfeng Sun, Dawen Xu -- A Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization / Yu Wang, Yun Cao, Xianfeng Zhao, Linna Zhou -- Adaptive Audio Steganography Based on Advanced Audio Coding and Syndrome-Trellis Coding / Weiqi Luo, Yue Zhang, Haodong Li -- Information Hiding Using CAVLC: Misconceptions and a Detection Strategy / Weike You, Yun Cao, Xianfeng Zhao -- Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution / Kun Yang, Xiaowei Yi, Xianfeng Zhao, Linna Zhou -- A Steganalysis Scheme for AAC Audio Based on MDCT Difference Between Intra and Inter Frame / Yanzhen Ren, Qiaochu Xiong, Lina Wang -- A Prediction Model Based Approach to Open Space Steganography Detection in HTML Webpages / Iman Sedeeq, Frans Coenen, Alexei Lisitsa -- Towards Covert Channels in Cloud Environments : A Study of Implementations in Virtual Networks / Daniel Spiekermann, Jörg Keller, Tobias Eggendorfer -- Steganalysis Based on Awareness of Selection-Channel and Deep Learning / Jianhua Yang, Kai Liu, Xiangui Kang, Edward Wong, Yunqing Shi -- Improved Algorithms for Robust Histogram Shape-Based Image Watermarking / Bingwen Feng, Jian Weng, Wei Lu -- Image Quality Assessment in Reversible Data Hiding with Contrast Enhancement / Hao-Tian Wu, Shaohua Tang, Yun-Qing Shi -- Improved Reversible Visible Watermarking Based on Adaptive Block Partition / Guangyuan Yang, Wenfa Qi, Xiaolong Li, Zongming Guo -- Robust Zero Watermarking for 3D Triangular Mesh Models Based on Spherical Integral Invariants / Chenchen Cui, Rongrong Ni, Yao Zhao -- On the Statistical Properties of Syndrome Trellis Coding / Olaf Markus Köhler, Cecilia Pasquini, Rainer Böhme -- A Blind Reversible Data Hiding Method for High Dynamic Range Images Taking Advantage of Sparse Histogram / Masaaki Fujiyoshi, Hitoshi Kiya -- A Novel Visual Cryptography Scheme with Different Importance of Shadows / Peng Li, Zuquan Liu -- A Novel Image Classification Method with CNN-XGBoost Model / Xudie Ren, Haonan Guo, Shenghong Li, Shilin Wang, Jianhua Li -- Improvement and Evaluation of Time-Spread Echo Hiding Technology for Long-Distance Voice Evacuation Systems / Akira Nishimura -- Temporal Integration Based Visual Cryptography Scheme and Its Application / Wen Wang, Feng Liu, Teng Guo, Yawei Ren.

This book constitutes the refereed proceedings of the 16th International Workshop on Digital Forensics and Watermarking, IWDW 2017, held in Magdeburg, Germany, in August 2017. The 30 papers presented in this volume were carefully reviewed and selected from 48 submissions. The contributions are covering the state-of-the-art theoretical and practical developments in the fields of digital watermarking, steganography and steganalysis, forensics and anti-forensics, visual cryptography, and other multimedia-related security issues. Also included are the papers on two special sessions on biometric image tampering detection and on emerging threats of criminal use of information hiding : usage scenarios and detection approaches.

9783319641850 3319641859

10.1007/978-3-319-64185-0 doi

com.springer.onix.9783319641850 Springer Nature

GBB901312 bnb

019191043 Uk

Data encryption (Computer science)--Congresses.
Digital watermarking--Congresses.
Computer security--Congresses.
Computer security.
Algorithms & data structures.
Image processing.
Ethical & social aspects of IT.
Coding theory & cryptology.
Computers--Computer Graphics.
Computers--Social Aspects--General.
Computers--Information Theory.
Coding theory.
Computer science.
Computer security.
Computers and civilization.
Data encryption (Computer science)
Image processing.

Electronic books.
Electronic books.

QA76.9.A25 / I93 2017


Powered by Koha