Visual Cryptography Based Watermarking: Definition and Meaning (Englisch)
- Neue Suche nach: Cimato, Stelvio
- Neue Suche nach: Yang, James Ching-Nung
- Neue Suche nach: Wu, Chih-Cheng
- Neue Suche nach: Cimato, Stelvio
- Neue Suche nach: Yang, James Ching-Nung
- Neue Suche nach: Wu, Chih-Cheng
In:
The International Workshop on Digital Forensics and Watermarking 2012
1
;
435-448
;
2013
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Visual Cryptography Based Watermarking: Definition and Meaning
-
Beteiligte:
-
Erschienen in:Lecture Notes in Computer Science ; 7809, 1 ; 435-448
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2013
-
Format / Umfang:14 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
New Channel Selection Criterion for Spatial Domain SteganographyZhong, Yane / Huang, Fangjun / Zhang, Dong et al. | 2013
- 8
-
A Study of Optimal Matrix for Efficient Matrix Embedding in $\mathbb{F}_3$Qi, Yuanzhi / Li, Xiaolong / Wang, Bin / Yang, Bin et al. | 2013
- 19
-
A Novel Mapping Scheme for SteganalysisChen, Licong / Shi, Yun Q. / Sutthiwan, Patchara / Niu, Xinxin et al. | 2013
- 34
-
Steganalysis of LSB Matching Based on the Sum Features of Average Co-occurrence Matrix Using Image EstimationGuo, Yan-qing / Kong, Xiang-wei / Wang, Bo / Xiao, Qian et al. | 2013
- 44
-
Calibration Based Reliable Detector for Detecting LSB Matching SteganographyPeng, Fei / Li, Xiaolong / Yang, Bin et al. | 2013
- 54
-
LSB Replacement Steganography Software Detection Based on Model CheckingZhao, Zheng / Liu, Fenlin / Luo, Xiangyang / Xie, Xin / Yu, Lu et al. | 2013
- 69
-
An Attempt to Generalize Distortion Measure for JPEG SteganographySachnev, Vasily / Kim, Hyoung Joong et al. | 2013
- 83
-
Optimal Data Embedding in 3D Models for Extraction from 2D Views Using Perspective InvariantsYaşaroğlu, Yağız / Alatan, A. Aydın et al. | 2013
- 98
-
Consideration of the Watermark Inversion Attack and Its Invalidation FrameworkOhzeki, Kazuo / Wei, YuanYu / Hirakawa, Yutaka / Sato, Kiyosugu et al. | 2013
- 111
-
Geometrically Invariant Image Blind Watermarking Based on Speeded-Up Robust Features and DCT TransformZhang, Huang / Li, Xiao-Qiang et al. | 2013
- 120
-
Self-embedding Fragile Watermarking Scheme Combined Average with VQ EncodingHe, Hongjie / Chen, Fan / Huo, Yaoran et al. | 2013
- 135
-
An Efficient Fragile Web Pages Watermarking for Integrity Protection of XML DocumentsWen, Quan / Wang, Yufei et al. | 2013
- 145
-
Image Information Hiding Based on Binary Holography of Iterative Conjugate-Symmetric ExtensionZhao, Qiyin / Chen, Daqing / Tao, Zhi / Gu, Jihua et al. | 2013
- 156
-
High Capacity Data Hiding for Halftone Image AuthenticationGuo, Meng / Zhang, Hongbin et al. | 2013
- 169
-
Coded Spread Spectrum Watermarking SchemeKuribayashi, Minoru et al. | 2013
- 184
-
Enhancement of Method for Preventing Unauthorized Copying of Displayed Information Using Object Surface ReflectionYamada, Takayuki / Gohshi, Seiichi / Echizen, Isao et al. | 2013
- 198
-
Image Splicing Verification Based on Pixel-Based Alignment MethodCiptasari, Rimba Whidiana / Rhee, Kyung-Hyune / Sakurai, Kouichi et al. | 2013
- 213
-
Multimedia Operator Chain Topology and Ordering Estimation Based on Detection and Information Theoretic ToolsComesaña, Pedro / Pérez-González, Fernando et al. | 2013
- 228
-
Distinguishing Computer Graphics from Photographic Images Using Local Binary PatternsLi, Zhaohong / Ye, Jingyu / Shi, Yun Qing et al. | 2013
- 242
-
Detecting Removed Object from Video with Stationary BackgroundLi, Leida / Wang, Xuewei / Zhang, Wei / Yang, Gaobo / Hu, Guozhang et al. | 2013
