Journals starting with iwdw

IWDW11 * *IWDW
* Adaptive Selection of Embedding Locations for Spread Spectrum Watermarking of Compressed Audio
* Algorithm for k-Anonymity-Based Fingerprinting, An
* Alternative Anti-Forensics Method for Contrast Enhancement
* Anti-Forensics of Double JPEG Compression Detection
* Authenticating Visual Cryptography Shares Using 2D Barcodes
* Blind Copy-Paste Detection Using Improved SIFT Ring Descriptor
* Camera Model Identification Based on the Characteristic of CFA and Interpolation
* Comprehensive Study on Third Order Statistical Features for Image Splicing Detection, A
* Contribution of Non-scrambled Chroma Information in Privacy-Protected Face Images to Privacy Leakage
* Data Forensics Constructions from Cryptographic Hashing and Coding
* Detecting Re-captured Videos Using Shot-Based Photo Response Non-Uniformity
* Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image Edges
* Drift Compensation Algorithm for H.264/AVC Video Robust Watermarking Scheme, A
* Exposing Original and Duplicated Regions Using SIFT Features and Resampling Traces
* Extended Visual Cryptography Scheme for Continuous-Tone Images, An
* Fingerprint Forensics Application Protocol: Semi-automated Modeling and Verification of Watermark-Based Communication Using CASPER and FDR
* Flexible Visual Cryptography Scheme without Distortion
* High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding, A
* Image Forensics of High Dynamic Range Imaging
* Improved Matrix Encoding Scheme for JPEG Steganography, An
* Improved Run Length Based Detection of Digital Image Splicing
* IR Hiding: Method to Prevent Re-recording Screen Image Built in Short Wavelength Pass Filter Detection Method Using Specular Reflection
* IRIW: Image Retrieval Based Image Watermarking for Large-Scale Image Databases
* Median Filtering Detection Using Edge Based Prediction Matrix
* Modern Trends in Steganography and Steganalysis
* New Feature Presentation of Transition Probability Matrix for Image Tampering Detection
* New Watermarking Method with Obfuscated Quasi-Chirp Transform, A
* Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression, A
* Perceptual Image Hashing via Wave Atom Transform
* Performance and Robustness Analysis for Some Re-sampling Detection Techniques in Digital Images
* Photo Forensics: There Is More to a Picture than Meets the Eye
* r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images
* Robust Audio Watermarking Scheme Based on Lifting Wavelet Transform and Singular Value Decomposition, A
* Self-recovery Fragile Watermarking Scheme with Variable Watermark Payload
* Spread Spectrum-Based Multi-bit Watermarking for Free-View Video
* Steganalysis of LSB Matching Revisited for Consecutive Pixels Using B-Spline Functions
* Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates
* Use of Emergable Watermarks as Copy Indicators for Securing Video Content
* Witsenhausen's Counterexample and Its Links with Multimedia Security Problems
40 for IWDW11

