callback( { "result":{ "query":":facetid:toc:\"db/conf/iwdw/iwdw2016.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"66.22" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"46", "@dc":"46", "@oc":"46", "@id":"43410944", "text":":facetid:toc:db/conf/iwdw/iwdw2016.bht" } }, "hits":{ "@total":"46", "@computed":"46", "@sent":"46", "@first":"0", "hit":[{ "@score":"1", "@id":"3037554", "info":{"authors":{"author":[{"@pid":"s/YunQShi","text":"Yun-Qing Shi 0001"},{"@pid":"96/2779","text":"Hyoung-Joong Kim"},{"@pid":"91/3114","text":"Fernando Pérez-González"},{"@pid":"77/1318","text":"Feng Liu"}]},"title":"Digital Forensics and Watermarking - 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers","venue":["IWDW","Lecture Notes in Computer Science"],"volume":"10082","year":"2017","type":"Editorship","key":"conf/iwdw/2016","doi":"10.1007/978-3-319-53465-7","ee":"https://doi.org/10.1007/978-3-319-53465-7","url":"https://dblp.org/rec/conf/iwdw/2016"}, "url":"URL#3037554" }, { "@score":"1", "@id":"3306711", "info":{"authors":{"author":[{"@pid":"38/7223-1","text":"Dawen Xu 0001"},{"@pid":"29/2313","text":"Yani Zhu"},{"@pid":"63/1074","text":"Rangding Wang"},{"@pid":"195/0814","text":"Jianjing Fu"},{"@pid":"181/2839","text":"Kai Chen"}]},"title":"Two-Dimensional Histogram Modification for Reversible Data Hiding in Partially Encrypted H.264/AVC Videos.","venue":"IWDW","pages":"393-406","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/0001ZWFC16","doi":"10.1007/978-3-319-53465-7_29","ee":"https://doi.org/10.1007/978-3-319-53465-7_29","url":"https://dblp.org/rec/conf/iwdw/0001ZWFC16"}, "url":"URL#3306711" }, { "@score":"1", "@id":"3306712", "info":{"authors":{"author":[{"@pid":"195/0818","text":"Sani M. Abdullahi"},{"@pid":"52/3620-1","text":"Hongxia Wang 0001"},{"@pid":"08/6663","text":"Qing Qian"},{"@pid":"195/0809","text":"Wencheng Cao"}]},"title":"Concealing Fingerprint-Biometric Data into Audio Signals for Identify Authentication.","venue":"IWDW","pages":"129-144","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/AbdullahiWQC16","doi":"10.1007/978-3-319-53465-7_10","ee":"https://doi.org/10.1007/978-3-319-53465-7_10","url":"https://dblp.org/rec/conf/iwdw/AbdullahiWQC16"}, "url":"URL#3306712" }, { "@score":"1", "@id":"3306713", "info":{"authors":{"author":[{"@pid":"195/0804","text":"Yuan Bian"},{"@pid":"01/7832","text":"Guangming Tang"},{"@pid":"63/1591","text":"Shuo Wang"},{"@pid":"120/5505","text":"Zhanzhan Gao"},{"@pid":"141/5489","text":"Shiyuan Chen"}]},"title":"Adaptive Steganography Using 2D Gabor Filters and Ensemble Classifiers.","venue":"IWDW","pages":"506-517","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/BianTWGC16","doi":"10.1007/978-3-319-53465-7_38","ee":"https://doi.org/10.1007/978-3-319-53465-7_38","url":"https://dblp.org/rec/conf/iwdw/BianTWGC16"}, "url":"URL#3306713" }, { "@score":"1", "@id":"3306714", "info":{"authors":{"author":[{"@pid":"195/0809","text":"Wencheng Cao"},{"@pid":"52/3620-1","text":"Hongxia Wang 0001"},{"@pid":"72/4751","text":"Hong Zhao"},{"@pid":"08/6663","text":"Qing Qian"},{"@pid":"195/0818","text":"Sani M. Abdullahi"}]},"title":"Identification of Electronic Disguised Voices in the Noisy