Reversible and Robust Audio Watermarking Based on Spread Spectrum and Amplitude Expansion (English)
- New search for: Nishimura, Akira
- New search for: Shi, Yun-Qing
- New search for: Kim, Hyoung Joong
- Further information on Kim, Hyoung Joong:
- https://orcid.org/https://orcid.org/0000-0002-1144-6660
- New search for: Pérez-González, Fernando
- New search for: Yang, Ching-Nung
- New search for: Nishimura, Akira
In:
Digital-Forensics and Watermarking
: 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers
;
Chapter: 16
;
215-229
;
2015
- Article/Chapter (Book) / Electronic Resource
-
Title:Reversible and Robust Audio Watermarking Based on Spread Spectrum and Amplitude Expansion
-
Additional title:Lect.Notes Computer
-
Contributors:Shi, Yun-Qing ( editor ) / Kim, Hyoung Joong ( editor ) / Pérez-González, Fernando ( editor ) / Yang, Ching-Nung ( editor ) / Nishimura, Akira ( author )
-
Conference:International Workshop on Digital Watermarking ; 2014 ; Taipei, Taiwan
-
Published in:Digital-Forensics and Watermarking : 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers ; Chapter: 16 ; 215-229Lecture Notes in Computer Science ; 9023 ; 215-229Security and Cryptology ; 215-229
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2015-05-28
-
Size:15 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
New Developments in Image Tampering DetectionXu, Guanshuo / Ye, Jingyu / Shi, Yun-Qing et al. | 2015
- 2
-
Inter-frame Video Forgery Detection Based on Block-Wise Brightness Variance DescriptorZheng, Lu / Sun, Tanfeng / Shi, Yun-Qing et al. | 2015
- 3
-
Universal Counterforensics of Multiple Compressed JPEG ImagesBarni, Mauro / Fontani, Marco / Tondi, Benedetta et al. | 2015
- 4
-
Determination of Stop-Criterion for Incremental Methods Constructing Camera Sensor FingerprintMahdian, Babak / Novozámský, Adam / Saic, Stanislav et al. | 2015
- 5
-
Combination of SIFT Feature and Convex Region-Based Global Context Feature for Image Copy DetectionZhou, Zhili / Sun, Xingming / Wang, Yunlong / Fu, Zhangjie / Shi, Yun-Qing et al. | 2015
- 6
-
A Blind Robust Reversible Watermark Scheme for Textual Relational Databases with Virtual Primary KeyChang, Chin-Chen / Nguyen, Thai-Son / Lin, Chia-Chen et al. | 2015
- 7
-
Image Descriptor Based Digital Semi-blind Watermarking for DIBR 3D ImagesMiao, Hsin / Lin, Yu-Hsun / Wu, Ja-Ling et al. | 2015
- 8
-
Watermarking for Digital Audio Based on Adaptive Phase ModulationNgo, Nhut Minh / Unoki, Masashi et al. | 2015
- 9
-
Adapted Quantization Index Modulation for Database WatermarkingFranco-Contreras, Javier / Coatrieux, Gouenou / Cuppens-Boulahia, Nora / Cuppens, Frédéric / Roux, Christian et al. | 2015
- 10
-
Image Watermarking Based on Various Discrete Fractional Fourier TransformsTsai, Fong-Maw / Hsue, Wen-Liang et al. | 2015
- 11
-
An Audio Watermarking Scheme Based on Singular-Spectrum AnalysisKarnjana, Jessada / Unoki, Masashi / Aimmanee, Pakinee / Wutiwiwatchai, Chai et al. | 2015
- 12
-
Superpixel-Based Watermarking Scheme for Image Authentication and RecoveryQiao, Xiumei / Ni, Rongrong / Zhao, Yao et al. | 2015
- 13
-
Effects of Fragile and Semi-fragile Watermarking on Iris Recognition SystemWang, Zairan / Dong, Jing / Wang, Wei / Tan, Tieniu et al. | 2015
- 14
-
Zero-Watermarking Based on Improved ORB Features Against Print-cam AttackLu, Jianfeng / Huang, Qianru / Wang, Meng / Li, Li / Dai, Junping / Chang, Chin-Chen et al. | 2015
- 15
-
Stereo Image Coding with Histogram-Pair Based Reversible Data HidingTong, Xuefeng / Shen, Guangce / Xuan, Guorong / Li, Shumeng / Yang, Zhiqiang / Li, Jian / Shi, Yun-Qing et al. | 2015
- 16
-
Reversible and Robust Audio Watermarking Based on Spread Spectrum and Amplitude ExpansionNishimura, Akira et al. | 2015
- 17
-
Reversible Data Hiding in Encrypted Images Using Interpolation and Histogram ShiftingXu, Dawen / Wang, Rangding et al. | 2015
- 18
-
High-Dimensional Histogram Utilization for Reversible Data HidingGui, Xinlu / Li, Xiaolong / Yang, Bin et al. | 2015
- 19
-
