default search action
19th IWDW 2020: Melbourne, VIC, Australia
- Xianfeng Zhao, Yun-Qing Shi, Alessandro Piva, Hyoung Joong Kim:
Digital Forensics and Watermarking - 19th International Workshop, IWDW 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12617, Springer 2021, ISBN 978-3-030-69448-7
Steganography and Steganalysis
- Yuting Hu, Zhongliang Yang, Han Cao, Yongfeng Huang:
Multi-modal Steganography Based on Semantic Relevancy. 3-14 - Bingwen Feng, Zhiquan Liu, Kaimin Wei, Wei Lu, Yuchun Lin:
Variable Rate Syndrome-Trellis Codes for Steganography on Bursty Channels. 15-30 - Zichi Wang, Guorui Feng, Xinpeng Zhang:
Steganographic Distortion Function for Enhanced Images. 31-40 - Yuting Hu, Han Cao, Zhongliang Yang, Yongfeng Huang:
Improving Text-Image Matching with Adversarial Learning and Circle Loss for Multi-modal Steganography. 41-52 - Hongxia Wang, Zhilong Chen, Peisong He:
Constructing Immune Cover for Secure Steganography Based on an Artificial Immune System Approach. 53-67 - Sai Ma, Xianfeng Zhao:
Generating JPEG Steganographic Adversarial Example via Segmented Adversarial Embedding. 68-79 - Jiajun Zou, Zhongliang Yang, Si-Yu Zhang, Sadaqat ur Rehman, Yongfeng Huang:
High-Performance Linguistic Steganalysis, Capacity Estimation and Steganographic Positioning. 80-93 - Xianfeng Zhao, Chunfang Yang, Fenlin Liu:
On the Sharing-Based Model of Steganography. 94-105
Watermarking
- Sebastian Gruber, Bernd Neumayr, Christoph Fabianek, Eduard Gringinger, Christoph Georg Schütz, Michael Schrefl:
Towards Informed Watermarking of Personal Health Sensor Data for Data Leakage Detection. 109-124 - KokSheik Wong, Mohamed N. M. Nazeeb, Jean-Luc Dugelay:
Complete Quality Preserving Data Hiding in Animated GIF with Reversibility and Scalable Capacity Functionalities. 125-135 - Fei Peng, Wenjie Qian, Min Long:
Visible Reversible Watermarking for 3D Models Based on Mesh Subdivision. 136-149
Multimedia Forensics
- Xiaoyu Zhao, Yakun Niu, Rongrong Ni, Yao Zhao:
Defocused Image Splicing Localization by Distinguishing Multiple Cues between Raw Naturally Blur and Artificial Blur. 153-167 - Yewei Gu, Xianfeng Zhao, Chen Gong, Xiaowei Yi:
Deepfake Video Detection Using Audio-Visual Consistency. 168-180 - Robert Jöchl, Andreas Uhl:
A Machine Learning Approach to Approximate the Age of a Digital Image. 181-195 - Daniele Baracchi, Massimo Iuliani, Andrea G. Nencini, Alessandro Piva:
Facing Image Source Attribution on iPhone X. 196-207 - Ivan Castillo Camacho, Kai Wang:
Data-Dependent Scaling of CNN's First Layer for Improved Image Manipulation Detection. 208-223 - Hui Zeng, Kang Deng, Anjie Peng:
ISO Setting Estimation Based on Convolutional Neural Network and its Application in Image Forensics. 224-236 - Qilin Yin, Jinwei Wang, Xiangyang Luo:
A Hybrid Loss Network for Localization of Image Manipulation. 237-247
Security of AI-based Multimedia Applications
- Donghua Wang, Rangding Wang, Li Dong, Diqun Yan, Yiming Ren:
Efficient Generation of Speech Adversarial Examples with Generative Model. 251-264 - Junjie Zhao, Jinwei Wang:
Lightweight DCT-Like Domain Forensics Model for Adversarial Example. 265-279
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.