1 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
2 author = {Shelby Pereira and
3 Sviatoslav Voloshynovskiy and
5 St{\'e}phane Marchand-Maillet and
7 title = {Second Generation Benchmarking and Application Oriented
9 booktitle = {Information Hiding},
12 ee = {http://dx.doi.org/10.1007/3-540-45496-9_25},
13 crossref = {DBLP:conf/ih/2001},
14 bibsource = {DBLP, http://dblp.uni-trier.de}
16 @proceedings{DBLP:conf/ih/2001,
17 editor = {Ira S. Moskowitz},
18 title = {Information Hiding, 4th International Workshop, IHW 2001,
19 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
20 booktitle = {Information Hiding},
21 publisher = {Springer},
22 series = {Lecture Notes in Computer Science},
25 isbn = {3-540-42733-3},
26 bibsource = {DBLP, http://dblp.uni-trier.de}
28 @article{Hu:2007:HPE:1282866.1282944,
29 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
30 title = {A high performance edge detector based on fuzzy inference rules},
31 journal = {Inf. Sci.},
32 issue_date = {November, 2007},
40 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
41 doi = {10.1016/j.ins.2007.04.001},
43 publisher = {Elsevier Science Inc.},
44 address = {New York, NY, USA},
45 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
47 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
48 author = {Dumitrescu, Sorina and Wu, Xiaolin},
49 title = {LSB steganalysis based on high-order statistics},
50 booktitle = {Proceedings of the 7th workshop on Multimedia and security},
53 isbn = {1-59593-032-9},
54 location = {New York, NY, USA},
57 url = {http://doi.acm.org/10.1145/1073170.1073176},
58 doi = {10.1145/1073170.1073176},
61 address = {New York, NY, USA},
62 keywords = {LSB steganography, digital media, steganalysis},
65 @inproceedings{DBLP:conf/ih/Ker05,
66 author = {Andrew D. Ker},
67 title = {A General Framework for Structural Steganalysis of LSB Replacement},
68 booktitle = {Information Hiding},
71 ee = {http://dx.doi.org/10.1007/11558859_22},
72 crossref = {DBLP:conf/ih/2005},
73 bibsource = {DBLP, http://dblp.uni-trier.de}
75 @proceedings{DBLP:conf/ih/2005,
76 editor = {Mauro Barni and
77 Jordi Herrera-Joancomart\'{\i} and
78 Stefan Katzenbeisser and
79 Fernando P{\'e}rez-Gonz{\'a}lez},
80 title = {Information Hiding, 7th International Workshop, IH 2005,
81 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
82 booktitle = {Information Hiding},
83 publisher = {Springer},
84 series = {Lecture Notes in Computer Science},
87 isbn = {3-540-29039-7},
88 bibsource = {DBLP, http://dblp.uni-trier.de}
92 author = {Jessica J. Fridrich and
94 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
95 booktitle = {14th Information Hiding Conference},
98 publisher = {Springer},
99 address = {Berkeley, CA},
103 @article{DBLP:journals/tsp/DumitrescuWW03,
104 added-at = {2012-02-06T00:00:00.000+0100},
105 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
106 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
107 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
108 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
109 intrahash = {556caad9b61980d3458885153a52321c},
110 journal = {IEEE Transactions on Signal Processing},
114 timestamp = {2012-02-06T00:00:00.000+0100},
115 title = {Detection of LSB steganography via sample pair analysis.},
116 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
121 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
122 added-at = {2007-10-26T00:00:00.000+0200},
123 author = {Fridrich, Jessica J. and Goljan, Miroslav and Du, Rui},
124 biburl = {http://www.bibsonomy.org/bibtex/21c12d6fb5f949f98fabe4ee75cab4f8b/dblp},
126 crossref = {DBLP:conf/mmsec/2001},
128 description = {dblp},
129 editor = {Georganas, Nicolas D. and Popescu-Zeletin, Radu},