IWDW13 * *IWDW
* Anonymizing Temporal Phrases in Natural Language Text to be Posted on Social Networking Services
* Bitspotting: Detecting Optimal Adaptive Steganography
* Camera Source Identification Game with Incomplete Information
* Cheat-Prevention Visual Secret Sharing Scheme with Minimum Pixel Expansion, A
* Cheating Immune Block-Based Progressive Visual Cryptography
* Compressive Sensing Based Quantized Watermarking Scheme with Statistical Transparency Constraint, A
* Detecting Non-aligned Double JPEG Compression Based on Refined Intensity Difference and Calibration
* Detecting Traitors in Re-publishing Updated Datasets
* Digital Forensics of Printed Source Identification for Chinese Characters
* Distributed Scheme for Image Splicing Detection, A
* Effective Video Copy Detection Using Statistics of Quantized Zernike Moments
* Generalized Histogram Shifting-Based Blind Reversible Data Hiding with Balanced and Guarded Double Side Modification
* Hiding a Secret Pattern into Color Halftone Images
* High Capacity Data Hiding Scheme for Binary Images Based on Minimizing Flipping Distortion
* Huffman Table Index Based Approach to Detect Double MP3 Compression, A
* Hybrid Feature Based Method for Distinguishing Computer Graphics and Photo-Graphic Image, A
* Identifying Video Forgery Process Using Optical Flow
* Image Authentication Scheme for Accurate Localization and Restoration, An
* Improved Algorithm of Edge Adaptive Image Steganography Based on LSB Matching Revisited Algorithm
* Improved License Plate Recognition for Low-Resolution CCTV Forensics by Integrating Sparse Representation-Based Super-Resolution
* Improved Tagged Visual Cryptograms by Using Random Grids
* New Forensic Methods for OOXML Format Documents
* New Reversible Data Hiding Scheme Based on Efficient Prediction, A
* Non-uniform Quantization in Breaking HUGO
* Novel Method for Detecting Image Sharpening Based on Local Binary Pattern, A
* On User Interaction Behavior as Evidence for Computer Forensic Analysis
* Restorable Semi-fragile Watermarking Combined DCT with Interpolation, A
* Reversible and Robust Audio Watermarking Based on Quantization Index Modulation and Amplitude Expansion
* Reversible Audio Information Hiding Based on Integer DCT Coefficients with Adaptive Hiding Locations
* Reversible Data Hiding in Encrypted H.264/AVC Video Streams
* Secret Sharing in Images Based on Error-Diffused Block Truncation Coding and Error Diffusion
* Steganalysis of Compressed Speech Based on Markov and Entropy
* Steganography Based on Adaptive Pixel-Value Differencing Scheme Revisited
* Using RZL Coding to Enhance Histogram-Pair Based Image Reversible Data Hiding
* Visual Cryptography and Random Grids Schemes
* Visual Cryptography Schemes Based in k -Linear Maps
* Watermarking-Based Perceptual Hashing Search Over Encrypted Speech
38 for IWDW13

IWDW14 * *IWDW
* Adapted Quantization Index Modulation for Database Watermarking
* Adaptive Predictor Structure Based Interpolation for Reversible Data Hiding
* Audio Watermarking Scheme Based on Singular-Spectrum Analysis, An
* Blind Robust Reversible Watermark Scheme for Textual Relational Databases with Virtual Primary Key, A
* Cloning Localization Based on Feature Extraction and K-means Clustering
* Combination of SIFT Feature and Convex Region-Based Global Context Feature for Image Copy Detection
* Content-Adaptive Residual for Steganalysis
* Definition of Private Information for Image Sharing in Social Networking Services
* Detecting Fake-Quality WAV Audio Based on Phase Differences
* Determination of Stop-Criterion for Incremental Methods Constructing Camera Sensor Fingerprint
* Effects of Fragile and Semi-fragile Watermarking on Iris Recognition System
* Efficient Reversible Data Hiding Based on Prefix Matching and Directed LSB Embedding
* Enhanced Matching Method for Copy-Move Forgery Detection by Means of Zernike Moments
* Evaluation of a Zero-Watermarking-Type Steganography
* High-Dimensional Histogram Utilization for Reversible Data Hiding
* Image Descriptor Based Digital Semi-blind Watermarking for DIBR 3D Images
* Image Watermarking Based on Various Discrete Fractional Fourier Transforms
* Improved Spread Transform Dither Modulation: A New Modulation Technique for Secure Watermarking
* Improved Visual Cryptography with Cheating Prevention, An
* Inter-frame Video Forgery Detection Based on Block-Wise Brightness Variance Descriptor
* Iterative Management Model of Exploring Windows Date-Time Stamps in Cloud Storage Forensics, An
* Multi-class JPEG Image Steganalysis by Ensemble Linear SVM Classifier
* New Developments in Image Tampering Detection
* Non-integer Expansion Embedding for Prediction-Based Reversible Watermarking
* Novel Hybrid Image Authentication Scheme for AMBTC-Compressed Images, A
* Optimal XOR Based (2,n)-Visual Cryptography Schemes
* Progressive Visual Secret Sharing with Multiple Decryptions and Unexpanded Shares
* Random Grids-Based Threshold Visual Secret Sharing with Improved Contrast by Boolean Operations
* Reversible and Robust Audio Watermarking Based on Spread Spectrum and Amplitude Expansion
* Reversible Data Hiding Based on Combined Predictor and Prediction Error Expansion
* Reversible Data Hiding by Median-Preserving Histogram Modification for Image Contrast Enhancement
* Reversible Data Hiding in Encrypted Images Using Interpolation and Histogram Shifting
* Reversible Image Watermarking Scheme Based on Modified Integer-to-Integer Discrete Wavelet Transform and CDMA Algorithm, A
* Reversible Shared Data Hiding Based on Modified Signed Digit EMD
* Steganographic Greedy Algorithms for Data Hiding Based on Differences Under SMVQ
* Steganography Based on Grayscale Images Using (5, 3) Hamming Code
* Steganography Based on High-Dimensional Reference Table
* Stereo Image Coding with Histogram-Pair Based Reversible Data Hiding
* Superpixel-Based Watermarking Scheme for Image Authentication and Recovery
* Tag Detection for Preventing Unauthorized Face Image Processing
* Two-in-One Image Secret Sharing Scheme Based on Boolean Operations
* Universal Counterforensics of Multiple Compressed JPEG Images
* Variable Multi-dimensional Co-occurrence for Steganalysis
* Visual Cryptography Scheme with Autostereogram
* Visual Two-Secret Sharing Schemes by Different Superimposition Positions
* Watermarking for Digital Audio Based on Adaptive Phase Modulation
* Zero-Watermarking Based on Improved ORB Features Against Print-cam Attack
48 for IWDW14