Environment.","venue":"IWDW","pages":"75-87","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/CaoWZQA16","doi":"10.1007/978-3-319-53465-7_6","ee":"https://doi.org/10.1007/978-3-319-53465-7_6","url":"https://dblp.org/rec/conf/iwdw/CaoWZQA16"}, "url":"URL#3306714" }, { "@score":"1", "@id":"3306715", "info":{"authors":{"author":[{"@pid":"c/ChinChenChang","text":"Chin-Chen Chang 0001"},{"@pid":"77/5885","text":"Jen-Chun Chang"},{"@pid":"195/0810","text":"Yun-Hong Chou"},{"@pid":"97/5686","text":"Hsin-Lung Wu"}]},"title":"A High Embedding Capacity Data Hiding Scheme Based upon Permutation Vectors.","venue":"IWDW","pages":"578-587","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/ChangCCW16","doi":"10.1007/978-3-319-53465-7_43","ee":"https://doi.org/10.1007/978-3-319-53465-7_43","url":"https://dblp.org/rec/conf/iwdw/ChangCCW16"}, "url":"URL#3306715" }, { "@score":"1", "@id":"3306716", "info":{"authors":{"author":[{"@pid":"00/6472","text":"Shuo Chen"},{"@pid":"52/2073","text":"Tanfeng Sun"},{"@pid":"29/4307","text":"Xinghao Jiang"},{"@pid":"166/7716","text":"Peisong He"},{"@pid":"29/3890","text":"Shilin Wang"},{"@pid":"s/YunQShi","text":"Yun Q. Shi 0001"}]},"title":"Detecting Double H.264 Compression Based on Analyzing Prediction Residual Distribution.","venue":"IWDW","pages":"61-74","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/ChenSJHWS16","doi":"10.1007/978-3-319-53465-7_5","ee":"https://doi.org/10.1007/978-3-319-53465-7_5","url":"https://dblp.org/rec/conf/iwdw/ChenSJHWS16"}, "url":"URL#3306716" }, { "@score":"1", "@id":"3306717", "info":{"authors":{"author":[{"@pid":"182/1623","text":"Hak-Yeol Choi"},{"@pid":"90/6449","text":"Jeongho Son"},{"@pid":"158/9425","text":"Han-Ul Jang"},{"@pid":"11/3029","text":"Heung-Kyu Lee"}]},"title":"Blind 3D Mesh Watermarking Based on Sphere-Shape Template.","venue":"IWDW","pages":"280-295","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/ChoiSJL16","doi":"10.1007/978-3-319-53465-7_21","ee":"https://doi.org/10.1007/978-3-319-53465-7_21","url":"https://dblp.org/rec/conf/iwdw/ChoiSJL16"}, "url":"URL#3306717" }, { "@score":"1", "@id":"3306718", "info":{"authors":{"author":[{"@pid":"89/2703","text":"Sabyasachi Dutta"},{"@pid":"99/10416","text":"Partha Sarathi Roy 0001"},{"@pid":"07/271","text":"Avishek Adhikari"},{"@pid":"16/3865","text":"Kouichi Sakurai"}]},"title":"On the Robustness of Visual Cryptographic Schemes.","venue":"IWDW","pages":"251-262","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/DuttaRAS16","doi":"10.1007/978-3-319-53465-7_19","ee":"https://doi.org/10.1007/978-3-319-53465-7_19","url":"https://dblp.org/rec/conf/iwdw/DuttaRAS16"}, "url":"URL#3306718" }, { "@score":"1", "@id":"3306719", "info":{"authors":{"author":[{"@pid":"195/0819","text":"Wisdarmanto Erlangga"},{"@pid":"12/5753","text":"Ari Moesriami Barmawi"}]},"title":"Increasing Secret Data Hiding Capacity in QR Code Using 3 \\times 3 3 × 3 Subcells.","venue":"IWDW","pages":"327-342","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/ErlanggaB16","doi":"10.1007/978-3-319-53465-7_24","ee":"https://doi.org/10.1007/978-3-319-53465-7_24","url":"https://dblp.org/rec/conf/iwdw/ErlanggaB16"}, "url":"URL#3306719" }, { "@score":"1", "@id":"3306720", "info":{"authors":{"author":[{"@pid":"147/9642","text":"Bingwen Feng"},{"@pid":"81/1232-1","text":"Jian Weng 0001"},{"@pid":"98/6613-1","text":"Wei Lu 0001"},{"@pid":"157/4768","text":"Bei Pei"}]},"title":"Multiple Watermarking Using Multilevel Quantization Index