Anti-forensics of Image Sharpening Using Generative Adversarial Network (English)
- New search for: Shen, Zhangyi
- New search for: Ding, Feng
- New search for: Shi, Yunqing
- New search for: Wang, Hongxia
- Further information on Wang, Hongxia:
- https://orcid.org/https://orcid.org/0000-0002-1339-2504
- New search for: Zhao, Xianfeng
- Further information on Zhao, Xianfeng:
- https://orcid.org/https://orcid.org/0000-0002-5617-8399
- New search for: Shi, Yunqing
- New search for: Kim, Hyoung Joong
- Further information on Kim, Hyoung Joong:
- https://orcid.org/https://orcid.org/0000-0002-1144-6660
- New search for: Piva, Alessandro
- Further information on Piva, Alessandro:
- https://orcid.org/https://orcid.org/0000-0002-3047-0519
- New search for: Shen, Zhangyi
- New search for: Ding, Feng
- New search for: Shi, Yunqing
In:
Digital Forensics and Watermarking
: 18th International Workshop, IWDW 2019, Chengdu, China, November 2–4, 2019, Revised Selected Papers
;
Chapter: 12
;
150-157
;
2020
- Article/Chapter (Book) / Electronic Resource
-
Title:Anti-forensics of Image Sharpening Using Generative Adversarial Network
-
Additional title:Lect.Notes Computer
-
Contributors:Wang, Hongxia ( editor ) / Zhao, Xianfeng ( editor ) / Shi, Yunqing ( editor ) / Kim, Hyoung Joong ( editor ) / Piva, Alessandro ( editor ) / Shen, Zhangyi ( author ) / Ding, Feng ( author ) / Shi, Yunqing ( author )
-
Conference:International Workshop on Digital Watermarking ; 2019 ; Chengdu, China
-
Published in:Digital Forensics and Watermarking : 18th International Workshop, IWDW 2019, Chengdu, China, November 2–4, 2019, Revised Selected Papers ; Chapter: 12 ; 150-157Lecture Notes in Computer Science ; 12022 ; 150-157Security and Cryptology ; 150-157
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2020-03-25
-
Size:8 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
GAN-Based Steganography with the Concatenation of Multiple Feature MapsWu, Haibin / Li, Fengyong / Zhang, Xinpeng / Wu, Kui et al. | 2020
- 2
-
GAN-TStega: Text Steganography Based on Generative Adversarial NetworksYang, Zhongliang / Wei, Nan / Liu, Qinghe / Huang, Yongfeng / Zhang, Yujin et al. | 2020
- 3
-
Optimized CNN with Point-Wise Parametric Rectified Linear Unit for Spatial Image SteganalysisXue, Yi-ming / Peng, Wan-li / Wang, Yuzhu / Wen, Juan / Zhong, Ping et al. | 2020
- 4
-
Light Multiscale Conventional Neural Network for MP3 SteganalysisZhang, Jinghong / Yi, Xiaowei / Zhao, Xianfeng / Cao, Yun et al. | 2020
- 5
-
Improving Audio Steganalysis Using Deep Residual NetworksZhang, Zhenyu / Yi, Xiaowei / Zhao, Xianfeng et al. | 2020
- 6
-
Cover-Source Mismatch in Deep Spatial SteganalysisZhang, Xunpeng / Kong, Xiangwei / Wang, Pengda / Wang, Bo et al. | 2020
- 7
-
Ensemble Steganalysis Based on Deep Residual NetworkLi, Qiangjie / Feng, Guorui / Wu, Hanzhou / Zhang, Xinpeng et al. | 2020
- 8
-
Weakly Supervised Adaptation to Re-sizing for Image Manipulation Detection on Small PatchesDarmet, Ludovic / Wang, Kai / Cayre, François et al. | 2020
- 9
-
GRU-SVM Model for Synthetic Speech DetectionHuang, Ting / Wang, Hongxia / Chen, Yi / He, Peisong et al. | 2020
- 10
-
Median Filtering Detection of Small-Size Image Using AlexCaps-NetworkDuan, Guiduo / Miao, Jiayu / Huang, Tianxi et al. | 2020
- 11
-
Double JPEG Compression Detection Based on Markov ModelWang, Jinwei / Huang, Wei / Luo, Xiangyang / Shi, Yung-Qing et al. | 2020
