Reversible and Robust Audio Watermarking Based on Quantization Index Modulation and Amplitude Expansion (Englisch)
- Neue Suche nach: Nishimura, A.
- Neue Suche nach: Nishimura, A.
- Neue Suche nach: Shi, Yun Q.
- Neue Suche nach: Kim, Hyoung Joong
- Neue Suche nach: Perez-Gonzalez, F.
In:
Digital-forensics and watermarking; IWDW 2013
8389
;
275-287
;
2014
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Reversible and Robust Audio Watermarking Based on Quantization Index Modulation and Amplitude Expansion
-
Beteiligte:
-
Kongress:International workshop; 12th, Digital-forensics and watermarking; IWDW 2013 ; 2013 ; Auckland, New Zealand
-
Erschienen in:Digital-forensics and watermarking; IWDW 2013 , 8389 ; 275-287LECTURE NOTES IN COMPUTER SCIENCE , 8389 ; 275-287
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Heidelberg
-
Erscheinungsdatum:01.01.2014
-
Format / Umfang:13 pages
-
Anmerkungen:Based on those presented at the workshop. Includes bibliographical references and index
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Bitspotting: Detecting Optimal Adaptive SteganographyJohnson, B. / Schottle, P. / Laszka, A. / Grossklags, J. / Bohme, R. et al. | 2014
- 19
-
Improved Algorithm of Edge Adaptive Image Steganography Based on LSB Matching Revisited AlgorithmHuang, F. / Zhong, Y. / Huang, J. et al. | 2014
- 32
-
Steganography Based on Adaptive Pixel-Value Differencing Scheme RevisitedZhang, H. / Guan, Q. / Zhao, X. et al. | 2014
- 48
-
Non-uniform Quantization in Breaking HUGOChen, L. / Shi, Y.Q. / Sutthiwan, P. / Niu, X. et al. | 2014
- 63
-
Steganalysis of Compressed Speech Based on Markov and EntropyMiao, H. / Huang, L. / Shen, Y. / Lu, X. / Chen, Z. et al. | 2014
- 79
-
Improved Tagged Visual Cryptograms by Using Random GridsOu, D. / Wu, X. / Dai, L. / Sun, W. et al. | 2014
- 95
-
Cheating Immune Block-Based Progressive Visual CryptographyYang, C.-N. / Lin, Y.-C. / Wu, C.-C. et al. | 2014
- 109
-
Visual Cryptography and Random Grids SchemesFu, Z.-x. / Yu, B. et al. | 2014
- 123
-
Secret Sharing in Images Based on Error-Diffused Block Truncation Coding and Error DiffusionOu, D. / Wu, X. / Dai, L. / Sun, W. et al. | 2014
- 141
-
Reversible Data Hiding in Encrypted H.264/AVC Video StreamsXu, D. / Wang, R. / Shi, Y.Q. et al. | 2014
- 153
-
Using RZL Coding to Enhance Histogram-Pair Based Image Reversible Data HidingTong, X. / Xuan, G. / Shen, G. / Huan, X. / Shi, Y.Q. et al. | 2014
- 169
-
Detecting Non-aligned Double JPEG Compression Based on Refined Intensity Difference and CalibrationYang, J. / Zhu, G. / Wang, J. / Shi, Y.Q. et al. | 2014
- 180
-
A Novel Method for Detecting Image Sharpening Based on Local Binary PatternDing, F. / Zhu, G. / Shi, Y.Q. et al. | 2014
- 192
-
Camera Source Identification Game with Incomplete InformationZeng, H. / Kang, X. et al. | 2014
- 205
-
Detecting Traitors in Re-publishing Updated DatasetsHoang, A.-T. / Nguyen-Son, H.-Q. / Tran, M.-T. / Echizen, I. et al. | 2014
- 221
-