IWDW16 * *IWDW
* Adaptive Reversible Data Hiding Scheme for JPEG Images, An
* Adaptive Steganography Using 2D Gabor Filters and Ensemble Classifiers
* Adaptive Video Steganography Based on Intra-prediction Mode and Cost Assignment, An
* Blind 3D Mesh Watermarking Based on Sphere-Shape Template
* Collusive Attacks to Partition Authentication Visual Cryptography Scheme
* Concealing Fingerprint-Biometric Data into Audio Signals for Identify Authentication
* Copyright Protection for 3D Printing by Embedding Information Inside 3D-Printed Objects
* Data Hiding in H.264/AVC Video Files Using the Coded Block Pattern
* Databases Traceability by Means of Watermarking with Optimized Detection
* Deep Learning on Spatial Rich Model for Steganalysis
* Detecting Double H.264 Compression Based on Analyzing Prediction Residual Distribution
* Detection of Copy-Move Forgery in Flat Region Based on Feature Enhancement
* Detection of Video-Based Face Spoofing Using LBP and Multiscale DCT
* Distortion Function for Spatial Image Steganography Based on the Polarity of Embedding Change
* Embedding Strategy for Batch Adaptive Steganography
* Fragile Watermarking Based Proofs of Retrievability for Archival Cloud Data
* Halftone Visual Cryptography with Complementary Cover Images
* High Embedding Capacity Data Hiding Scheme Based upon Permutation Vectors, A
* Identification of Electronic Disguised Voices in the Noisy Environment
* Increasing Secret Data Hiding Capacity in QR Code Using 3X3 Subcells
* Information Security Display Technology with Multi-view Effect
* Local Derivative Pattern Based Image Forensic Framework for Seam Carving Detection, A
* Multi-purpose Image Counter-anti-forensic Method Using Convolutional Neural Networks, A
* Multiple Watermarking Using Multilevel Quantization Index Modulation
* New Card Authentication Scheme Based on Image Watermarking and Encryption, A
* Novel Robust Image Forensics Algorithm Based on L1-Norm Estimation, A
* On the Robustness of Visual Cryptographic Schemes
* Optimal Distortion Estimation for Prediction Error Expansion Based Reversible Watermarking
* Privacy Monitor
* Random Grids-Based Threshold Visual Secret Sharing with Improved Visual Quality
* Recapture Image Forensics Based on Laplacian Convolutional Neural Networks
* Reliable Pooled Steganalysis Using Fine-Grained Parameter Estimation and Hypothesis Testing
* Reversible 3D Image Data Hiding with Quality Enhancement
* Reversible Data Hiding for Texture Videos and Depth Maps Coding with Quality Scalability
* Reversible Data Hiding in Encrypted AMBTC Compressed Images
* Second Order Perdicting-Error Sorting for Reversible Data Hiding
* Segmentation Based Steganalysis of Spatial Images Using Local Linear Transform
* Separable Multiple Bits Reversible Data Hiding in Encrypted Domain
* Source Camera Identification Based on Guided Image Estimation and Block Weighted Average
* Source Cell-Phone Identification Using Spectral Features of Device Self-noise
* Speech Authentication and Recovery Scheme in Encrypted Domain
* Study of the Two-Way Effects of Cover Source Mismatch and Texture Complexity in Steganalysis, A
* Two-Dimensional Histogram Modification for Reversible Data Hiding in Partially Encrypted H.264/AVC Videos
* Using Benford's Law Divergence and Neural Networks for Classification and Source Identification of Biometric Images
* Watermarking with Fixed Decoder for Aesthetic 2D Barcode
46 for IWDW16