- 12
-
Anti-forensics of Image Sharpening Using Generative Adversarial NetworkShen, Zhangyi / Ding, Feng / Shi, Yunqing et al. | 2020
- 13
-
A New JPEG Image Watermarking Method Exploiting Spatial JND ModelQin, Liwen / Li, Xiaolong / Zhao, Yao et al. | 2020
- 14
-
Improved DM-QIM Watermarking Scheme for PDF DocumentKuribayashi, Minoru / Wong, KokSheik et al. | 2020
- 15
-
New Paradigm for Self-embedding Image Watermarking with Poisson EquationCao, Fang / Wu, Tianwei / Qin, Chuan / Qian, Zhenxing / Zhang, Xinpeng et al. | 2020
- 16
-
Reversible Data Hiding Based on Partitioning the Prediction ValuesWu, Haihang / Huang, Fangjun et al. | 2020
- 17
-
A Novel Reversible Data Hiding with Skin Tone Smoothing Effect for Face ImagesYang, Yang / Cai, Xue / Xiao, Xingxing / Ye, Jinghan / Shi, Wenyi et al. | 2020
- 18
-
A Novel Lossless Data Hiding Scheme in Homomorphically Encrypted ImagesMalik, Asad / Wang, Hongxia / Khan, Ahmad Neyaz / Chen, Yanli / Chen, Yi et al. | 2020
- 19
-
Information Hiding Based on Typing ErrorsZhou, Linna / Liao, Derui et al. | 2020
- 20
-
High-Capacity Reversible Data Hiding in Encrypted Images Based on MSB PredictionXu, Dawen / Guan, Bo / Su, Shubing / Qiu, Xuena et al. | 2020
- 21
-
Image Steganography Using an Eight-Element Neighborhood Gaussian Markov Random Field ModelTong, Yichen / Ni, Jiangqun / Su, Wenkang et al. | 2020
- 22
-
Broadcasting Steganography in the BlockchainXu, Mengtian / Wu, Hanzhou / Feng, Guorui / Zhang, Xinpeng / Ding, Feng et al. | 2020
- 23
-
Designing Non-additive Distortions for JPEG Steganography Based on Blocking Artifacts ReductionLu, Yubo / Zhai, Liming / Wang, Lina et al. | 2020
- 24
-
Halftone Image Steganography with Distortion Measurement Based on Structural SimilarityLiu, Wanteng / Yin, Xiaolin / Lu, Wei / Zhang, Junhong et al. | 2020
- 25
-
A Motion Vector-Based Steganographic Algorithm for HEVC with MTB Mapping StrategyGuo, Mengyuan / Sun, Tanfeng / Jiang, Xinghao / Dong, Yi / Xu, Ke et al. | 2020
- 26
-
New Steganalytic Approach for AMR Steganography Based on Block-Wise of Pulse Position Distribution and Neighboring Joint DensityGong, Chen / Zhao, Xianfeng et al. | 2020
- 27
-
A Novel Feature Selection Model for JPEG Image SteganalysisYang, Liran / Zhong, Jing / Zhong, Ping / Xue, Yiming / Wen, Juan et al. | 2020
- 28
-
New Steganalytic Features for Spatial Image Steganography Based on Non-negative Matrix FactorizationGe, Hui / Hu, Donghui / Xu, Haiyan / Li, Meng / Zheng, Shuli et al. | 2020
- 29
-
IStego100K: Large-Scale Image Steganalysis DatasetYang, Zhongliang / Wang, Ke / Ma, Sai / Huang, Yongfeng / Kang, Xiangui / Zhao, Xianfeng et al. | 2020
- 30
-
BNS-CNN: A Blind Network Steganalysis Model Based on Convolutional Neural Network in IPv6 NetworkZhao, Danyang / Wang, Kaixi et al. | 2020
- 31
-
Behavioral Security in Covert Communication SystemsYang, Zhongliang / Hu, Yuting / Huang, Yongfeng / Zhang, Yujin et al. | 2020
- 32
-
Image Visually Meaningful Cryptography Based on Julia Set Generating and Information HidingZhou, Longfu / Bai, Sen / Cao, Yuqiang / Wang, YingLong et al. | 2020
- 33
-
Multi-attack Reference Hashing Generation for Image AuthenticationDu, Ling / Wang, Yijing / Ho, Anthony T. S. et al. | 2020
- 34
-
Cheating Detection in (k, n) Secret Image Sharing SchemeMa, Jianfeng / Yin, Liping / Li, Peng et al. | 2020