Modulation.","venue":"IWDW","pages":"312-326","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/FengWLP16","doi":"10.1007/978-3-319-53465-7_23","ee":"https://doi.org/10.1007/978-3-319-53465-7_23","url":"https://dblp.org/rec/conf/iwdw/FengWLP16"}, "url":"URL#3306720" }, { "@score":"1", "@id":"3306721", "info":{"authors":{"author":[{"@pid":"90/10697","text":"Javier Franco-Contreras"},{"@pid":"19/4450","text":"Gouenou Coatrieux"}]},"title":"Databases Traceability by Means of Watermarking with Optimized Detection.","venue":"IWDW","pages":"343-357","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/Franco-Contreras16","doi":"10.1007/978-3-319-53465-7_25","ee":"https://doi.org/10.1007/978-3-319-53465-7_25","url":"https://dblp.org/rec/conf/iwdw/Franco-Contreras16"}, "url":"URL#3306721" }, { "@score":"1", "@id":"3306722", "info":{"authors":{"author":[{"@pid":"94/11139","text":"Teng Guo"},{"@pid":"77/1318-1","text":"Feng Liu 0001"},{"@pid":"29/4680-8","text":"Wen Wang 0008"},{"@pid":"195/0803","text":"BingTao Yu"}]},"title":"Privacy Monitor.","venue":"IWDW","pages":"187-197","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/GuoLWY16","doi":"10.1007/978-3-319-53465-7_14","ee":"https://doi.org/10.1007/978-3-319-53465-7_14","url":"https://dblp.org/rec/conf/iwdw/GuoLWY16"}, "url":"URL#3306722" }, { "@score":"1", "@id":"3306723", "info":{"authors":{"author":[{"@pid":"69/1798","text":"Xin He"},{"@pid":"12/9135","text":"Qingxiao Guan"},{"@pid":"195/0811","text":"Yanfei Tong"},{"@pid":"76/7010","text":"Xianfeng Zhao"},{"@pid":"181/2676","text":"Haibo Yu"}]},"title":"A Novel Robust Image Forensics Algorithm Based on L1-Norm Estimation.","venue":"IWDW","pages":"145-158","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/HeGTZY16","doi":"10.1007/978-3-319-53465-7_11","ee":"https://doi.org/10.1007/978-3-319-53465-7_11","url":"https://dblp.org/rec/conf/iwdw/HeGTZY16"}, "url":"URL#3306723" }, { "@score":"1", "@id":"3306724", "info":{"authors":{"author":[{"@pid":"54/2618","text":"Donghui Hu"},{"@pid":"195/0812","text":"Zhongjin Ma"},{"@pid":"91/3295","text":"Yuqi Fan"},{"@pid":"01/1318","text":"Lina Wang"}]},"title":"A Study of the Two-Way Effects of Cover Source Mismatch and Texture Complexity in Steganalysis.","venue":"IWDW","pages":"601-615","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/HuMFW16","doi":"10.1007/978-3-319-53465-7_45","ee":"https://doi.org/10.1007/978-3-319-53465-7_45","url":"https://dblp.org/rec/conf/iwdw/HuMFW16"}, "url":"URL#3306724" }, { "@score":"1", "@id":"3306725", "info":{"authors":{"author":[{"@pid":"81/6685","text":"Wei Huang"},{"@pid":"76/7010","text":"Xianfeng Zhao"}]},"title":"Reliable Pooled Steganalysis Using Fine-Grained Parameter Estimation and Hypothesis Testing.","venue":"IWDW","pages":"550-563","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/HuangZ16","doi":"10.1007/978-3-319-53465-7_41","ee":"https://doi.org/10.1007/978-3-319-53465-7_41","url":"https://dblp.org/rec/conf/iwdw/HuangZ16"}, "url":"URL#3306725" }, { "@score":"1", "@id":"3306726", "info":{"authors":{"author":[{"@pid":"154/1536","text":"Aamo Iorliam"},{"@pid":"h/AnthonyTSHo","text":"Anthony T. S. Ho"},{"@pid":"81/7616","text":"Adrian Waller"},{"@pid":"95/6322","text":"Xi Zhao"}]},"title":"Using Benford's Law Divergence and Neural Networks for Classification and Source Identification of Biometric