IWDW17 * *IWDW
* Adaptive Audio Steganography Based on Advanced Audio Coding and Syndrome-Trellis Coding
* Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution
* Blind Reversible Data Hiding Method for High Dynamic Range Images Taking Advantage of Sparse Histogram, A
* Block-Based Convolutional Neural Network for Image Forgery Detection
* CNNs Under Attack: On the Vulnerability of Deep Neural Networks Based Face Recognition to Image Morphing
* Coding Efficiency Preserving Steganography Based on HEVC Steganographic Channel Model
* Deep Learning Based Counter-Forensic Image Classification for Camera Model Identification
* Detection of Face Morphing Attacks by Deep Learning
* Face Morphing Detection: An Approach Based on Image Degradation Analysis
* HEVC Double Compression Detection Based on SN-PUPM Feature
* Hybrid Feature Model for Seam Carving Detection, A
* Image Quality Assessment in Reversible Data Hiding with Contrast Enhancement
* Improved Algorithms for Robust Histogram Shape-Based Image Watermarking
* Improved Reversible Visible Watermarking Based on Adaptive Block Partition
* Improvement and Evaluation of Time-Spread Echo Hiding Technology for Long-Distance Voice Evacuation Systems
* Information Hiding Using CAVLC: Misconceptions and a Detection Strategy
* Novel Image Classification Method with CNN-XGBoost Model, A
* Novel Visual Cryptography Scheme with Different Importance of Shadows, A
* On the Statistical Properties of Syndrome Trellis Coding
* Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization, A
* Prediction Model Based Approach to Open Space Steganography Detection in HTML WebPages, A
* Recaptured Image Forensics Based on Quality Aware and Histogram Feature
* Robust Zero Watermarking for 3D Triangular Mesh Models Based on Spherical Integral Invariants
* Steganalysis Based on Awareness of Selection-Channel and Deep Learning
* Steganalysis Scheme for AAC Audio Based on MDCT Difference Between Intra and Inter Frame, A
* Temporal Integration Based Visual Cryptography Scheme and Its Application
* Topological Data Analysis for Image Tampering Detection
* Towards Automated Forensic Pen Ink Verification by Spectral Analysis
* Towards Covert Channels in Cloud Environments: A Study of Implementations in Virtual Networks
* Website Fingerprinting Attack on Psiphon and Its Forensic Analysis
31 for IWDW17

