Reversible Data Hiding in Encrypted H.264/AVC Video Streams (Englisch)
- Neue Suche nach: Xu, Dawen
- Neue Suche nach: Wang, Rangding
- Neue Suche nach: Shi, Yun Qing
- Neue Suche nach: Shi, Yun Qing
- Neue Suche nach: Kim, Hyoung-Joong
- Neue Suche nach: Pérez-González, Fernando
- Neue Suche nach: Xu, Dawen
- Neue Suche nach: Wang, Rangding
- Neue Suche nach: Shi, Yun Qing
In:
Digital-Forensics and Watermarking
: 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers
;
Kapitel: 10
;
141-152
;
2014
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Reversible Data Hiding in Encrypted H.264/AVC Video Streams
-
Weitere Titelangaben:Lect.Notes Computer
-
Beteiligte:Shi, Yun Qing ( Herausgeber:in ) / Kim, Hyoung-Joong ( Herausgeber:in ) / Pérez-González, Fernando ( Herausgeber:in ) / Xu, Dawen ( Autor:in ) / Wang, Rangding ( Autor:in ) / Shi, Yun Qing ( Autor:in )
-
Kongress:International Workshop on Digital Watermarking ; 2013 ; Auckland, New Zealand
-
Erschienen in:Digital-Forensics and Watermarking : 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers ; Kapitel: 10 ; 141-152Lecture Notes in Computer Science ; 8389 ; 141-152Security and Cryptology ; 141-152
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:09.07.2014
-
Format / Umfang:12 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Bitspotting: Detecting Optimal Adaptive SteganographyJohnson, Benjamin / Schöttle, Pascal / Laszka, Aron / Grossklags, Jens / Böhme, Rainer et al. | 2014
- 2
-
Improved Algorithm of Edge Adaptive Image Steganography Based on LSB Matching Revisited AlgorithmHuang, Fangjun / Zhong, Yane / Huang, Jiwu et al. | 2014
- 3
-
Steganography Based on Adaptive Pixel-Value Differencing Scheme RevisitedZhang, Hong / Guan, Qingxiao / Zhao, Xianfeng et al. | 2014
- 4
-
Non-uniform Quantization in Breaking HUGOChen, Licong / Shi, Yun Q. / Sutthiwan, Patchara / Niu, Xinxin et al. | 2014
- 5
-
Steganalysis of Compressed Speech Based on Markov and EntropyMiao, Haibo / Huang, Liusheng / Shen, Yao / Lu, Xiaorong / Chen, Zhili et al. | 2014
- 6
-
Improved Tagged Visual Cryptograms by Using Random GridsOu, Duanhao / Wu, Xiaotian / Dai, Lu / Sun, Wei et al. | 2014
- 7
-
Cheating Immune Block-Based Progressive Visual CryptographyYang, Ching-Nung / Lin, Yi-Chin / Wu, Chih-Cheng et al. | 2014
- 8
-
Visual Cryptography and Random Grids SchemesFu, Zheng-xin / Yu, Bin et al. | 2014
- 9
-
Secret Sharing in Images Based on Error-Diffused Block Truncation Coding and Error DiffusionOu, Duanhao / Wu, Xiaotian / Dai, Lu / Sun, Wei et al. | 2014
- 10
-
Reversible Data Hiding in Encrypted H.264/AVC Video StreamsXu, Dawen / Wang, Rangding / Shi, Yun Qing et al. | 2014
- 11
-
Using RZL Coding to Enhance Histogram-Pair Based Image Reversible Data HidingTong, Xuefeng / Xuan, Guorong / Shen, Guangce / Huan, Xiaoli / Shi, Yun Qing et al. | 2014
- 12
-
Detecting Non-aligned Double JPEG Compression Based on Refined Intensity Difference and CalibrationYang, Jianquan / Zhu, Guopu / Wang, Junlong / Shi, Yun Qing et al. | 2014
- 13
-
A Novel Method for Detecting Image Sharpening Based on Local Binary PatternDing, Feng / Zhu, Guopu / Shi, Yun Qing et al. | 2014
- 14
-
Camera Source Identification Game with Incomplete InformationZeng, Hui / Kang, Xiangui et al. | 2014
- 15
-
Detecting Traitors in Re-publishing Updated DatasetsHoang, Anh-Tu / Nguyen-Son, Hoang-Quoc / Tran, Minh-Triet / Echizen, Isao et al. | 2014
- 16