Images.","venue":"IWDW","pages":"88-105","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/IorliamHWZ16","doi":"10.1007/978-3-319-53465-7_7","ee":"https://doi.org/10.1007/978-3-319-53465-7_7","url":"https://dblp.org/rec/conf/iwdw/IorliamHWZ16"}, "url":"URL#3306726" }, { "@score":"1", "@id":"3306727", "info":{"authors":{"author":[{"@pid":"19/4764","text":"Chao Jin"},{"@pid":"63/1074","text":"Rangding Wang"},{"@pid":"52/8076","text":"Diqun Yan"},{"@pid":"188/7820","text":"Biaoli Tao"},{"@pid":"78/10104","text":"Yanan Chen"},{"@pid":"188/7841","text":"Anshan Pei"}]},"title":"Source Cell-Phone Identification Using Spectral Features of Device Self-noise.","venue":"IWDW","pages":"29-45","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/JinWYTCP16","doi":"10.1007/978-3-319-53465-7_3","ee":"https://doi.org/10.1007/978-3-319-53465-7_3","url":"https://dblp.org/rec/conf/iwdw/JinWYTCP16"}, "url":"URL#3306727" }, { "@score":"1", "@id":"3306728", "info":{"authors":{"author":[{"@pid":"13/6836","text":"Yan Ke"},{"@pid":"26/7487","text":"Minqing Zhang"},{"@pid":"49/1245-16","text":"Jia Liu 0016"}]},"title":"Separable Multiple Bits Reversible Data Hiding in Encrypted Domain.","venue":"IWDW","pages":"470-484","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/KeZL16","doi":"10.1007/978-3-319-53465-7_35","ee":"https://doi.org/10.1007/978-3-319-53465-7_35","url":"https://dblp.org/rec/conf/iwdw/KeZL16"}, "url":"URL#3306728" }, { "@score":"1", "@id":"3306729", "info":{"authors":{"author":[{"@pid":"04/2360","text":"Minoru Kuribayashi"},{"@pid":"67/4662","text":"Ee-Chien Chang"},{"@pid":"31/6039","text":"Nobuo Funabiki"}]},"title":"Watermarking with Fixed Decoder for Aesthetic 2D Barcode.","venue":"IWDW","pages":"379-392","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/KuribayashiCF16","doi":"10.1007/978-3-319-53465-7_28","ee":"https://doi.org/10.1007/978-3-319-53465-7_28","url":"https://dblp.org/rec/conf/iwdw/KuribayashiCF16"}, "url":"URL#3306729" }, { "@score":"1", "@id":"3306730", "info":{"authors":{"author":[{"@pid":"195/0817","text":"Wengai Liu"},{"@pid":"58/2768","text":"Rongrong Ni"},{"@pid":"45/2091-1","text":"Yao Zhao 0001"}]},"title":"Reversible 3D Image Data Hiding with Quality Enhancement.","venue":"IWDW","pages":"446-455","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/LiuNZ16","doi":"10.1007/978-3-319-53465-7_33","ee":"https://doi.org/10.1007/978-3-319-53465-7_33","url":"https://dblp.org/rec/conf/iwdw/LiuNZ16"}, "url":"URL#3306730" }, { "@score":"1", "@id":"3306731", "info":{"authors":{"author":[{"@pid":"187/5357","text":"Xuejing Niu"},{"@pid":"63/7483","text":"Zhao-Xia Yin"},{"@pid":"01/3442-1","text":"Xinpeng Zhang 0001"},{"@pid":"56/4951-1","text":"Jin Tang 0001"},{"@pid":"36/4256-1","text":"Bin Luo 0001"}]},"title":"Reversible Data Hiding in Encrypted AMBTC Compressed Images.","venue":"IWDW","pages":"436-445","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/NiuYZTL16","doi":"10.1007/978-3-319-53465-7_32","ee":"https://doi.org/10.1007/978-3-319-53465-7_32","url":"https://dblp.org/rec/conf/iwdw/NiuYZTL16"}, "url":"URL#3306731" }, { "@score":"1", "@id":"3306732", "info":{"authors":{"author":[{"@pid":"195/0821","text":"Xinxin Peng"},{"@pid":"82/6187-5","text":"Jianfeng Lu 0005"},{"@pid":"53/2189-14","text":"Li Li 0014"},{"@pid":"c/ChinChenChang","text":"Chin-Chen Chang 0001"},{"@pid":"24/3095","text":"Qili Zhou"}]},"title":"A