IWDW18 * *IWDW
* Comparison of DCT and Gabor Filters in Residual Extraction of CNN Based JPEG Steganalysis
* Content-Adaptive Steganalysis via Augmented Utilization of Selection-Channel Information
* Convolutional Neural Network Based Seam Carving Detection Scheme for Uncompressed Digital Images, A
* Convolutional Neural Network for Larger JPEG Images Steganalysis
* Cycle GAN-Based Attack on Recaptured Images to Fool both Human and Machine
* Deep Residual Multi-scale Convolutional Network for Spatial Steganalysis, A
* DWT and QR Code Based Watermarking for Document DRM
* Dynamic Watermarking-Based Integrity Protection of Homomorphically Encrypted Databases: Application to Outsourced Genetic Data
* Empirical Study of Steganography and Steganalysis of Color Images in the JPEG Domain, An
* High Capacity HEVC Steganographic Algorithm Using Intra Prediction Modes in Multi-sized Prediction Blocks, A
* Improved High Capacity Spread Spectrum-Based Audio Watermarking by Hadamard Matrices
* Improving the Embedding Strategy for Batch Adaptive Steganography
* Multiple Linear Regression Based High-Accuracy Error Prediction Algorithm for Reversible Data Hiding, A
* Novel Steganalysis of Steghide Focused on High-Frequency Region of Audio Waveform, A
* Pitch Delay Based Adaptive Steganography for AMR Speech Stream
* Pixel-Value-Ordering Based Reversible Data Hiding with Adaptive Texture Classification and Modification
* Provably Secure Generative Steganography Based on Autoregressive Model
* Reconstruction of Fingerprints from Minutiae Using Conditional Adversarial Networks
* Reversible Data Hiding in Encrypted Images Based on Image Partition and Spatial Correlation
* Reversible Data Hiding Scheme in Encrypted-Image Based on Prediction and Compression Coding
* Secure Multilayer Perceptron Based on Homomorphic Encryption
* Spherical Panorama Image Watermarking Using Viewpoint Detection
* Strategy of Distinguishing Texture Feature for Reversible Data Hiding Based on Histogram Shifting, A
* Surveillance Video Authentication Using Universal Image Quality Index of Temporal Average
* Towards Robust Neural Networks with Lipschitz Continuity
* Traitor Tracing After Visible Watermark Removal
* Unsupervised Domain Adaptation for Object Detection Using Distribution Matching in Various Feature Level
* VPCID: A VoIP Phone Call Identification Database
29 for IWDW18

IWDW19 * *IWDW
* Anti-forensics of Image Sharpening Using Generative Adversarial Network
* Behavioral Security in Covert Communication Systems
* BNS-CNN: A Blind Network Steganalysis Model Based on Convolutional Neural Network in IPV6 Network
* Broadcasting Steganography in the Blockchain
* Cheating Detection in (k, n) Secret Image Sharing Scheme
* Cover-source Mismatch in Deep Spatial Steganalysis
* Designing Non-additive Distortions for JPEG Steganography Based on Blocking Artifacts Reduction
* Double Jpeg Compression Detection Based on Markov Model
* Ensemble Steganalysis Based on Deep Residual Network
* GAN-based Steganography with the Concatenation of Multiple Feature Maps
* GAN-TSTEGA: Text Steganography Based on Generative Adversarial Networks
* GRU-SVM Model for Synthetic Speech Detection
* Halftone Image Steganography with Distortion Measurement Based on Structural Similarity
* High-capacity Reversible Data Hiding in Encrypted Images Based on Msb Prediction
* Image Steganography Using an Eight-element Neighborhood Gaussian Markov Random Field Model
* Image Visually Meaningful Cryptography Based on Julia Set Generating and Information Hiding
* Improved DM-QIM Watermarking Scheme for PDF Document
* Improving Audio Steganalysis Using Deep Residual Networks
* Information Hiding Based on Typing Errors
* ISTEGO100K: Large-scale Image Steganalysis Dataset
* Light Multiscale Conventional Neural Network for MP3 Steganalysis
* Median Filtering Detection of Small-size Image Using Alexcaps-network
* Motion Vector-based Steganographic Algorithm for HEVC with MTB Mapping Strategy, A
* Multi-attack Reference Hashing Generation for Image Authentication
* New JPEG Image Watermarking Method Exploiting Spatial Jnd Model, A
* New Paradigm for Self-embedding Image Watermarking with Poisson Equation
* New Steganalytic Approach for AMR Steganography Based on Block-wise of Pulse Position Distribution and Neighboring Joint Density
* New Steganalytic Features for Spatial Image Steganography Based on Non-negative Matrix Factorization
* Novel Feature Selection Model for JPEG Image Steganalysis, A
* Novel Lossless Data Hiding Scheme in Homomorphically Encrypted Images, A
* Novel Reversible Data Hiding with Skin Tone Smoothing Effect for Face Images, A
* Optimized CNN with Point-wise Parametric Rectified Linear Unit for Spatial Image Steganalysis
* Reversible Data Hiding Based on Partitioning the Prediction Values
* Weakly Supervised Adaptation to Re-sizing for Image Manipulation Detection on Small Patches
35 for IWDW19