On User Interaction Behavior as Evidence for Computer Forensic AnalysisShen, C. / Cai, Z. / Maxion, R.A. / Guan, X. et al. | 2014
- 232
-
Effective Video Copy Detection Using Statistics of Quantized Zernike MomentsChen, J. / Chen, C. / Ni, J. et al. | 2014
- 244
-
Identifying Video Forgery Process Using Optical FlowWang, W. / Jiang, X. / Wang, S. / Wan, M. / Sun, T. et al. | 2014
- 258
-
A Huffman Table Index Based Approach to Detect Double MP3 CompressionMa, P. / Wang, R. / Yan, D. / Jin, C. et al. | 2014
- 275
-
Reversible and Robust Audio Watermarking Based on Quantization Index Modulation and Amplitude ExpansionNishimura, A. et al. | 2014
- 288
-
Visual Cryptography Schemes Based in k-Linear MapsCanadas, A.M. / Vanegas, N.P.P. / Quitian, M.H. et al. | 2014
- 303
-
A Hybrid Feature Based Method for Distinguishing Computer Graphics and Photo-Graphic ImageGao, S. / Zhang, C. / Wu, C.-L. / Ye, G. / Huang, L. et al. | 2014
- 314
-
A Distributed Scheme for Image Splicing DetectionZhao, X. / Wang, S. / Li, S. / Li, J. / Lin, X. et al. | 2014
- 326
-
A New Reversible Data Hiding Scheme Based on Efficient PredictionLi, J. / Li, X. / Sun, X. et al. | 2014
- 337
-
Digital Forensics of Printed Source Identification for Chinese CharactersTsai, M.-J. / Liu, J. / Yin, J.-S. / Yuadi, I. et al. | 2014
- 362
-
A Cheat-Prevention Visual Secret Sharing Scheme with Minimum Pixel ExpansionLiu, S. / Fujiyoshi, M. / Kiya, H. et al. | 2014
- 376
-
Reversible Audio Information Hiding Based on Integer DCT Coefficients with Adaptive Hiding LocationsHuang, X. / Ono, N. / Echizen, I. / Nishimura, A. et al. | 2014
- 393
-
A Restorable Semi-fragile Watermarking Combined DCT with InterpolationHuo, Y. / He, H. / Chen, F. et al. | 2014
- 409
-
A Compressive Sensing Based Quantized Watermarking Scheme with Statistical Transparency ConstraintDelpha, C. / Hijazi, S. / Boyer, R. et al. | 2014
- 423
-
Watermarking-Based Perceptual Hashing Search Over Encrypted SpeechWang, H. / Zhou, L. / Zhang, W. / Liu, S. et al. | 2014
- 437
-
Anonymizing Temporal Phrases in Natural Language Text to be Posted on Social Networking ServicesNguyen-Son, H.-Q. / Hoang, A.-T. / Tran, M.-T. / Yoshiura, H. / Sonehara, N. / Echizen, I. et al. | 2014
- 452
-
Improved License Plate Recognition for Low-Resolution CCTV Forensics by Integrating Sparse Representation-Based Super-ResolutionMin, H.-s. / Lee, S.H. / De Neve, W. / Ro, Y.M. et al. | 2014
- 465
-
Hiding a Secret Pattern into Color Halftone ImagesGuo, Y. / Au, O.C. / Tang, K. / Pang, J. et al. | 2014
- 475
-
An Image Authentication Scheme for Accurate Localization and RestorationYang, Q. / Gao, T. et al. | 2014
- 488
-
Generalized Histogram Shifting-Based Blind Reversible Data Hiding with Balanced and Guarded Double Side ModificationFujiyoshi, M. et al. | 2014
- 503
-
New Forensic Methods for OOXML Format DocumentsFu, Z. / Sun, X. / Zhou, L. / Shu, J. et al. | 2014
- 514
-
High Capacity Data Hiding Scheme for Binary Images Based on Minimizing Flipping DistortionFeng, B. / Lu, W. / Sun, W. et al. | 2014