New Card Authentication Scheme Based on Image Watermarking and Encryption.","venue":"IWDW","pages":"358-369","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/PengLLCZ16","doi":"10.1007/978-3-319-53465-7_26","ee":"https://doi.org/10.1007/978-3-319-53465-7_26","url":"https://dblp.org/rec/conf/iwdw/PengLLCZ16"}, "url":"URL#3306732" }, { "@score":"1", "@id":"3306733", "info":{"authors":{"author":[{"@pid":"08/6663","text":"Qing Qian"},{"@pid":"52/3620-1","text":"Hongxia Wang 0001"},{"@pid":"195/0818","text":"Sani M. Abdullahi"},{"@pid":"70/6155-10","text":"Huan Wang 0010"},{"@pid":"188/7866","text":"Canghong Shi"}]},"title":"Speech Authentication and Recovery Scheme in Encrypted Domain.","venue":"IWDW","pages":"46-60","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/QianWAWS16","doi":"10.1007/978-3-319-53465-7_4","ee":"https://doi.org/10.1007/978-3-319-53465-7_4","url":"https://dblp.org/rec/conf/iwdw/QianWAWS16"}, "url":"URL#3306733" }, { "@score":"1", "@id":"3306734", "info":{"authors":{"author":[{"@pid":"134/7423","text":"YaWei Ren"},{"@pid":"77/1318-1","text":"Feng Liu 0001"},{"@pid":"29/4680-8","text":"Wen Wang 0008"}]},"title":"Collusive Attacks to Partition Authentication Visual Cryptography Scheme.","venue":"IWDW","pages":"238-250","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/RenLW16","doi":"10.1007/978-3-319-53465-7_18","ee":"https://doi.org/10.1007/978-3-319-53465-7_18","url":"https://dblp.org/rec/conf/iwdw/RenLW16"}, "url":"URL#3306734" }, { "@score":"1", "@id":"3306735", "info":{"authors":{"author":[{"@pid":"173/0075","text":"Aniket Roy"},{"@pid":"05/1579","text":"Rajat Subhra Chakraborty"}]},"title":"Optimal Distortion Estimation for Prediction Error Expansion Based Reversible Watermarking.","venue":"IWDW","pages":"265-279","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/RoyC16","doi":"10.1007/978-3-319-53465-7_20","ee":"https://doi.org/10.1007/978-3-319-53465-7_20","url":"https://dblp.org/rec/conf/iwdw/RoyC16"}, "url":"URL#3306735" }, { "@score":"1", "@id":"3306736", "info":{"authors":{"author":[{"@pid":"83/3696","text":"Gang Shen"},{"@pid":"77/1318-1","text":"Feng Liu 0001"},{"@pid":"28/7666","text":"Zhengxin Fu"},{"@pid":"27/116-3","text":"Bin Yu 0003"},{"@pid":"29/4680-8","text":"Wen Wang 0008"}]},"title":"Halftone Visual Cryptography with Complementary Cover Images.","venue":"IWDW","pages":"223-237","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/ShenLFYW16","doi":"10.1007/978-3-319-53465-7_17","ee":"https://doi.org/10.1007/978-3-319-53465-7_17","url":"https://dblp.org/rec/conf/iwdw/ShenLFYW16"}, "url":"URL#3306736" }, { "@score":"1", "@id":"3306737", "info":{"authors":{"author":[{"@pid":"35/7028","text":"Xin Tang"},{"@pid":"67/5044","text":"Yining Qi"},{"@pid":"76/6824-1","text":"Yongfeng Huang 0001"}]},"title":"Fragile Watermarking Based Proofs of Retrievability for Archival Cloud Data.","venue":"IWDW","pages":"296-311","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/TangQH16","doi":"10.1007/978-3-319-53465-7_22","ee":"https://doi.org/10.1007/978-3-319-53465-7_22","url":"https://dblp.org/rec/conf/iwdw/TangQH16"}, "url":"URL#3306737" }, { "@score":"1", "@id":"3306738", "info":{"authors":{"author":[{"@pid":"32/5495","text":"Ye Tian"},{"@pid":"00/4625","text":"Shijun Xiang"}]},"title":"Detection of Video-Based Face Spoofing Using LBP and Multiscale