IWDW20 * *IWDW
* Complete Quality Preserving Data Hiding in Animated GIF with Reversibility and Scalable Capacity Functionalities
* Constructing Immune Cover for Secure Steganography Based on an Artificial Immune System Approach
* Data-dependent Scaling of CNN's First Layer for Improved Image Manipulation Detection
* Deepfake Video Detection Using Audio-visual Consistency
* Defocused Image Splicing Localization by Distinguishing Multiple Cues between Raw Naturally Blur and Artificial Blur
* Efficient Generation of Speech Adversarial Examples with Generative Model
* Facing Image Source Attribution on iPhone X
* Generating JPEG Steganographic Adversarial Example via Segmented Adversarial Embedding
* High-performance Linguistic Steganalysis, Capacity Estimation and Steganographic Positioning
* Hybrid Loss Network for Localization of Image Manipulation, A
* Improving Text-image Matching with Adversarial Learning and Circle Loss for Multi-modal Steganography
* ISO Setting Estimation Based on Convolutional Neural Network and its Application in Image Forensics
* Lightweight DCT-Like Domain Forensics Model for Adversarial Example
* Machine Learning Approach to Approximate the Age of a Digital Image, A
* Multi-modal Steganography Based on Semantic Relevancy
* On the Sharing-based Model of Steganography
* Steganographic Distortion Function for Enhanced Images
* Towards Informed Watermarking of Personal Health Sensor Data for Data Leakage Detection
* Variable Rate Syndrome-trellis Codes for Steganography on Bursty Channels
* Visible Reversible Watermarking for 3d Models Based on Mesh Subdivision
21 for IWDW20

IWDW22 * *IWDW
* Adaptive Despread Spectrum-Based Image Watermarking for Fast Product Tracking
* Adaptive Robust Watermarking Method Based on Deep Neural Networks
* Deep Learning Image Age Approximation - What is More Relevant: Image Content or Age Information?
* High Capacity Reversible Data Hiding for Encrypted 3d Mesh Models Based on Topology
* High-capacity Adaptive Steganography Based on Transform Coefficient for HEVC
* High-performance Steganographic Coding Based on Sub-polarized Channel
* Improving the Transferability of Adversarial Attacks Through Both Front and Rear Vector Method
* Manipulated Face Detection and Localization Based on Semantic Segmentation
* Physical Anti-copying Semi-robust Random Watermarking for QR Code
* Reversible Data Hiding via Arranging Blocks of Bit-planes in Encrypted Images
* Robust and Imperceptible Watermarking Scheme for GWAS Data Traceability
* Se-resnet56: Robust Network Model for Deepfake Detection
* Visual Explanations for Exposing Potential Inconsistency of Deepfakes
* Voice Conversion Using Learnable Similarity-guided Masked Autoencoder
15 for IWDW22

Index for "i"


Last update:18-Apr-24 12:22:27
Use price@usc.edu for comments.