130 ee = {http://doi.acm.org/10.1145/1232454.1232466},
131 interhash = {de49b3b9958119616eee66f14060f47f},
132 intrahash = {1c12d6fb5f949f98fabe4ee75cab4f8b},
133 isbn = {1-58113-393-6},
137 timestamp = {2007-10-26T00:00:00.000+0200},
138 title = {Reliable detection of LSB steganography in color and grayscale images.},
139 url = {http://dblp.uni-trier.de/db/conf/mmsec/mmsec2001.html#FridrichGD01},
144 @proceedings{DBLP:conf/mmsec/2001,
145 editor = {Nicolas D. Georganas and
146 Radu Popescu-Zeletin},
147 title = {Proceedings of the 4th workshop on Multimedia {\&} Security:
148 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
150 booktitle = {MM{\&}Sec},
153 isbn = {1-58113-393-6},
154 bibsource = {DBLP, http://dblp.uni-trier.de}
157 @inproceedings{DBLP:conf/ih/PevnyFB10,
158 added-at = {2010-10-08T00:00:00.000+0200},
159 author = {Pevný, Tomás and Filler, Tomás and Bas, Patrick},
160 biburl = {http://www.bibsonomy.org/bibtex/28d83b7eac2c22ed5e7e072fd43a34248/dblp},
161 booktitle = {Information Hiding},
162 crossref = {DBLP:conf/ih/2010},
163 editor = {Böhme, Rainer and Fong, Philip W. L. and Safavi-Naini, Reihaneh},
164 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
165 interhash = {b30869c1bb39a2c15b33e05e5139e58b},
166 intrahash = {8d83b7eac2c22ed5e7e072fd43a34248},
167 isbn = {978-3-642-16434-7},
170 publisher = {Springer},
171 series = {Lecture Notes in Computer Science},
172 timestamp = {2010-10-08T00:00:00.000+0200},
173 title = {Using High-Dimensional Image Models to Perform Highly Undetectable Steganography.},
174 url = {http://dblp.uni-trier.de/db/conf/ih/ih2010.html#PevnyFB10},
179 @proceedings{DBLP:conf/ih/2010,
180 editor = {Rainer B{\"o}hme and
181 Philip W. L. Fong and
182 Reihaneh Safavi-Naini},
183 title = {Information Hiding - 12th International Conference, IH 2010,
184 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
186 booktitle = {Information Hiding},
187 publisher = {Springer},
188 series = {Lecture Notes in Computer Science},
191 isbn = {978-3-642-16434-7},
192 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
193 bibsource = {DBLP, http://dblp.uni-trier.de}
197 @article{DBLP:journals/eswa/ChenCL10,
198 added-at = {2010-07-21T15:44:10.000+0200},
199 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
200 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
202 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
203 interhash = {bc34a5f04661fee24ee62c39e76361be},
204 intrahash = {28889a4ab329da28559f0910469f054b},
205 journal = {Expert Syst. Appl.},
209 timestamp = {2010-07-21T15:44:10.000+0200},
210 title = {High payload steganography mechanism using hybrid edge detector.},
211 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
216 @article{DBLP:journals/tifs/FillerJF11,
217 added-at = {2011-09-29T00:00:00.000+0200},
218 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
219 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
220 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
221 interhash = {b27d23ed0c9936d568e16c51378abccd},
222 intrahash = {50e43c05a74eec17524b3df8db442da5},
223 journal = {IEEE Transactions on Information Forensics and Security},
227 timestamp = {2011-09-29T00:00:00.000+0200},
228 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
229 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
236 @inproceedings{DBLP:conf/ih/Westfeld01,
237 added-at = {2011-06-28T00:00:00.000+0200},
238 author = {Westfeld, Andreas},
239 biburl = {http://www.bibsonomy.org/bibtex/2fea2c6aabf7eba19ceaec93f913e5d8d/dblp},
240 booktitle = {Information Hiding},
241 crossref = {DBLP:conf/ih/2001},
242 editor = {Moskowitz, Ira S.},
243 ee = {http://dx.doi.org/10.1007/3-540-45496-9_21},
244 interhash = {e7eaa917e995dc9373f10304d3e79255},
245 intrahash = {fea2c6aabf7eba19ceaec93f913e5d8d},