DCT.","venue":"IWDW","pages":"16-28","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/TianX16","doi":"10.1007/978-3-319-53465-7_2","ee":"https://doi.org/10.1007/978-3-319-53465-7_2","url":"https://dblp.org/rec/conf/iwdw/TianX16"}, "url":"URL#3306738" }, { "@score":"1", "@id":"3306739", "info":{"authors":{"author":[{"@pid":"85/2972","text":"Kazutake Uehira"},{"@pid":"32/2024","text":"Masahiro Suzuki"},{"@pid":"18/8476","text":"Piyarat Silapasuphakornwong"},{"@pid":"15/4341","text":"Hideyuki Torii"},{"@pid":"43/118","text":"Youichi Takashima"}]},"title":"Copyright Protection for 3D Printing by Embedding Information Inside 3D-Printed Objects.","venue":"IWDW","pages":"370-378","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/UehiraSSTT16","doi":"10.1007/978-3-319-53465-7_27","ee":"https://doi.org/10.1007/978-3-319-53465-7_27","url":"https://dblp.org/rec/conf/iwdw/UehiraSSTT16"}, "url":"URL#3306739" }, { "@score":"1", "@id":"3306740", "info":{"authors":{"author":[{"@pid":"29/4680-8","text":"Wen Wang 0008"},{"@pid":"77/1318-1","text":"Feng Liu 0001"},{"@pid":"94/11139","text":"Teng Guo"},{"@pid":"134/7423","text":"YaWei Ren"},{"@pid":"83/3696","text":"Gang Shen"}]},"title":"Information Security Display Technology with Multi-view Effect.","venue":"IWDW","pages":"198-208","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/WangLGRS16","doi":"10.1007/978-3-319-53465-7_15","ee":"https://doi.org/10.1007/978-3-319-53465-7_15","url":"https://dblp.org/rec/conf/iwdw/WangLGRS16"}, "url":"URL#3306740" }, { "@score":"1", "@id":"3306741", "info":{"authors":{"author":[{"@pid":"168/4612","text":"Zichi Wang"},{"@pid":"54/11157","text":"Jinpeng Lv"},{"@pid":"195/0816","text":"Qingde Wei"},{"@pid":"01/3442-1","text":"Xinpeng Zhang 0001"}]},"title":"Distortion Function for Spatial Image Steganography Based on the Polarity of Embedding Change.","venue":"IWDW","pages":"487-493","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/WangLWZ16","doi":"10.1007/978-3-319-53465-7_36","ee":"https://doi.org/10.1007/978-3-319-53465-7_36","url":"https://dblp.org/rec/conf/iwdw/WangLWZ16"}, "url":"URL#3306741" }, { "@score":"1", "@id":"3306742", "info":{"authors":{"author":[{"@pid":"12/6277-6","text":"Ran Wang 0006"},{"@pid":"56/5834","text":"Xijian Ping"},{"@pid":"37/10136","text":"Shaozhang Niu"},{"@pid":"15/4777-31","text":"Tao Zhang 0031"}]},"title":"Segmentation Based Steganalysis of Spatial Images Using Local Linear Transform.","venue":"IWDW","pages":"533-549","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/WangPNZ16","doi":"10.1007/978-3-319-53465-7_40","ee":"https://doi.org/10.1007/978-3-319-53465-7_40","url":"https://dblp.org/rec/conf/iwdw/WangPNZ16"}, "url":"URL#3306742" }, { "@score":"1", "@id":"3306743", "info":{"authors":{"author":[{"@pid":"48/6351","text":"Xiaoyu Xu"},{"@pid":"69/1159","text":"Yifeng Sun"},{"@pid":"01/7832","text":"Guangming Tang"},{"@pid":"141/5489","text":"Shiyuan Chen"},{"@pid":"70/2932","text":"Jian Zhao"}]},"title":"Deep Learning on Spatial Rich Model for Steganalysis.","venue":"IWDW","pages":"564-577","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/XuSTCZ16","doi":"10.1007/978-3-319-53465-7_42","ee":"https://doi.org/10.1007/978-3-319-53465-7_42","url":"https://dblp.org/rec/conf/iwdw/XuSTCZ16"}, "url":"URL#3306743" }, { "@score":"1", "@id":"3306744", "info":{"authors":{"author":[{"@pid":"152/4337","text":"Jiajia