Skip to main content
  • Conference proceedings
  • © 2017

Digital Forensics and Watermarking

16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10431)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): IWDW: International Workshop on Digital Watermarking

Conference proceedings info: IWDW 2017.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (30 papers)

  1. Front Matter

    Pages I-XI
  2. Forensics

    1. Front Matter

      Pages 1-1
    2. HEVC Double Compression Detection Based on SN-PUPM Feature

      • Qianyi Xu, Tanfeng Sun, Xinghao Jiang, Yi Dong
      Pages 3-17
    3. Towards Automated Forensic Pen Ink Verification by Spectral Analysis

      • Michael Kalbitz, Tobias Scheidat, Benjamin Yüksel, Claus Vielhauer
      Pages 18-30
    4. Recaptured Image Forensics Based on Quality Aware and Histogram Feature

      • Pengpeng Yang, Ruihan Li, Rongrong Ni, Yao Zhao
      Pages 31-41
    5. Website Fingerprinting Attack on Psiphon and Its Forensic Analysis

      • Tekachew Gobena Ejeta, Hyoung Joong Kim
      Pages 42-51
    6. Deep Learning Based Counter–Forensic Image Classification for Camera Model Identification

      • Venkata Udaya Sameer, Ruchira Naskar, Nikhita Musthyala, Kalyan Kokkalla
      Pages 52-64
    7. Block-Based Convolutional Neural Network for Image Forgery Detection

      • Jianghong Zhou, Jiangqun Ni, Yuan Rao
      Pages 65-76
    8. A Hybrid Feature Model for Seam Carving Detection

      • Jingyu Ye, Yun-Qing Shi
      Pages 77-89
  3. Biometric Image Tampering Detection

    1. Front Matter

      Pages 91-91
    2. Detection of Face Morphing Attacks by Deep Learning

      • Clemens Seibold, Wojciech Samek, Anna Hilsmann, Peter Eisert
      Pages 107-120
    3. CNNs Under Attack: On the Vulnerability of Deep Neural Networks Based Face Recognition to Image Morphing

      • Lukasz Wandzik, Raul Vicente Garcia, Gerald Kaeding, Xi Chen
      Pages 121-135
    4. Topological Data Analysis for Image Tampering Detection

      • Aras Asaad, Sabah Jassim
      Pages 136-146
  4. Steganography and Steganalysis

    1. Front Matter

      Pages 147-147
    2. Coding Efficiency Preserving Steganography Based on HEVC Steganographic Channel Model

      • Yi Dong, Xinghao Jiang, Tanfeng Sun, Dawen Xu
      Pages 149-162
    3. Information Hiding Using CAVLC: Misconceptions and a Detection Strategy

      • Weike You, Yun Cao, Xianfeng Zhao
      Pages 187-201
    4. Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution

      • Kun Yang, Xiaowei Yi, Xianfeng Zhao, Linna Zhou
      Pages 202-216

Other Volumes

  1. Digital Forensics and Watermarking

About this book

This book constitutes the refereed proceedings of the 16th International Workshop on Digital Forensics and Watermarking, IWDW 2017, held in Magdeburg, Germany,in August 2017.
The 30 papers presented in this volume were carefully reviewed and selected from 48 submissions. The contributions are covering the state-of-the-art theoretical and practical developments in the fields of digital watermarking, steganography and steganalysis,forensics and anti-forensics, visual cryptography, and other multimedia-related security issues. Also included are the papers on two special sessions on biometric image tampering detection and on emerging threats of criminal use of informationhiding : usage  scenarios and detection approaches.

Editors and Affiliations

  • Department of Computer Science, Otto-von-Guericke University Magdeburg, Magdeburg, Germany

    Christian Kraetzer, Jana Dittmann

  • Department of Electrical and Computer Engineering, New Jersey Institute of Technology, Newark, USA

    Yun-Qing Shi

  • Graduate School Information Security, Korea University, Seoul, Korea (Republic of)

    Hyoung Joong Kim

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access