246 isbn = {3-540-42733-3},
249 publisher = {Springer},
250 series = {Lecture Notes in Computer Science},
251 timestamp = {2011-06-28T00:00:00.000+0200},
252 title = {F5-A Steganographic Algorithm.},
253 url = {http://dblp.uni-trier.de/db/conf/ih/ihw2001.html#Westfeld01},
259 @inproceedings{DBLP:conf/ih/KimDR06,
260 added-at = {2007-09-20T00:00:00.000+0200},
261 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
262 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
263 booktitle = {Information Hiding},
264 crossref = {DBLP:conf/ih/2006},
266 description = {dblp},
267 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
268 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
269 interhash = {399aab122b39cfd6f6e951a1b276c786},
270 intrahash = {f0324f70d62d9dfba568e393920aaa16},
271 isbn = {978-3-540-74123-7},
274 publisher = {Springer},
275 series = {Lecture Notes in Computer Science},
276 timestamp = {2007-09-20T00:00:00.000+0200},
277 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
278 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
284 @proceedings{DBLP:conf/ih/2006,
285 editor = {Jan Camenisch and
286 Christian S. Collberg and
289 title = {Information Hiding, 8th International Workshop, IH 2006,
290 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
291 booktitle = {Information Hiding},
292 publisher = {Springer},
293 series = {Lecture Notes in Computer Science},
296 isbn = {978-3-540-74123-7},
297 bibsource = {DBLP, http://dblp.uni-trier.de}
300 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
301 added-at = {2007-10-26T00:00:00.000+0200},
302 author = {Fridrich, Jessica J. and Pevný, Tomás and Kodovský, Jan},
303 biburl = {http://www.bibsonomy.org/bibtex/26123ac512b5e1fe72a44e73d101d8b95/dblp},
305 crossref = {DBLP:conf/mmsec/2007},
307 description = {dblp},
308 editor = {Kundur, Deepa and Prabhakaran, Balakrishnan and Dittmann, Jana and Fridrich, Jessica J.},
309 ee = {http://doi.acm.org/10.1145/1288869.1288872},
310 interhash = {35c4a20b41b7861bcb09c9ff335ac601},
311 intrahash = {6123ac512b5e1fe72a44e73d101d8b95},
312 isbn = {978-1-59593-857-2},
316 timestamp = {2007-10-26T00:00:00.000+0200},
317 title = {Statistically undetectable jpeg steganography: dead ends challenges, and opportunities.},
318 url = {http://dblp.uni-trier.de/db/conf/mmsec/mmsec2007.html#FridrichPK07},
322 @proceedings{DBLP:conf/mmsec/2007,
323 editor = {Deepa Kundur and
324 Balakrishnan Prabhakaran and
326 Jessica J. Fridrich},
327 title = {Proceedings of the 9th workshop on Multimedia {\&} Security,
328 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
329 booktitle = {MM{\&}Sec},
332 isbn = {978-1-59593-857-2},
333 bibsource = {DBLP, http://dblp.uni-trier.de}
336 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
337 added-at = {2010-08-21T00:00:00.000+0200},
338 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
339 biburl = {http://www.bibsonomy.org/bibtex/23405985533dce431b5013941a2c2c2cc/dblp},
340 booktitle = {Media Forensics and Security},
341 crossref = {DBLP:conf/mediaforensics/2010},
342 editor = {Memon, Nasir D. and Dittmann, Jana and Alattar, Adnan M. and Delp, Edward J.},
343 ee = {http://dx.doi.org/10.1117/12.838002},
344 interhash = {a3d2215b959361a30f0b48f15c012bc9},
345 intrahash = {3405985533dce431b5013941a2c2c2cc},
346 isbn = {978-0-8194-7934-1},
350 series = {SPIE Proceedings},
351 timestamp = {2010-08-21T00:00:00.000+0200},
352 title = {Minimizing embedding impact in steganography using trellis-coded quantization.},
353 url = {http://dblp.uni-trier.de/db/conf/mediaforensics/mediaforensics2010.html#FillerJF10},
359 @proceedings{DBLP:conf/mediaforensics/2010,
360 editor = {Nasir D. Memon and
364 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