-
On User Interaction Behavior as Evidence for Computer Forensic AnalysisShen, Chao / Cai, Zhongmin / Maxion, Roy A. / Guan, Xiaohong et al. | 2014
- 17
-
Effective Video Copy Detection Using Statistics of Quantized Zernike MomentsChen, Jiehao / Chen, Chenglong / Ni, Jiangqun et al. | 2014
- 18
-
Identifying Video Forgery Process Using Optical FlowWang, Wan / Jiang, Xinghao / Wang, Shilin / Wan, Meng / Sun, Tanfeng et al. | 2014
- 19
-
A Huffman Table Index Based Approach to Detect Double MP3 CompressionMa, Pengfei / Wang, Rangding / Yan, Diqun / Jin, Chao et al. | 2014
- 20
-
Reversible and Robust Audio Watermarking Based on Quantization Index Modulation and Amplitude ExpansionNishimura, Akira et al. | 2014
- 21
-
Visual Cryptography Schemes Based in \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$k$$\end{document}-Linear MapsCañadas, Agustín Moreno / Vanegas, Nelly Paola Palma / Quitián, Margoth Hernández et al. | 2014
- 22
-
A Hybrid Feature Based Method for Distinguishing Computer Graphics and Photo-Graphic ImageGao, Shang / Zhang, Cong / Wu, Chan-Le / Ye, Gang / Huang, Lei et al. | 2014
- 23
-
A Distributed Scheme for Image Splicing DetectionZhao, Xudong / Wang, Shilin / Li, Shenghong / Li, Jianhua / Lin, Xiang et al. | 2014
- 24
-
A New Reversible Data Hiding Scheme Based on Efficient PredictionLi, Jian / Li, Xiaolong / Sun, Xingming et al. | 2014
- 25
-
Digital Forensics of Printed Source Identification for Chinese CharactersTsai, Min-Jen / Liu, Jung / Yin, Jin-Sheng / Yuadi, Imam et al. | 2014
- 26
-
A Cheat-Prevention Visual Secret Sharing Scheme with Minimum Pixel ExpansionLiu, Shenchuan / Fujiyoshi, Masaaki / Kiya, Hitoshi et al. | 2014
- 27
-
Reversible Audio Information Hiding Based on Integer DCT Coefficients with Adaptive Hiding LocationsHuang, Xuping / Ono, Nobutaka / Echizen, Isao / Nishimura, Akira et al. | 2014
- 28
-
A Restorable Semi-fragile Watermarking Combined DCT with InterpolationHuo, Yaoran / He, Hongjie / Chen, Fan et al. | 2014
- 29
-
A Compressive Sensing Based Quantized Watermarking Scheme with Statistical Transparency ConstraintDelpha, Claude / Hijazi, Said / Boyer, Remy et al. | 2014
- 30
-
Watermarking-Based Perceptual Hashing Search Over Encrypted SpeechWang, Hongxia / Zhou, Linna / Zhang, Wei / Liu, Shuang et al. | 2014
- 31
-
Anonymizing Temporal Phrases in Natural Language Text to be Posted on Social Networking ServicesNguyen-Son, Hoang-Quoc / Hoang, Anh-Tu / Tran, Minh-Triet / Yoshiura, Hiroshi / Sonehara, Noboru / Echizen, Isao et al. | 2014
- 32
-
Improved License Plate Recognition for Low-Resolution CCTV Forensics by Integrating Sparse Representation-Based Super-ResolutionMin, Hyun-seok / Lee, Seung Ho / De Neve, Wesley / Ro, Yong Man et al. | 2014
- 33
-
Hiding a Secret Pattern into Color Halftone ImagesGuo, Yuanfang / Au, Oscar C. / Tang, Ketan / Pang, Jiahao et al. | 2014
- 34
-
An Image Authentication Scheme for Accurate Localization and RestorationYang, Qunting / Gao, Tiegang et al. | 2014
- 35
-
Generalized Histogram Shifting-Based Blind Reversible Data Hiding with Balanced and Guarded Double Side ModificationFujiyoshi, Masaaki et al. | 2014
- 36
-
New Forensic Methods for OOXML Format DocumentsFu, Zhangjie / Sun, Xingming / Zhou, Lu / Shu, Jiangang et al. | 2014
- 37
-
High Capacity Data Hiding Scheme for Binary Images Based on Minimizing Flipping DistortionFeng, Bingwen / Lu, Wei / Sun, Wei et al. | 2014