Xu"},{"@pid":"26/3707-7","text":"Hang Zhou 0007"},{"@pid":"20/612-1","text":"Weiming Zhang 0001"},{"@pid":"195/0807","text":"Ruiqi Jiang"},{"@pid":"129/4336","text":"Guoli Ma"},{"@pid":"96/5144","text":"Nenghai Yu"}]},"title":"Second Order Perdicting-Error Sorting for Reversible Data Hiding.","venue":"IWDW","pages":"407-420","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/XuZZJMY16","doi":"10.1007/978-3-319-53465-7_30","ee":"https://doi.org/10.1007/978-3-319-53465-7_30","url":"https://dblp.org/rec/conf/iwdw/XuZZJMY16"}, "url":"URL#3306744" }, { "@score":"1", "@id":"3306745", "info":{"authors":{"author":[{"@pid":"54/7663","text":"Xuehu Yan"},{"@pid":"194/4924","text":"Yuliang Lu"},{"@pid":"12/2009","text":"Lintao Liu"},{"@pid":"194/4622","text":"Song Wan"}]},"title":"Random Grids-Based Threshold Visual Secret Sharing with Improved Visual Quality.","venue":"IWDW","pages":"209-222","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/YanLLW16","doi":"10.1007/978-3-319-53465-7_16","ee":"https://doi.org/10.1007/978-3-319-53465-7_16","url":"https://dblp.org/rec/conf/iwdw/YanLLW16"}, "url":"URL#3306745" }, { "@score":"1", "@id":"3306746", "info":{"authors":{"author":[{"@pid":"177/0904","text":"Pengpeng Yang"},{"@pid":"58/2768","text":"Rongrong Ni"},{"@pid":"45/2091-1","text":"Yao Zhao 0001"}]},"title":"Recapture Image Forensics Based on Laplacian Convolutional Neural Networks.","venue":"IWDW","pages":"119-128","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/YangNZ16","doi":"10.1007/978-3-319-53465-7_9","ee":"https://doi.org/10.1007/978-3-319-53465-7_9","url":"https://dblp.org/rec/conf/iwdw/YangNZ16"}, "url":"URL#3306746" }, { "@score":"1", "@id":"3306747", "info":{"authors":{"author":[{"@pid":"121/1222","text":"Yuanzhi Yao"},{"@pid":"20/612-1","text":"Weiming Zhang 0001"},{"@pid":"96/5144","text":"Nenghai Yu"}]},"title":"Reversible Data Hiding for Texture Videos and Depth Maps Coding with Quality Scalability.","venue":"IWDW","pages":"421-435","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/YaoZY16","doi":"10.1007/978-3-319-53465-7_31","ee":"https://doi.org/10.1007/978-3-319-53465-7_31","url":"https://dblp.org/rec/conf/iwdw/YaoZY16"}, "url":"URL#3306747" }, { "@score":"1", "@id":"3306748", "info":{"authors":{"author":[{"@pid":"83/7222","text":"Jingyu Ye"},{"@pid":"s/YunQShi","text":"Yun-Qing Shi 0001"}]},"title":"A Local Derivative Pattern Based Image Forensic Framework for Seam Carving Detection.","venue":"IWDW","pages":"172-184","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/YeS16","doi":"10.1007/978-3-319-53465-7_13","ee":"https://doi.org/10.1007/978-3-319-53465-7_13","url":"https://dblp.org/rec/conf/iwdw/YeS16"}, "url":"URL#3306748" }, { "@score":"1", "@id":"3306749", "info":{"authors":{"author":[{"@pid":"195/0806","text":"Jiaxin Yin"},{"@pid":"06/2293-32","text":"Rui Wang 0032"},{"@pid":"78/8545","text":"Yuanfang Guo"},{"@pid":"77/1318-1","text":"Feng Liu 0001"}]},"title":"An Adaptive Reversible Data Hiding Scheme for JPEG Images.","venue":"IWDW","pages":"456-469","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/YinWGL16","doi":"10.1007/978-3-319-53465-7_34","ee":"https://doi.org/10.1007/978-3-319-53465-7_34","url":"https://dblp.org/rec/conf/iwdw/YinWGL16"}, "url":"URL#3306749" }, { "@score":"1", "@id":"3306750", "info":{"authors":{"author":[{"@pid":"06/5358","text":"Jingjing