365 Electronic Imaging Symposium, San Jose, CA, USA, January
366 18-20, 2010, Proceedings},
367 booktitle = {Media Forensics and Security},
369 series = {SPIE Proceedings},
372 isbn = {978-0-8194-7934-1},
373 bibsource = {DBLP, http://dblp.uni-trier.de}
376 @article{DBLP:journals/corr/abs-1112-5239,
377 author = {Jacques M. Bahi and
378 Rapha{\"e}l Couturier and
379 Christophe Guyeux and
380 Pierre-Cyrille H{\'e}am},
381 title = {Efficient and Cryptographically Secure Generation of Chaotic
382 Pseudorandom Numbers on GPU},
384 volume = {abs/1112.5239},
386 ee = {http://arxiv.org/abs/1112.5239},
387 bibsource = {DBLP, http://dblp.uni-trier.de}
391 author = {Ponomarenko, Nikolay},
392 title = {PSNR-HVS-M page},
393 OPThowpublished = {},
396 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
402 author = {Bovik, Alan C.},
404 OPThowpublished = {},
407 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
412 @InProceedings{PSECAL07,
413 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
414 title = {On between-coefficient contrast masking of DCT basis functions},
415 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
418 editor = {Li,Baoxin},
424 OPTorganization = {},
432 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
433 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
434 journal = {IEEE Signal Processing Letters},
445 @inproceedings{DBLP:conf/crypto/ShubBB82,
446 author = {Lenore Blum and
449 title = {Comparison of Two Pseudo-Random Number Generators},
450 booktitle = {CRYPTO},
453 crossref = {DBLP:conf/crypto/1982},
454 bibsource = {DBLP, http://dblp.uni-trier.de}
456 @proceedings{DBLP:conf/crypto/1982,
457 editor = {David Chaum and
460 title = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
461 Barbara, California, USA, August 23-25, 1982},
462 booktitle = {CRYPTO},
463 publisher = {Plenum Press, New York},
465 bibsource = {DBLP, http://dblp.uni-trier.de}
468 @inproceedings{Blum:1985:EPP:19478.19501,
469 author = {Blum, Manuel and Goldwasser, Shafi},
470 title = {An efficient probabilistic public key encryption scheme which hides all partial information},
471 booktitle = {Proceedings of CRYPTO 84 on Advances in cryptology},
473 isbn = {0-387-15658-5},
474 location = {Santa Barbara, California, United States},
477 url = {http://dl.acm.org/citation.cfm?id=19478.19501},
479 publisher = {Springer-Verlag New York, Inc.},
480 address = {New York, NY, USA},
481 keywords = {chosen cyphertext attack, integer factorization, partial information, passive adversaries, probabilistic encryption},
484 @article{DBLP:journals/ejisec/FontaineG07,
485 author = {Caroline Fontaine and
487 title = {A Survey of Homomorphic Encryption for Nonspecialists},
488 journal = {EURASIP J. Information Security},
491 ee = {http://dx.doi.org/10.1155/2007/13801},
492 bibsource = {DBLP, http://dblp.uni-trier.de}
496 @article{Luo:2010:EAI:1824719.1824720,
497 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
498 title = {Edge adaptive image steganography based on LSB matching revisited},
499 journal = {Trans. Info. For. Sec.},
500 issue_date = {June 2010},
508 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
509 doi = {10.1109/TIFS.2010.2041812},
511 publisher = {IEEE Press},
512 address = {Piscataway, NJ, USA},
513 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
516 @article{Mielikainen06,
517 author = {Mielikainen, J.},
518 title = {LSB Matching Revisited},
519 journal = {Signal Processing Letters},
534 @article{Liu:2008:FMP:1284917.1285196,
535 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
536 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
537 journal = {Pattern Recogn.},
538 issue_date = {January, 2008},
546 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
