Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/iwdw/iwdw2018.bht:"
@proceedings{DBLP:conf/iwdw/2018, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-11389-6}, doi = {10.1007/978-3-030-11389-6}, isbn = {978-3-030-11388-9}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/BellafqiraCGC18, author = {Reda Bellafqira and Gouenou Coatrieux and Emmanuelle G{\'{e}}nin and Michel Cozic}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {Secure Multilayer Perceptron Based on Homomorphic Encryption}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {322--336}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_24}, doi = {10.1007/978-3-030-11389-6\_24}, timestamp = {Thu, 28 May 2020 12:51:40 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/BellafqiraCGC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/Cardamoned18, author = {Nicol{\`{o}} Cardamone and Fabrizio d'Amore}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {{DWT} and {QR} Code Based Watermarking for Document {DRM}}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {137--150}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_11}, doi = {10.1007/978-3-030-11389-6\_11}, timestamp = {Thu, 31 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwdw/Cardamoned18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/ChenYCHQ18, author = {Fan Chen and Yuan Yuan and Yuyu Chen and Hongjie He and Lingfeng Qu}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {Reversible Data Hiding Scheme in Encrypted-Image Based on Prediction and Compression Coding}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {216--229}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_17}, doi = {10.1007/978-3-030-11389-6\_17}, timestamp = {Wed, 03 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwdw/ChenYCHQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/DongSJ18, author = {Yi Dong and Tanfeng Sun and Xinghao Jiang}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {A High Capacity {HEVC} Steganographic Algorithm Using Intra Prediction Modes in Multi-sized Prediction Blocks}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {233--247}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_18}, doi = {10.1007/978-3-030-11389-6\_18}, timestamp = {Thu, 31 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwdw/DongSJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/FadlHL18, author = {Sondos M. Fadl and Qi Han and Qiong Li}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {Surveillance Video Authentication Using Universal Image Quality Index of Temporal Average}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {337--350}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_25}, doi = {10.1007/978-3-030-11389-6\_25}, timestamp = {Fri, 31 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwdw/FadlHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/GongYZ18, author = {Chen Gong and Xiaowei Yi and Xianfeng Zhao}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {Pitch Delay Based Adaptive Steganography for {AMR} Speech Stream}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {275--289}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_21}, doi = {10.1007/978-3-030-11389-6\_21}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/GongYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/HuangTLH18, author = {Yuankun Huang and Shunquan Tan and Bin Li and Jiwu Huang}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {{VPCID} - {A} VoIP Phone Call Identification Database}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {307--321}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_23}, doi = {10.1007/978-3-030-11389-6\_23}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/HuangTLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/KangJL18, author = {Jihyeon Kang and Sang{-}Keun Ji and Heung{-}Kyu Lee}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {Spherical Panorama Image Watermarking Using Viewpoint Detection}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {95--109}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_8}, doi = {10.1007/978-3-030-11389-6\_8}, timestamp = {Wed, 20 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/KangJL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/KimCKN18, author = {Hakil Kim and Xuenan Cui and Man{-}Gyu Kim and Thi Hai Binh Nguyen}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {Reconstruction of Fingerprints from Minutiae Using Conditional Adversarial Networks}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {353--362}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_26}, doi = {10.1007/978-3-030-11389-6\_26}, timestamp = {Thu, 31 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwdw/KimCKN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/MaWLS18, author = {Bin Ma and Xiaoyu Wang and Bing Li and Yun{-}Qing Shi}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {A Multiple Linear Regression Based High-Accuracy Error Prediction Algorithm for Reversible Data Hiding}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {195--205}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_15}, doi = {10.1007/978-3-030-11389-6\_15}, timestamp = {Fri, 15 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwdw/MaWLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/MareenPWL18, author = {Hannes Mareen and Johan De Praeter and Glenn Van Wallendael and Peter Lambert}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {Traitor Tracing After Visible Watermark Removal}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {110--123}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_9}, doi = {10.1007/978-3-030-11389-6\_9}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/MareenPWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/Nishimura18, author = {Akira Nishimura}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {A Novel Steganalysis of Steghide Focused on High-Frequency Region of Audio Waveform}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {69--82}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_6}, doi = {10.1007/978-3-030-11389-6\_6}, timestamp = {Thu, 31 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwdw/Nishimura18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/NiyitegekaCBGF18, author = {David Niyitegeka and Gouenou Coatrieux and Reda Bellafqira and Emmanuelle G{\'{e}}nin and Javier Franco{-}Contreras}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {Dynamic Watermarking-Based Integrity Protection of Homomorphically Encrypted Databases - Application to Outsourced Genetic Data}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {151--166}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_12}, doi = {10.1007/978-3-030-11389-6\_12}, timestamp = {Thu, 31 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwdw/NiyitegekaCBGF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/OuLLS18, author = {Bo Ou and Xiaolong Li and Wei Li and Yun{-}Qing Shi}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {Pixel-Value-Ordering Based Reversible Data Hiding with Adaptive Texture Classification and Modification}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {169--179}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_13}, doi = {10.1007/978-3-030-11389-6\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/OuLLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/ParkJMY18, author = {Hyoungwoo Park and Minjeong Ju and Sangkeun Moon and Chang D. Yoo}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {Unsupervised Domain Adaptation for Object Detection Using Distribution Matching in Various Feature Level}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {363--372}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_27}, doi = {10.1007/978-3-030-11389-6\_27}, timestamp = {Thu, 31 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwdw/ParkJMY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/PengY18, author = {Yinyin Peng and Zhao{-}Xia Yin}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {A Strategy of Distinguishing Texture Feature for Reversible Data Hiding Based on Histogram Shifting}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {206--215}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_16}, doi = {10.1007/978-3-030-11389-6\_16}, timestamp = {Thu, 31 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwdw/PengY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/SongZL18, author = {Chang Song and Yifeng Zhang and Guojun Lu}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {Reversible Data Hiding in Encrypted Images Based on Image Partition and Spatial Correlation}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {180--194}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_14}, doi = {10.1007/978-3-030-11389-6\_14}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwdw/SongZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/TaburetFBS18, author = {Th{\'{e}}o Taburet and Louis Filstroff and Patrick Bas and Wadih Sawaya}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {An Empirical Study of Steganography and Steganalysis of Color Images in the {JPEG} Domain}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {290--303}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_22}, doi = {10.1007/978-3-030-11389-6\_22}, timestamp = {Thu, 31 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwdw/TaburetFBS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/UsamaC18, author = {Muhammad Usama and Dong Eui Chang}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {Towards Robust Neural Networks with Lipschitz Continuity}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {373--389}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_28}, doi = {10.1007/978-3-030-11389-6\_28}, timestamp = {Thu, 31 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwdw/UsamaC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/XueMLWZN18, author = {Yiming Xue and Kai Mu and Yan Li and Juan Wen and Ping Zhong and Shaozhang Niu}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {Improved High Capacity Spread Spectrum-Based Audio Watermarking by Hadamard Matrices}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {124--136}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_10}, doi = {10.1007/978-3-030-11389-6\_10}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwdw/XueMLWZN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/YangCZY18, author = {Kuan Yang and Kejiang Chen and Weiming Zhang and Nenghai Yu}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {Provably Secure Generative Steganography Based on Autoregressive Model}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {55--68}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_5}, doi = {10.1007/978-3-030-11389-6\_5}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/YangCZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/YeSXS18, author = {Jingyu Ye and Yuxi Shi and Guanshuo Xu and Yun{-}Qing Shi}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {A Convolutional Neural Network Based Seam Carving Detection Scheme for Uncompressed Digital Images}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {3--13}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_1}, doi = {10.1007/978-3-030-11389-6\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/YeSXS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/YuCZWY18, author = {Xinzhi Yu and Kejiang Chen and Weiming Zhang and Yaofei Wang and Nenghai Yu}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {Improving the Embedding Strategy for Batch Adaptive Steganography}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {248--260}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_19}, doi = {10.1007/978-3-030-11389-6\_19}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/YuCZWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/Zhang0ZY18, author = {Shiyang Zhang and Hong Zhang and Xianfeng Zhao and Haibo Yu}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {A Deep Residual Multi-scale Convolutional Network for Spatial Steganalysis}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {40--52}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_4}, doi = {10.1007/978-3-030-11389-6\_4}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/Zhang0ZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/ZhangZL18, author = {Qian Zhang and Xianfeng Zhao and Changjun Liu}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {Convolutional Neural Network for Larger {JPEG} Images Steganalysis}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {14--28}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_2}, doi = {10.1007/978-3-030-11389-6\_2}, timestamp = {Wed, 21 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwdw/ZhangZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/ZhaoYNZL18, author = {Wei Zhao and Pengpeng Yang and Rongrong Ni and Yao Zhao and Wenjie Li}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {Cycle GAN-Based Attack on Recaptured Images to Fool both Human and Machine}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {83--92}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_7}, doi = {10.1007/978-3-030-11389-6\_7}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/ZhaoYNZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/ZhengLRKS18, author = {Huilin Zheng and Xuan Li and Danyang Ruan and Xiangui Kang and Yun{-}Qing Shi}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {Comparison of {DCT} and Gabor Filters in Residual Extraction of {CNN} Based {JPEG} Steganalysis}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {29--39}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_3}, doi = {10.1007/978-3-030-11389-6\_3}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/ZhengLRKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/ZhouTTL18, author = {Shijun Zhou and Weixuan Tang and Shunquan Tan and Bin Li}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {Content-Adaptive Steganalysis via Augmented Utilization of Selection-Channel Information}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {261--274}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_20}, doi = {10.1007/978-3-030-11389-6\_20}, timestamp = {Thu, 06 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/ZhouTTL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.