![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessRecognition of printed small texture modules based on dictionary learning
Quick Response (QR) codes are designed for information storage and high-speed reading applications. To store additional information, Two-Level QR (2LQR) codes replace black modules in standard QR codes with sp...
-
Article
A multi-purpose image forensic method using densely connected convolutional neural networks
Multi-purpose forensics is attracting increasing attention worldwide. In this paper, we propose a multi-purpose method based on densely connected convolutional neural networks (CNNs) for simultaneous detection...
-
Chapter and Conference Paper
Optimal Histogram-Pair and Prediction-Error Based Reversible Data Hiding for Medical Images
In recent years, with the development of application research on medical images and medical documents, it is urgent to embed data, such as patient’s personal information, diagnostic information and verificatio...
-
Book
-
Book
-
Chapter and Conference Paper
Non-uniform Quantization in Breaking HUGO
In breaking HUGO (Highly Undetectable Stegonagraphy), an advanced steganographic scheme recently developed for uncompressed images, the research on steganalysis has made rapid progress recently. That is, more ...
-
Book and Conference Proceedings
The International Workshop on Digital Forensics and Watermarking 2012
11th International Workshop, IWDW 2012, Shanghai, China, October 31 – November 3, 2012, Revised Selected Papers
-
Chapter and Conference Paper
Erratum to: The International Workshop on Digital Forensics and Watermarking 2012
In the original version, the booktitle is wrong. The correct title is given below:
-
Chapter and Conference Paper
Textural Features for Steganalysis
It is observed that the co-occurrence matrix, one kind of textural features proposed by Haralick et al., has played a very critical role in steganalysis. On the other hand, the data hidden in the image texture...
-
Chapter and Conference Paper
A Novel Map** Scheme for Steganalysis
Recently the research on steganalysis for breaking HUGO has been further moved ahead. A novel map** scheme is reported in this paper. Through a Huffman coding like procedure, this scheme can lower the featur...
-
Article
Open AccessDetection of tampered region for JPEG images by using mode-based first digit features
With the widespread availability of image editing software, digital images have been becoming easy to manipulate and edit even for non-professional users. For a tampered Joint Photographic Experts Group (JPEG)...
-
Book and Conference Proceedings
Transactions on Data Hiding and Multimedia Security VIII
Special Issue on Pattern Recognition for IT Security
-
Book and Conference Proceedings
-
Chapter and Conference Paper
A Drift Compensation Algorithm for H.264/AVC Video Robust Watermarking Scheme
A novel drift compensation algorithm for robust H.264/AVC video watermarking scheme is proposed. The drift compensation algorithm is implemented to reduce the visual distortion, which includes the reduction of...
-
Chapter and Conference Paper
Anti-Forensics of Double JPEG Compression Detection
In this paper, a simple yet effective anti-forensic scheme capable of misleading double JPEG compression detection techniques is proposed. Based on image resizing with bilinear interpolation, the proposed oper...
-
Chapter and Conference Paper
Steganography in Streaming Multimedia over Networks
This paper presents steganography methods to covertly transmit data via RTP (Real-time Transport Protocol) header and RTP payload in multimedia streaming over networks. The proposed covert channels do not chan...
-
Book and Conference Proceedings
-
Chapter and Conference Paper
Passive Detection of Paint-Doctored JPEG Images
Image painting is an image doctoring method to remove particular objects. In this paper, a novel passive detection method for paint-doctored JPEG images is proposed when the doctored image is saved in an uncom...
-
Chapter and Conference Paper
Markovian Rake Transform for Digital Image Tampering Detection
An effective framework for passive-blind color image tampering detection is presented in this paper. The proposed image statistical features are generated by applying Markovian rake transform to image luminanc...
-
Book