Journals starting with iwdw

IWDW11 * *IWDW
* Adaptive Selection of Embedding Locations for Spread Spectrum Watermarking of Compressed Audio
* Algorithm for k-Anonymity-Based Fingerprinting, An
* Alternative Anti-Forensics Method for Contrast Enhancement
* Anti-Forensics of Double JPEG Compression Detection
* Authenticating Visual Cryptography Shares Using 2D Barcodes
* Blind Copy-Paste Detection Using Improved SIFT Ring Descriptor
* Camera Model Identification Based on the Characteristic of CFA and Interpolation
* Comprehensive Study on Third Order Statistical Features for Image Splicing Detection, A
* Contribution of Non-scrambled Chroma Information in Privacy-Protected Face Images to Privacy Leakage
* Data Forensics Constructions from Cryptographic Hashing and Coding
* Detecting Re-captured Videos Using Shot-Based Photo Response Non-Uniformity
* Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image Edges
* Drift Compensation Algorithm for H.264/AVC Video Robust Watermarking Scheme, A
* Exposing Original and Duplicated Regions Using SIFT Features and Resampling Traces
* Extended Visual Cryptography Scheme for Continuous-Tone Images, An
* Fingerprint Forensics Application Protocol: Semi-automated Modeling and Verification of Watermark-Based Communication Using CASPER and FDR
* Flexible Visual Cryptography Scheme without Distortion
* High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding, A
* Image Forensics of High Dynamic Range Imaging
* Improved Matrix Encoding Scheme for JPEG Steganography, An
* Improved Run Length Based Detection of Digital Image Splicing
* IR Hiding: Method to Prevent Re-recording Screen Image Built in Short Wavelength Pass Filter Detection Method Using Specular Reflection
* IRIW: Image Retrieval Based Image Watermarking for Large-Scale Image Databases
* Median Filtering Detection Using Edge Based Prediction Matrix
* Modern Trends in Steganography and Steganalysis
* New Feature Presentation of Transition Probability Matrix for Image Tampering Detection
* New Watermarking Method with Obfuscated Quasi-Chirp Transform, A
* Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression, A
* Perceptual Image Hashing via Wave Atom Transform
* Performance and Robustness Analysis for Some Re-sampling Detection Techniques in Digital Images
* Photo Forensics: There Is More to a Picture than Meets the Eye
* r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images
* Robust Audio Watermarking Scheme Based on Lifting Wavelet Transform and Singular Value Decomposition, A
* Self-recovery Fragile Watermarking Scheme with Variable Watermark Payload
* Spread Spectrum-Based Multi-bit Watermarking for Free-View Video
* Steganalysis of LSB Matching Revisited for Consecutive Pixels Using B-Spline Functions
* Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates
* Use of Emergable Watermarks as Copy Indicators for Securing Video Content
* Witsenhausen's Counterexample and Its Links with Multimedia Security Problems
40 for IWDW11