- 253
-
Audio Forgery Detection Based on Max Offsets for Cross Correlation between ENF and Reference SignalHu, Yongjian / Li, Chang-Tsun / Lv, Zhisheng / Liu, Bei-Bei et al. | 2013
- 267
-
A Novel Video Inter-frame Forgery Model Detection Scheme Based on Optical Flow ConsistencyChao, Juan / Jiang, Xinghao / Sun, Tanfeng et al. | 2013
- 282
-
Countering Universal Image Tampering Detection with Histogram RestorationChen, Luyi / Wang, Shilin / Li, Shenghong / Li, Jianhua et al. | 2013
- 290
-
Face Verification Using Color Sparse RepresentationShin, Wook Jin / Lee, Seung Ho / Min, Hyun-Seok / Sohn, Hosik / Ro, Yong Man et al. | 2013
- 300
-
Rapid Image Splicing Detection Based on Relevance Vector MachineSu, Bo / Yuan, Quanqiao / Zhang, Yujin / Zhai, Mengying / Wang, Shilin et al. | 2013
- 311
-
An Efficient Speech Content Authentication Algorithm Based on Coefficients Self-correlation DegreeLiu, Zhenghui / Wang, Hongxia et al. | 2013
- 327
-
Saliency-Based Region Log Covariance Feature for Image Copy DetectionHe, Xin / Jing, Huiyun / Han, Qi / Niu, Xiamu et al. | 2013
- 336
-
Blind Detection of Electronic Voice Transformation with Natural DisguiseWang, Yong / Deng, Yanhong / Wu, Haojun / Huang, Jiwu et al. | 2013
- 344
-
Robust Median Filtering Detection Based on Filtered ResidualPeng, Anjie / Kang, Xiangui et al. | 2013
- 358
-
Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence ModulationZhang, Xinpeng / Qin, Chuan / Sun, Guangling et al. | 2013
- 368
-
Optimal Histogram-Pair and Prediction-Error Based Image Reversible Data HidingXuan, Guorong / Tong, Xuefeng / Teng, Jianzhong / Zhang, Xiaojie / Shi, Yun Qing et al. | 2013
- 384
-
An Improved Algorithm for Reversible Data Hiding in Encrypted ImageYu, Jie / Zhu, Guopu / Li, Xiaolong / Yang, Jianquan et al. | 2013
- 395
-
Reversible Watermarking for Audio Authentication Based on Integer DCT and Expansion EmbeddingChen, Quan / Xiang, Shijun / Luo, Xinrong et al. | 2013
- 410
-
Automatic Anonymous Fingerprinting of Text Posted on Social Networking ServicesNguyen-Son, Hoang-Quoc / Tran, Minh-Triet / Tien, Dung Tran / Yoshiura, Hiroshi / Sonehara, Noboru / Echizen, Isao et al. | 2013
- 425
-
Memoryless Hash-Based Perceptual Image AuthenticationLiu, Fang / Fu, Qi-Kai / Cheng, Lee-Ming et al. | 2013
- 435
-
Visual Cryptography Based Watermarking: Definition and MeaningCimato, Stelvio / Yang, James Ching-Nung / Wu, Chih-Cheng et al. | 2013
- 449
-
Region-in-Region Incrementing Visual Cryptography SchemeYang, Ching-Nung / Lin, Yi-Chin / Wu, Chih-Cheng et al. | 2013
- 464
-
A Secret Enriched Visual CryptographyLiu, Feng / Yan, Wei Q. / Li, Peng / Wu, Chuankun et al. | 2013
- 485
-
On the Security of Multi-secret Visual Cryptography Scheme with Ring SharesFu, Zheng-Xin / Yu, Bin et al. | 2013
- 495
-
An Image Super-Resolution Scheme Based on Compressive Sensing with PCA Sparse RepresentationZhang, Aixin / Guan, Chao / Jiang, Haomiao / Li, Jianhua et al. | 2013
- 507
-
A Novel JFE Scheme for Social Multimedia Distribution in Compressed Domain Using SVD and CAYe, Conghuan / Ling, Hefei / Zou, Fuhao / Lu, Zhengding / Xiong, Zenggang / Zhang, Kaibing et al. | 2013
- 520
-
A Robust Image Classification Scheme with Sparse Coding and Multiple Kernel LearningCheng, Dongyang / Sun, Tanfeng / Jiang, Xinghao et al. | 2013
- E1
-
Erratum to: The International Workshop on Digital Forensics and Watermarking 2012Shi, Yun Q. / Kim, Hyoung-Joong / Pérez-González, Fernando et al. | 2013