Image Information Hiding Based on Binary Holography of Iterative Conjugate-Symmetric Extension (Englisch)
- Neue Suche nach: Zhao, Q.
- Neue Suche nach: Chen, D.
- Neue Suche nach: Tao, Z.
- Neue Suche nach: Gu, J.
- Neue Suche nach: Zhao, Q.
- Neue Suche nach: Chen, D.
- Neue Suche nach: Tao, Z.
- Neue Suche nach: Gu, J.
- Neue Suche nach: Shi, Yun Q.
- Neue Suche nach: Kim, Hyoung Joong
- Neue Suche nach: Perez-Gonzalez, F.
In:
Digital-forensics and watermarking; IWDW 2012
7809
;
145-155
;
2013
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Image Information Hiding Based on Binary Holography of Iterative Conjugate-Symmetric Extension
-
Beteiligte:Zhao, Q. ( Autor:in ) / Chen, D. ( Autor:in ) / Tao, Z. ( Autor:in ) / Gu, J. ( Autor:in ) / Shi, Yun Q. / Kim, Hyoung Joong / Perez-Gonzalez, F.
-
Kongress:International workshop; 11th, Digital-forensics and watermarking; IWDW 2012 ; 2012 ; Shanghai, China
-
Erschienen in:Digital-forensics and watermarking; IWDW 2012 , 7809 ; 145-155LECTURE NOTES IN COMPUTER SCIENCE , 7809 ; 145-155
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Heidelberg
-
Erscheinungsdatum:01.01.2013
-
Format / Umfang:11 pages
-
Anmerkungen:Includes bibliographical references and index
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
New Channel Selection Criterion for Spatial Domain SteganographyZhong, Y. / Huang, F. / Zhang, D. et al. | 2013
- 8
-
A Study of Optimal Matrix for Efficient Matrix Embedding in F~3Qi, Y. / Li, X. / Wang, B. / Yang, B. et al. | 2013
- 19
-
A Novel Mapping Scheme for SteganalysisChen, L. / Shi, Y.Q. / Sutthiwan, P. / Niu, X. et al. | 2013
- 34
-
Steganalysis of LSB Matching Based on the Sum Features of Average Co-occurrence Matrix Using Image EstimationGuo, Y.-q. / Kong, X.-w. / Wang, B. / Xiao, Q. et al. | 2013
- 44
-
Calibration Based Reliable Detector for Detecting LSB Matching SteganographyPeng, F. / Li, X. / Yang, B. et al. | 2013
- 54
-
LSB Replacement Steganography Software Detection Based on Model CheckingZhao, Z. / Liu, F. / Luo, X. / Xie, X. / Yu, L. et al. | 2013
- 69
-
An Attempt to Generalize Distortion Measure for JPEG SteganographySachnev, V. / Kim, H.J. et al. | 2013
- 83
-
Optimal Data Embedding in 3D Models for Extraction from 2D Views Using Perspective InvariantsYasaroglu, Y. / Alatan, A.A. et al. | 2013
- 98
-
Consideration of the Watermark Inversion Attack and Its Invalidation FrameworkOhzeki, K. / Wei, Y. / Hirakawa, Y. / Sato, K. et al. | 2013
- 111
-
Geometrically Invariant Image Blind Watermarking Based on Speeded-Up Robust Features and DCT TransformZhang, H. / Li, X.-q. et al. | 2013
- 120
-
Self-embedding Fragile Watermarking Scheme Combined Average with VQ EncodingHe, H. / Chen, F. / Huo, Y. et al. | 2013
- 135
-
An Efficient Fragile Web Pages Watermarking for Integrity Protection of XML DocumentsWen, Q. / Wang, Y. et al. | 2013
- 145
-
Image Information Hiding Based on Binary Holography of Iterative Conjugate-Symmetric ExtensionZhao, Q. / Chen, D. / Tao, Z. / Gu, J. et al. | 2013
- 156
-
High Capacity Data Hiding for Halftone Image AuthenticationGuo, M. / Zhang, H. et al. | 2013
- 169
-
Coded Spread Spectrum Watermarking SchemeKuribayashi, M. et al. | 2013
- 184
-
Enhancement of Method for Preventing Unauthorized Copying of Displayed Information Using Object Surface ReflectionYamada, T. / Gohshi, S. / Echizen, I. et al. | 2013
- 198
-
Image Splicing Verification Based on Pixel-Based Alignment MethodCiptasari, R.W. / Rhee, K.-H. / Sakurai, K. et al. | 2013