IWDW13 * *IWDW
* Anonymizing Temporal Phrases in Natural Language Text to be Posted on Social Networking Services
* Bitspotting: Detecting Optimal Adaptive Steganography
* Camera Source Identification Game with Incomplete Information
* Cheat-Prevention Visual Secret Sharing Scheme with Minimum Pixel Expansion, A
* Cheating Immune Block-Based Progressive Visual Cryptography
* Compressive Sensing Based Quantized Watermarking Scheme with Statistical Transparency Constraint, A
* Detecting Non-aligned Double JPEG Compression Based on Refined Intensity Difference and Calibration
* Detecting Traitors in Re-publishing Updated Datasets
* Digital Forensics of Printed Source Identification for Chinese Characters
* Distributed Scheme for Image Splicing Detection, A
* Effective Video Copy Detection Using Statistics of Quantized Zernike Moments
* Generalized Histogram Shifting-Based Blind Reversible Data Hiding with Balanced and Guarded Double Side Modification
* Hiding a Secret Pattern into Color Halftone Images
* High Capacity Data Hiding Scheme for Binary Images Based on Minimizing Flipping Distortion
* Huffman Table Index Based Approach to Detect Double MP3 Compression, A
* Hybrid Feature Based Method for Distinguishing Computer Graphics and Photo-Graphic Image, A
* Identifying Video Forgery Process Using Optical Flow
* Image Authentication Scheme for Accurate Localization and Restoration, An
* Improved Algorithm of Edge Adaptive Image Steganography Based on LSB Matching Revisited Algorithm
* Improved License Plate Recognition for Low-Resolution CCTV Forensics by Integrating Sparse Representation-Based Super-Resolution
* Improved Tagged Visual Cryptograms by Using Random Grids
* New Forensic Methods for OOXML Format Documents
* New Reversible Data Hiding Scheme Based on Efficient Prediction, A
* Non-uniform Quantization in Breaking HUGO
* Novel Method for Detecting Image Sharpening Based on Local Binary Pattern, A
* On User Interaction Behavior as Evidence for Computer Forensic Analysis
* Restorable Semi-fragile Watermarking Combined DCT with Interpolation, A
* Reversible and Robust Audio Watermarking Based on Quantization Index Modulation and Amplitude Expansion
* Reversible Audio Information Hiding Based on Integer DCT Coefficients with Adaptive Hiding Locations
* Reversible Data Hiding in Encrypted H.264/AVC Video Streams
* Secret Sharing in Images Based on Error-Diffused Block Truncation Coding and Error Diffusion
* Steganalysis of Compressed Speech Based on Markov and Entropy
* Steganography Based on Adaptive Pixel-Value Differencing Scheme Revisited
* Using RZL Coding to Enhance Histogram-Pair Based Image Reversible Data Hiding
* Visual Cryptography and Random Grids Schemes
* Visual Cryptography Schemes Based in k -Linear Maps
* Watermarking-Based Perceptual Hashing Search Over Encrypted Speech
38 for IWDW13

IWDW14 * *IWDW
* Adapted Quantization Index Modulation for Database Watermarking
* Adaptive Predictor Structure Based Interpolation for Reversible Data Hiding
* Audio Watermarking Scheme Based on Singular-Spectrum Analysis, An
* Blind Robust Reversible Watermark Scheme for Textual Relational Databases with Virtual Primary Key, A
* Cloning Localization Based on Feature Extraction and K-means Clustering
* Combination of SIFT Feature and Convex Region-Based Global Context Feature for Image Copy Detection
* Content-Adaptive Residual for Steganalysis
* Definition of Private Information for Image Sharing in Social Networking Services
* Detecting Fake-Quality WAV Audio Based on Phase Differences
* Determination of Stop-Criterion for Incremental Methods Constructing Camera Sensor Fingerprint
* Effects of Fragile and Semi-fragile Watermarking on Iris Recognition System
* Efficient Reversible Data Hiding Based on Prefix Matching and Directed LSB Embedding
* Enhanced Matching Method for Copy-Move Forgery Detection by Means of Zernike Moments
* Evaluation of a Zero-Watermarking-Type Steganography
* High-Dimensional Histogram Utilization for Reversible Data Hiding
* Image Descriptor Based Digital Semi-blind Watermarking for DIBR 3D Images
* Image Watermarking Based on Various Discrete Fractional Fourier Transforms
* Improved Spread Transform Dither Modulation: A New Modulation Technique for Secure Watermarking
* Improved Visual Cryptography with Cheating Prevention, An
* Inter-frame Video Forgery Detection Based on Block-Wise Brightness Variance Descriptor
* Iterative Management Model of Exploring Windows Date-Time Stamps in Cloud Storage Forensics, An
* Multi-class JPEG Image Steganalysis by Ensemble Linear SVM Classifier
* New Developments in Image Tampering Detection
* Non-integer Expansion Embedding for Prediction-Based Reversible Watermarking
* Novel Hybrid Image Authentication Scheme for AMBTC-Compressed Images, A
* Optimal XOR Based (2,n)-Visual Cryptography Schemes
* Progressive Visual Secret Sharing with Multiple Decryptions and Unexpanded Shares
* Random Grids-Based Threshold Visual Secret Sharing with Improved Contrast by Boolean Operations
* Reversible and Robust Audio Watermarking Based on Spread Spectrum and Amplitude Expansion
* Reversible Data Hiding Based on Combined Predictor and Prediction Error Expansion
* Reversible Data Hiding by Median-Preserving Histogram Modification for Image Contrast Enhancement
* Reversible Data Hiding in Encrypted Images Using Interpolation and Histogram Shifting
* Reversible Image Watermarking Scheme Based on Modified Integer-to-Integer Discrete Wavelet Transform and CDMA Algorithm, A
* Reversible Shared Data Hiding Based on Modified Signed Digit EMD
* Steganographic Greedy Algorithms for Data Hiding Based on Differences Under SMVQ
* Steganography Based on Grayscale Images Using (5, 3) Hamming Code
* Steganography Based on High-Dimensional Reference Table
* Stereo Image Coding with Histogram-Pair Based Reversible Data Hiding
* Superpixel-Based Watermarking Scheme for Image Authentication and Recovery
* Tag Detection for Preventing Unauthorized Face Image Processing
* Two-in-One Image Secret Sharing Scheme Based on Boolean Operations
* Universal Counterforensics of Multiple Compressed JPEG Images
* Variable Multi-dimensional Co-occurrence for Steganalysis
* Visual Cryptography Scheme with Autostereogram
* Visual Two-Secret Sharing Schemes by Different Superimposition Positions
* Watermarking for Digital Audio Based on Adaptive Phase Modulation
* Zero-Watermarking Based on Improved ORB Features Against Print-cam Attack
48 for IWDW14

