By Jessica Fridrich (auth.), Yun Qing Shi, Hyoung-Joong Kim, Fernando Perez-Gonzalez (eds.)

This e-book constitutes the completely refereed post-conference complaints of the tenth overseas Workshop on Digital-forensics and Watermarking (IWDW 2011) held in Atlantic urban, NJ, united states, in the course of October 23-26, 2011. The 37 revised complete papers provided have been conscientiously chosen from fifty nine submissions. convention papers are geared up in 6 technical periods, overlaying the subjects of steganography and steganalysis, watermarking, visible cryptography, forensics, anti-forensics, fingerprinting, privateness and security.

Show description

Read or Download Digital Forensics and Watermarking: 10th International Workshop, IWDW 2011, Atlantic City, NY, October 23-26, 2011, Revised Selected Papers PDF

Best international books

The Routledge International Handbook of Globalization Studies (Routledge International Handbooks)

The Routledge International Handbook of Globalization experiences bargains scholars transparent and educated chapters at the background of globalization and key theories that experience thought of the reasons and outcomes of the globalization procedure. There are great sections demographic, fiscal, technological, social and cultural adjustments in globalization.

The Chern Symposium 1979: Proceedings of the International Symposium on Differential Geometry in honor of S.-S. Chern, held in Berkeley, California, June 1979

This quantity attests to the power of differential geometry because it probes deeper into its inner constitution and explores ever widening connections with different topics in arithmetic and physics. To so much folks Professor S. S. Chern is sleek differential geometry, and we, his scholars, are thankful to him for prime us to this fertile panorama.

Partially Supervised Learning: Second IAPR International Workshop, PSL 2013, Nanjing, China, May 13-14, 2013, Revised Selected Papers

This e-book constitutes the completely refereed revised chosen papers from the second one IAPR overseas Workshop, PSL 2013, held in Nanjing, China, in may well 2013. the ten papers integrated during this quantity have been rigorously reviewed and chosen from 26 submissions. in part supervised studying is a speedily evolving sector of computing device studying.

Extra resources for Digital Forensics and Watermarking: 10th International Workshop, IWDW 2011, Atlantic City, NY, October 23-26, 2011, Revised Selected Papers

Sample text

And Tai et al. [18] designed a synchronization mechanism by selecting fixed pairs of peak and zero points, which were not guaranteed to be the optimal ones. Therefore, the performance of the scheme was somewhat scarified. In this paper, we propose a two-step embedding (TSE) technique to improve the HS based schemes, which not only meets the blind requirement but also guarantees the flexible selection of optimal pairs of peak and zero points for high performance reversible data hiding. Moreover, TSE is also utilized for location map reduction to further increase the embedding capacity.

The number inside the block means the order of impact. ‘1’ blocks are impact by ‘W’ blocks and spread distortion to ‘2’ blocks. For the right of Fig. 3, ‘C’ blocks are the blocks being compensated so that no further impact happens on the adjacent blocks. Fig. 3. Distortion drift and drift compensation For more general circumstance, drift compensation are performed as follow: Step 1: Store information (MB number and amount of modification) of previous MB if it has MVD changed because of watermark embedding; Step 2: If the reference block of current MB has been watermarked according to the information recorded in Step 1, then: i.

For HS based reversible data hiding, 1 bit secret message is embedded when a peak point is encountered. Therefore the capacity is computed by capacity = h(P) (2) where h(•) denotes the frequency of bin P in the histogram. It is noted that since only the pixels with values between P and Z would generate distortion by one during embedding, the distortion caused by the embedding process is evaluate by ⎛ ⎞ 1 ⎝ h(i) × (Δi)2 + (Δj)2 ⎠ M SE = size i∈U(P,Z) , (Δi = 1, Δj = 1) ⎛ 1 ⎝ h(i) + = size i∈U(P,Z) (j=P ),(b= 1 ) ⎞ (3) (1)2 ⎠ (j=P ),(b= 1 ) where MSE is the Mean Square Error between the stego and cover image, size and b denote the size of cover image and secret bit, respectively.

Download PDF sample

Rated 4.68 of 5 – based on 31 votes