International Workshop on Digital Watermarking最新文献

筛选
英文 中文
Recaptured Image Forensics Based on Quality Aware and Histogram Feature 基于质量感知和直方图特征的重捕获图像取证
International Workshop on Digital Watermarking Pub Date : 2017-08-23 DOI: 10.1007/978-3-319-64185-0_3
Pengpeng Yang, Ruihan Li, R. Ni, Yao Zhao
{"title":"Recaptured Image Forensics Based on Quality Aware and Histogram Feature","authors":"Pengpeng Yang, Ruihan Li, R. Ni, Yao Zhao","doi":"10.1007/978-3-319-64185-0_3","DOIUrl":"https://doi.org/10.1007/978-3-319-64185-0_3","url":null,"abstract":"","PeriodicalId":122215,"journal":{"name":"International Workshop on Digital Watermarking","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122671425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Steganalysis Based on Awareness of Selection-Channel and Deep Learning 基于选择通道感知和深度学习的隐写分析
International Workshop on Digital Watermarking Pub Date : 2017-08-23 DOI: 10.1007/978-3-319-64185-0_20
Jianhua Yang, Kai Liu, Xiangui Kang, E. Wong, Y. Shi
{"title":"Steganalysis Based on Awareness of Selection-Channel and Deep Learning","authors":"Jianhua Yang, Kai Liu, Xiangui Kang, E. Wong, Y. Shi","doi":"10.1007/978-3-319-64185-0_20","DOIUrl":"https://doi.org/10.1007/978-3-319-64185-0_20","url":null,"abstract":"","PeriodicalId":122215,"journal":{"name":"International Workshop on Digital Watermarking","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127984339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Towards Covert Channels in Cloud Environments: A Study of Implementations in Virtual Networks 面向云环境中的隐蔽通道:虚拟网络中的实现研究
International Workshop on Digital Watermarking Pub Date : 2017-08-23 DOI: 10.1007/978-3-319-64185-0_19
Daniel Spiekermann, J. Keller, Tobias Eggendorfer
{"title":"Towards Covert Channels in Cloud Environments: A Study of Implementations in Virtual Networks","authors":"Daniel Spiekermann, J. Keller, Tobias Eggendorfer","doi":"10.1007/978-3-319-64185-0_19","DOIUrl":"https://doi.org/10.1007/978-3-319-64185-0_19","url":null,"abstract":"","PeriodicalId":122215,"journal":{"name":"International Workshop on Digital Watermarking","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126212560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Segmentation Based Steganalysis of Spatial Images Using Local Linear Transform 基于局部线性变换的空间图像隐写分析
International Workshop on Digital Watermarking Pub Date : 2016-09-17 DOI: 10.1007/978-3-319-53465-7_40
Ran Wang, X. Ping, Shaozhang Niu, Tao Zhang
{"title":"Segmentation Based Steganalysis of Spatial Images Using Local Linear Transform","authors":"Ran Wang, X. Ping, Shaozhang Niu, Tao Zhang","doi":"10.1007/978-3-319-53465-7_40","DOIUrl":"https://doi.org/10.1007/978-3-319-53465-7_40","url":null,"abstract":"","PeriodicalId":122215,"journal":{"name":"International Workshop on Digital Watermarking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128443273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Source Cell-Phone Identification Using Spectral Features of Device Self-noise 基于设备自噪声频谱特征的手机源识别
International Workshop on Digital Watermarking Pub Date : 2016-09-17 DOI: 10.1007/978-3-319-53465-7_3
Chao Jin, Rangding Wang, Diqun Yan, Biaoli Tao, Yanan Chen, Anshan Pei
{"title":"Source Cell-Phone Identification Using Spectral Features of Device Self-noise","authors":"Chao Jin, Rangding Wang, Diqun Yan, Biaoli Tao, Yanan Chen, Anshan Pei","doi":"10.1007/978-3-319-53465-7_3","DOIUrl":"https://doi.org/10.1007/978-3-319-53465-7_3","url":null,"abstract":"","PeriodicalId":122215,"journal":{"name":"International Workshop on Digital Watermarking","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121534286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Separable Multiple Bits Reversible Data Hiding in Encrypted Domain 加密域可分离多比特可逆数据隐藏