Yu"},{"@pid":"195/0808","text":"Yifeng Zhan"},{"@pid":"14/6978","text":"Jianhua Yang"},{"@pid":"75/2824","text":"Xiangui Kang"}]},"title":"A Multi-purpose Image Counter-anti-forensic Method Using Convolutional Neural Networks.","venue":"IWDW","pages":"3-15","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/YuZYK16","doi":"10.1007/978-3-319-53465-7_1","ee":"https://doi.org/10.1007/978-3-319-53465-7_1","url":"https://dblp.org/rec/conf/iwdw/YuZYK16"}, "url":"URL#3306750" }, { "@score":"1", "@id":"3306751", "info":{"authors":{"author":[{"@pid":"24/6914-5","text":"Hong Zhang 0005"},{"@pid":"40/2407","text":"Yun Cao"},{"@pid":"76/7010","text":"Xianfeng Zhao"},{"@pid":"181/2676","text":"Haibo Yu"},{"@pid":"47/10194","text":"Changjun Liu"}]},"title":"Data Hiding in H.264/AVC Video Files Using the Coded Block Pattern.","venue":"IWDW","pages":"588-600","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/ZhangCZYL16","doi":"10.1007/978-3-319-53465-7_44","ee":"https://doi.org/10.1007/978-3-319-53465-7_44","url":"https://dblp.org/rec/conf/iwdw/ZhangCZYL16"}, "url":"URL#3306751" }, { "@score":"1", "@id":"3306752", "info":{"authors":{"author":[{"@pid":"195/0805","text":"Le-Bing Zhang"},{"@pid":"34/5165","text":"Fei Peng"},{"@pid":"91/3584","text":"Min Long"}]},"title":"Source Camera Identification Based on Guided Image Estimation and Block Weighted Average.","venue":"IWDW","pages":"106-118","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/ZhangPL16","doi":"10.1007/978-3-319-53465-7_8","ee":"https://doi.org/10.1007/978-3-319-53465-7_8","url":"https://dblp.org/rec/conf/iwdw/ZhangPL16"}, "url":"URL#3306752" }, { "@score":"1", "@id":"3306753", "info":{"authors":{"author":[{"@pid":"06/4036","text":"Weiwei Zhang"},{"@pid":"195/0813","text":"Zhenghong Yang"},{"@pid":"37/10136","text":"Shaozhang Niu"},{"@pid":"158/8189","text":"Junbin Wang"}]},"title":"Detection of Copy-Move Forgery in Flat Region Based on Feature Enhancement.","venue":"IWDW","pages":"159-171","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/ZhangYNW16","doi":"10.1007/978-3-319-53465-7_12","ee":"https://doi.org/10.1007/978-3-319-53465-7_12","url":"https://dblp.org/rec/conf/iwdw/ZhangYNW16"}, "url":"URL#3306753" }, { "@score":"1", "@id":"3306754", "info":{"authors":{"author":[{"@pid":"35/10185-3","text":"Lingyu Zhang 0003"},{"@pid":"76/7010","text":"Xianfeng Zhao"}]},"title":"An Adaptive Video Steganography Based on Intra-prediction Mode and Cost Assignment.","venue":"IWDW","pages":"518-532","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/ZhangZ16","doi":"10.1007/978-3-319-53465-7_39","ee":"https://doi.org/10.1007/978-3-319-53465-7_39","url":"https://dblp.org/rec/conf/iwdw/ZhangZ16"}, "url":"URL#3306754" }, { "@score":"1", "@id":"3306755", "info":{"authors":{"author":[{"@pid":"183/0668","text":"Zengzhen Zhao"},{"@pid":"12/9135","text":"Qingxiao Guan"},{"@pid":"76/7010","text":"Xianfeng Zhao"},{"@pid":"181/2676","text":"Haibo Yu"},{"@pid":"47/10194","text":"Changjun Liu"}]},"title":"Embedding Strategy for Batch Adaptive Steganography.","venue":"IWDW","pages":"494-505","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iwdw/ZhaoGZYL16","doi":"10.1007/978-3-319-53465-7_37","ee":"https://doi.org/10.1007/978-3-319-53465-7_37","url":"https://dblp.org/rec/conf/iwdw/ZhaoGZYL16"}, "url":"URL#3306755" } ] } } } )