- 213
-
Multimedia Operator Chain Topology and Ordering Estimation Based on Detection and Information Theoretic ToolsComesana, P. / Perez-Gonzalez, F. et al. | 2013
- 228
-
Distinguishing Computer Graphics from Photographic Images Using Local Binary PatternsLi, Z. / Ye, J. / Shi, Y.Q. et al. | 2013
- 242
-
Detecting Removed Object from Video with Stationary BackgroundLi, L. / Wang, X. / Zhang, W. / Yang, G. / Hu, G. et al. | 2013
- 253
-
Audio Forgery Detection Based on Max Offsets for Cross Correlation between ENF and Reference SignalHu, Y. / Li, C.-T. / Lv, Z. / Liu, B.-b. et al. | 2013
- 267
-
A Novel Video Inter-frame Forgery Model Detection Scheme Based on Optical Flow ConsistencyChao, J. / Jiang, X. / Sun, T. et al. | 2013
- 282
-
Countering Universal Image Tampering Detection with Histogram RestorationChen, L. / Wang, S. / Li, S. / Li, J. et al. | 2013
- 290
-
Face Verification Using Color Sparse RepresentationShin, W.J. / Lee, S.H. / Min, H.-s. / Sohn, H. / Ro, Y.M. et al. | 2013
- 300
-
Rapid Image Splicing Detection Based on Relevance Vector MachineSu, B. / Yuan, Q. / Zhang, Y. / Zhai, M. / Wang, S. et al. | 2013
- 311
-
An Efficient Speech Content Authentication Algorithm Based on Coefficients Self-Correlation DegreeLiu, Z. / Wang, H. et al. | 2013
- 327
-
Saliency-Based Region Log Covariance Feature for Image Copy DetectionHe, X. / Jing, H. / Han, Q. / Niu, X. et al. | 2013
- 336
-
Blind Detection of Electronic Voice Transformation with Natural DisguiseWang, Y. / Deng, Y. / Wu, H. / Huang, J. et al. | 2013
- 344
-
Robust Median Filtering Detection Based on Filtered ResidualPeng, A. / Kang, X. et al. | 2013
- 358
-
Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence ModulationZhang, X. / Qin, C. / Sun, G. et al. | 2013
- 368
-
Optimal Histogram-Pair and Prediction-Error Based Image Reversible Data HidingXuan, G. / Tong, X. / Teng, J. / Zhang, X. / Shi, Y.Q. et al. | 2013
- 384
-
An Improved Algorithm for Reversible Data Hiding in Encrypted ImageYu, J. / Zhu, G. / Li, X. / Yang, J. et al. | 2013
- 395
-
Reversible Watermarking for Audio Authentication Based on Integer DCT and Expansion EmbeddingChen, Q. / Xiang, S. / Luo, X. et al. | 2013
- 410
-
Automatic Anonymous Fingerprinting of Text Posted on Social Networking ServicesNguyen-Son, H.-Q. / Tran, M.-T. / Tien, D.T. / Yoshiura, H. / Sonehara, N. / Echizen, I. et al. | 2013
- 425
-
Memoryless Hash-Based Perceptual Image AuthenticationLiu, F. / Fu, Q.-K. / Cheng, L.-M. et al. | 2013
- 435
-
Visual Cryptography Based Watermarking: Definition and MeaningCimato, S. / Yang, J.C.-N. / Wu, C.-C. et al. | 2013
- 449
-
Region-in-Region Incrementing Visual Cryptography SchemeYang, J.C.-N. / Lin, Y.-C. / Wu, C.-C. et al. | 2013
- 464
-
A Secret Enriched Visual CryptographyLiu, F. / Yan, W.Q. / Li, P. / Wu, C. et al. | 2013
- 485
-
On the Security of Multi-secret Visual Cryptography Scheme with Ring SharesFu, Z.-x. / Yu, B. et al. | 2013
- 495
-
An Image Super-Resolution Scheme Based on Compressive Sensing with PCA Sparse RepresentationZhang, A. / Guan, C. / Jiang, H. / Li, J. et al. | 2013
- 507
-
A Novel JFE Scheme for Social Multimedia Distribution in Compressed Domain Using SVD and CAYe, C. / Ling, H. / Zou, F. / Lu, Z. / Xiong, Z. / Zhang, K. et al. | 2013
- 520
-
A Robust Image Classification Scheme with Sparse Coding and Multiple Kernel LearningCheng, D. / Sun, T. / Jiang, X. et al. | 2013