IWDW16 * *IWDW
* Adaptive Reversible Data Hiding Scheme for JPEG Images, An
* Adaptive Steganography Using 2D Gabor Filters and Ensemble Classifiers
* Adaptive Video Steganography Based on Intra-prediction Mode and Cost Assignment, An
* Blind 3D Mesh Watermarking Based on Sphere-Shape Template
* Collusive Attacks to Partition Authentication Visual Cryptography Scheme
* Concealing Fingerprint-Biometric Data into Audio Signals for Identify Authentication
* Copyright Protection for 3D Printing by Embedding Information Inside 3D-Printed Objects
* Data Hiding in H.264/AVC Video Files Using the Coded Block Pattern
* Databases Traceability by Means of Watermarking with Optimized Detection
* Deep Learning on Spatial Rich Model for Steganalysis
* Detecting Double H.264 Compression Based on Analyzing Prediction Residual Distribution
* Detection of Copy-Move Forgery in Flat Region Based on Feature Enhancement
* Detection of Video-Based Face Spoofing Using LBP and Multiscale DCT
* Distortion Function for Spatial Image Steganography Based on the Polarity of Embedding Change
* Embedding Strategy for Batch Adaptive Steganography
* Fragile Watermarking Based Proofs of Retrievability for Archival Cloud Data
* Halftone Visual Cryptography with Complementary Cover Images
* High Embedding Capacity Data Hiding Scheme Based upon Permutation Vectors, A
* Identification of Electronic Disguised Voices in the Noisy Environment
* Increasing Secret Data Hiding Capacity in QR Code Using 3X3 Subcells
* Information Security Display Technology with Multi-view Effect
* Local Derivative Pattern Based Image Forensic Framework for Seam Carving Detection, A
* Multi-purpose Image Counter-anti-forensic Method Using Convolutional Neural Networks, A
* Multiple Watermarking Using Multilevel Quantization Index Modulation
* New Card Authentication Scheme Based on Image Watermarking and Encryption, A
* Novel Robust Image Forensics Algorithm Based on L1-Norm Estimation, A
* On the Robustness of Visual Cryptographic Schemes
* Optimal Distortion Estimation for Prediction Error Expansion Based Reversible Watermarking
* Privacy Monitor
* Random Grids-Based Threshold Visual Secret Sharing with Improved Visual Quality
* Recapture Image Forensics Based on Laplacian Convolutional Neural Networks
* Reliable Pooled Steganalysis Using Fine-Grained Parameter Estimation and Hypothesis Testing
* Reversible 3D Image Data Hiding with Quality Enhancement
* Reversible Data Hiding for Texture Videos and Depth Maps Coding with Quality Scalability
* Reversible Data Hiding in Encrypted AMBTC Compressed Images
* Second Order Perdicting-Error Sorting for Reversible Data Hiding
* Segmentation Based Steganalysis of Spatial Images Using Local Linear Transform
* Separable Multiple Bits Reversible Data Hiding in Encrypted Domain
* Source Camera Identification Based on Guided Image Estimation and Block Weighted Average
* Source Cell-Phone Identification Using Spectral Features of Device Self-noise
* Speech Authentication and Recovery Scheme in Encrypted Domain
* Study of the Two-Way Effects of Cover Source Mismatch and Texture Complexity in Steganalysis, A
* Two-Dimensional Histogram Modification for Reversible Data Hiding in Partially Encrypted H.264/AVC Videos
* Using Benford's Law Divergence and Neural Networks for Classification and Source Identification of Biometric Images
* Watermarking with Fixed Decoder for Aesthetic 2D Barcode
46 for IWDW16