547 doi = {10.1016/j.patcog.2007.06.005},
549 publisher = {Elsevier Science Inc.},
550 address = {New York, NY, USA},
551 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
556 @InProceedings{LHS08,
557 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
558 title = {Textural features based universal steganalysis},
561 booktitle = {Proc. SPIE 6819},
570 OPTorganization = {},
578 author = {Jan Kodovský and Jessica Fridrich},
579 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
582 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
591 OPTorganization = {},
597 @article{DBLP:journals/tifs/KodovskyFH12,
598 author = {Jan Kodovsk{\'y} and
599 Jessica J. Fridrich and
601 title = {Ensemble Classifiers for Steganalysis of Digital Media},
602 journal = {IEEE Transactions on Information Forensics and Security},
607 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
608 bibsource = {DBLP, http://dblp.uni-trier.de}
613 @article{Fillatre:2012:ASL:2333143.2333587,
614 author = {Fillatre, Lionel},
615 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
616 journal = {Trans. Sig. Proc.},
617 issue_date = {February 2012},
625 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
626 doi = {10.1109/TSP.2011.2174231},
628 publisher = {IEEE Press},
629 address = {Piscataway, NJ, USA},
633 @inproceedings{Tyan1993,
634 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
635 address = {{San Francisco, CA, USA}},
636 author = {Tyan, C. Y. and Wang, P. P.},
637 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
638 citeulike-article-id = {7936501},
639 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
641 posted-at = {2010-10-01 17:27:48},
643 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
649 @article{Canny:1986:CAE:11274.11275,
651 title = {A Computational Approach to Edge Detection},
652 journal = {IEEE Trans. Pattern Anal. Mach. Intell.},
653 issue_date = {June 1986},
661 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
662 doi = {10.1109/TPAMI.1986.4767851},
664 publisher = {IEEE Computer Society},
665 address = {Washington, DC, USA},
666 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
670 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
671 author = {Jessica J. Fridrich and
675 title = {Steganalysis of Content-Adaptive Steganography in Spatial
677 booktitle = {Information Hiding},
680 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
681 crossref = {DBLP:conf/ih/2011},
682 bibsource = {DBLP, http://dblp.uni-trier.de}
684 @proceedings{DBLP:conf/ih/2011,
685 editor = {Tom{\'a}s Filler and
686 Tom{\'a}s Pevn{\'y} and
689 title = {Information Hiding - 13th International Conference, IH 2011,
690 Prague, Czech Republic, May 18-20, 2011, Revised Selected
692 booktitle = {Information Hiding},
693 publisher = {Springer},
694 series = {Lecture Notes in Computer Science},
697 isbn = {978-3-642-24177-2},
698 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
699 bibsource = {DBLP, http://dblp.uni-trier.de}
702 @inproceedings{DBLP:conf/iwdw/Fridrich11,
703 author = {Jessica J. Fridrich},
704 title = {Modern Trends in Steganography and Steganalysis},
708 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
709 crossref = {DBLP:conf/iwdw/2011},
710 bibsource = {DBLP, http://dblp.uni-trier.de}
712 @proceedings{DBLP:conf/iwdw/2011,
713 editor = {Yun-Qing Shi and
715 Fernando P{\'e}rez-Gonz{\'a}lez},
716 title = {Digital Forensics and Watermarking - 10th International
717 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
718 2011, Revised Selected Papers},
720 publisher = {Springer},
721 series = {Lecture Notes in Computer Science},
724 isbn = {978-3-642-32204-4},
725 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
726 bibsource = {DBLP, http://dblp.uni-trier.de}