International Workshop on Digital Watermarking Pub Date : 2016-09-17 DOI: 10.1007/978-3-319-53465-7_35
Yan Ke, Minqing Zhang, Jia Liu
{"title":"Separable Multiple Bits Reversible Data Hiding in Encrypted Domain","authors":"Yan Ke, Minqing Zhang, Jia Liu","doi":"10.1007/978-3-319-53465-7_35","DOIUrl":"https://doi.org/10.1007/978-3-319-53465-7_35","url":null,"abstract":"","PeriodicalId":122215,"journal":{"name":"International Workshop on Digital Watermarking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131245081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Study of the Two-Way Effects of Cover Source Mismatch and Texture Complexity in Steganalysis 隐写分析中掩体源不匹配和纹理复杂度的双向效应研究
International Workshop on Digital Watermarking Pub Date : 2016-09-17 DOI: 10.1007/978-3-319-53465-7_45
Donghui Hu, Zhongjing Ma, Yuqi Fan, Lina Wang
{"title":"A Study of the Two-Way Effects of Cover Source Mismatch and Texture Complexity in Steganalysis","authors":"Donghui Hu, Zhongjing Ma, Yuqi Fan, Lina Wang","doi":"10.1007/978-3-319-53465-7_45","DOIUrl":"https://doi.org/10.1007/978-3-319-53465-7_45","url":null,"abstract":"","PeriodicalId":122215,"journal":{"name":"International Workshop on Digital Watermarking","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133059582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Collusive Attacks to Partition Authentication Visual Cryptography Scheme 分区认证可视化密码方案的合谋攻击
International Workshop on Digital Watermarking Pub Date : 2016-09-17 DOI: 10.1007/978-3-319-53465-7_18
Y. Ren, Feng Liu, Wen Wang
{"title":"Collusive Attacks to Partition Authentication Visual Cryptography Scheme","authors":"Y. Ren, Feng Liu, Wen Wang","doi":"10.1007/978-3-319-53465-7_18","DOIUrl":"https://doi.org/10.1007/978-3-319-53465-7_18","url":null,"abstract":"","PeriodicalId":122215,"journal":{"name":"International Workshop on Digital Watermarking","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115775988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Adaptive Video Steganography Based on Intra-prediction Mode and Cost Assignment 基于内预测模式和费用分配的自适应视频隐写
International Workshop on Digital Watermarking Pub Date : 2016-09-17 DOI: 10.1007/978-3-319-53465-7_39
Lingyu Zhang, Xianfeng Zhao
{"title":"An Adaptive Video Steganography Based on Intra-prediction Mode and Cost Assignment","authors":"Lingyu Zhang, Xianfeng Zhao","doi":"10.1007/978-3-319-53465-7_39","DOIUrl":"https://doi.org/10.1007/978-3-319-53465-7_39","url":null,"abstract":"","PeriodicalId":122215,"journal":{"name":"International Workshop on Digital Watermarking","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124271855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Embedding Strategy for Batch Adaptive Steganography 批量自适应隐写的嵌入策略
International Workshop on Digital Watermarking Pub Date : 2016-09-17 DOI: 10.1007/978-3-319-53465-7_37
Zengzhen Zhao, Qingxiao Guan, Xianfeng Zhao, Haibo Yu, Changjun Liu
{"title":"Embedding Strategy for Batch Adaptive Steganography","authors":"Zengzhen Zhao, Qingxiao Guan, Xianfeng Zhao, Haibo Yu, Changjun Liu","doi":"10.1007/978-3-319-53465-7_37","DOIUrl":"https://doi.org/10.1007/978-3-319-53465-7_37","url":null,"abstract":"","PeriodicalId":122215,"journal":{"name":"International Workshop on Digital Watermarking","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129420684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信