IWDW17 * *IWDW
* Adaptive Audio Steganography Based on Advanced Audio Coding and Syndrome-Trellis Coding
* Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution
* Blind Reversible Data Hiding Method for High Dynamic Range Images Taking Advantage of Sparse Histogram, A
* Block-Based Convolutional Neural Network for Image Forgery Detection
* CNNs Under Attack: On the Vulnerability of Deep Neural Networks Based Face Recognition to Image Morphing
* Coding Efficiency Preserving Steganography Based on HEVC Steganographic Channel Model
* Deep Learning Based Counter-Forensic Image Classification for Camera Model Identification
* Detection of Face Morphing Attacks by Deep Learning
* Face Morphing Detection: An Approach Based on Image Degradation Analysis
* HEVC Double Compression Detection Based on SN-PUPM Feature
* Hybrid Feature Model for Seam Carving Detection, A
* Image Quality Assessment in Reversible Data Hiding with Contrast Enhancement
* Improved Algorithms for Robust Histogram Shape-Based Image Watermarking
* Improved Reversible Visible Watermarking Based on Adaptive Block Partition
* Improvement and Evaluation of Time-Spread Echo Hiding Technology for Long-Distance Voice Evacuation Systems
* Information Hiding Using CAVLC: Misconceptions and a Detection Strategy
* Novel Image Classification Method with CNN-XGBoost Model, A
* Novel Visual Cryptography Scheme with Different Importance of Shadows, A
* On the Statistical Properties of Syndrome Trellis Coding
* Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization, A
* Prediction Model Based Approach to Open Space Steganography Detection in HTML WebPages, A
* Recaptured Image Forensics Based on Quality Aware and Histogram Feature
* Robust Zero Watermarking for 3D Triangular Mesh Models Based on Spherical Integral Invariants
* Steganalysis Based on Awareness of Selection-Channel and Deep Learning
* Steganalysis Scheme for AAC Audio Based on MDCT Difference Between Intra and Inter Frame, A
* Temporal Integration Based Visual Cryptography Scheme and Its Application
* Topological Data Analysis for Image Tampering Detection
* Towards Automated Forensic Pen Ink Verification by Spectral Analysis
* Towards Covert Channels in Cloud Environments: A Study of Implementations in Virtual Networks
* Website Fingerprinting Attack on Psiphon and Its Forensic Analysis
31 for IWDW17

Index for "i"


Last update:12-Nov-18 12:10:09
Use price@usc.edu for comments.