Reversible Data Hiding Based on Combined Predictor and Prediction Error ExpansionQu, Xiaochao / Kim, Suah / Cui, Run / Huang, Fangjun / Kim, Hyoung Joong et al. | 2015
- 20
-
Reversible Shared Data Hiding Based on Modified Signed Digit EMDKuo, Wen-Chung / Wang, Chun-Cheng / Hou, Hong-Ching / Chuang, Chen-Tsun et al. | 2015
- 21
-
Adaptive Predictor Structure Based Interpolation for Reversible Data HidingJaiswal, Sunil Prasad / Au, Oscar / Jakhetiya, Vinit / Guo, Andy Yuanfang / Tiwari, Anil K. et al. | 2015
- 22
-
Reversible Data Hiding by Median-Preserving Histogram Modification for Image Contrast EnhancementWu, Hao-Tian / Liu, Yuan / Shi, Yun-Qing et al. | 2015
- 23
-
Two-in-One Image Secret Sharing Scheme Based on Boolean OperationsLi, Peng / Yang, Ching-Nung / Kong, Qian et al. | 2015
- 24
-
Random Girds-Based Threshold Visual Secret Sharing with Improved Contrast by Boolean OperationsYan, Xuehu / Chen, Guohui / Yang, Ching-Nung / Cai, Song-Ruei et al. | 2015
- 25
-
Optimal XOR Based (2,n)-Visual Cryptography SchemesLiu, Feng / Wu, ChuanKun et al. | 2015
- 26
-
Visual Two-Secret Sharing Schemes by Different Superimposition PositionsLi, Yi Hao / Shyu, Shyong Jian et al. | 2015
- 27
-
Visual Cryptography Scheme with AutostereogramWang, Dao-Shun / Yi, Feng / Yang, Ching-Nung et al. | 2015
- 28
-
Progressive Visual Secret Sharing with Multiple Decryptions and Unexpanded SharesChen, Guohui / Wang, Chunying / Yan, Xuehu / Li, Peng et al. | 2015
- 29
-
Content-Adaptive Residual for SteganalysisLin, Xu / Feng, Bingwen / Lu, Wei / Sun, Wei et al. | 2015
- 30
-
Improved Spread Transform Dither Modulation: A New Modulation Technique for Secure WatermarkingCao, Jian et al. | 2015
- 31
-
Cloning Localization Based on Feature Extraction and K-means ClusteringAlfraih, Areej S. / Briffa, Johann A. / Wesemeyer, Stephan et al. | 2015
- 32
-
A Reversible Image Watermarking Scheme Based on Modified Integer-to-Integer Discrete Wavelet Transform and CDMA AlgorithmMa, Bin / Shi, Yun Qing et al. | 2015
- 33
-
A Novel Hybrid Image Authentication Scheme for AMBTC-Compressed ImagesLin, Chia-Chen / Huang, Yuehong / Tai, Wei-Liang et al. | 2015
- 34
-
An Improved Visual Cryptography with Cheating PreventionChen, Yu-Chi / Lu, Kunhan / Tso, Raylin / Wu, Mu-En et al. | 2015
- 35
-
Efficient Reversible Data Hiding Based on Prefix Matching and Directed LSB EmbeddingWu, Hanzhou / Wang, Hongxia / Hu, Yi / Zhou, Linna et al. | 2015
- 36
-
Multi-class JPEG Image Steganalysis by Ensemble Linear SVM ClassifierZhu, Jie / Guan, Qingxiao / Zhao, Xianfeng et al. | 2015
- 37
-
Enhanced Matching Method for Copy-Move Forgery Detection by Means of Zernike MomentsAl-Qershi, Osamah M. / Khoo, Bee Ee et al. | 2015
- 38
-
An Iterative Management Model of Exploring Windows Date-Time Stamps in Cloud Storage ForensicsKao, Da-Yu / Chiu, Ying-Hsuan et al. | 2015
- 39
-
Tag Detection for Preventing Unauthorized Face Image ProcessingJimenez, Alberto Escalada / Dabrowski, Adrian / Sonehara, Noburu / Martinez, Juan M. Montero / Echizen, Isao et al. | 2015
- 40
-
Detecting Fake-Quality WAV Audio Based on Phase DifferencesZhou, Jinglei / Wang, Rangding / Jin, Chao / Yan, Diqun et al. | 2015
- 41
-
Non-integer Expansion Embedding for Prediction-Based Reversible WatermarkingLiu, Shangyi / Xiang, Shijun et al. | 2015
- 42
-
Definition of Private Information for Image Sharing in Social Networking ServicesChaussy, Erwan / Machida, Shimon / Sonehara, Noboru / Echizen, Isao et al. | 2015
- 43
-
Variable Multi-dimensional Co-occurrence for SteganalysisChen, Licong / Shi, Yun-Qing / Sutthiwan, Patchara et al. | 2015
- 44
-
Steganography Based on High-Dimensional Reference TableFeng, Bingwen / Lu, Wei / Dai, Lu / Sun, Wei et al. | 2015
- 45
-
Steganography Based on Grayscale Images Using (5, 3) Hamming CodeKim, Cheonshik / Yang, Ching-Nung et al. | 2015
- 46
-
Steganographic Greedy Algorithms for Data Hiding Based on Differences Under SMVQWang, Wei-Jen / Huang, Cheng-Ta / Tsuei, Shiau-Rung / WANG, Shiuh-Jeng et al. | 2015
- 47
-
Evaluation of a Zero-Watermarking-Type SteganographyIshizuka, Hirokazu / Echizen, Isao / Iwamura, Keiichi / Sakurai, Koichi et al. | 2015