000778139 000__ 05634cam\a2200601Mi\4500 000778139 001__ 778139 000778139 005__ 20230306142754.0 000778139 006__ m\\\\\o\\d\\\\\\\\ 000778139 007__ cr\nn\nnnunnun 000778139 008__ 161126s2016\\\\xx\\\\\\o\\\\\100\0\eng\d 000778139 019__ $$a967321163 000778139 020__ $$a9783319502090$$q(electronic book) 000778139 020__ $$a3319502093$$q(electronic book) 000778139 020__ $$z9783319502083 000778139 035__ $$aSP(OCoLC)ocn964412347 000778139 035__ $$aSP(OCoLC)964412347$$z(OCoLC)967321163 000778139 040__ $$aEBLCP$$beng$$epn$$cEBLCP$$dOCLCO$$dN$T$$dIDEBK$$dGW5XE$$dYDX$$dOCLCF$$dUAB$$dOCLCQ$$dOCLCO$$dIOG 000778139 049__ $$aISEA 000778139 050_4 $$aQA76.575 000778139 050_4 $$aTA1-2040 000778139 08204 $$a006.7$$223 000778139 08204 $$a620 000778139 1112_ $$aInternational Conference on Intelligent Information Hiding and Multimedia Signal Processing$$n(12th :$$d2016 :$$cKao-hsiung shih, Taiwan) 000778139 24510 $$aAdvances in intelligent information hiding and multimedia signal processing :$$bProceeding of the Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Nov., 21-23, 2016, Kaohsiung, Taiwan.$$nVolume 1 /$$cJeng-Shyang Pan, Pei-Wei Tsai, Hsiang-Cheh Huang, editors. 000778139 260__ $$aCham :$$bSpringer,$$c2016. 000778139 300__ $$a1 online resource (338 pages). 000778139 336__ $$atext$$btxt$$2rdacontent 000778139 337__ $$acomputer$$bc$$2rdamedia 000778139 338__ $$aonline resource$$bcr$$2rdacarrier 000778139 4901_ $$aSmart Innovation, Systems and Technologies ;$$vv. 63 000778139 500__ $$a3.4 Overflow and Underflow Handling. 000778139 5050_ $$aPreface; Conference Organization; Contents; Part I Information Hiding and Secret Sharing; 1 Demonstration Experiment of Data Hiding into OOXML Document for Suppression of Plagiarism; Abstract; 1 Introduction; 2 Problem Statement; 3 Related Works; 4 OOXML Format; 5 Examined Methods; 5.1 A method based on images; 5.2 A method based on similar fonts; 6 Experiments; 6.1 Experiment 1; 6.2 Experiment 2; 7 Conclusion; References; 2 A Revisit to LSB Substitution Based Data Hiding for Embedding More Information; Abstract; Keywords; 1 Introduction; 2 Review of Chen and Chang's scheme. 000778139 5058_ $$a3 Proposed scheme4 Experimental results; 5 Conclusions; References; 3 Behavior Steganography in Social Network; Abstract; Keywords; 1 Introduction; 2 System Description; 3 Steganographic method; 4 Conclusion; Acknowledgement; References; 4 Robust Steganography Using Texture Synthesis; Abstract; Keywords; 1 Introduction; 2 Proposed Method; 2.1 Data Hiding; 2.2 Data Extraction; 3 Experimental Results; 4 Conclusions; Acknowledgement; References; 5 A Reversible Data Hiding Scheme in AMBTC Compression Code Using Joint Neighborhood Coding; Abstract; Keywords; 1 Introduction; 2 Related works. 000778139 5058_ $$a2.1 Absolute Moment Block Truncation Coding2.2 Joint Neighborhood Coding; 3 The proposed method; 3.1 Data hiding phase; 3.2 Data extraction phase; 4 Experimental results; 5 Conclusions; 6 Acknowledgement; References; 6 A Quantization-Based Image Watermarking Scheme Using Vector Dot Product; Abstract; Keywords; 1 Introduction; 2 The Proposed Method; 2.1 An overview; 2.2 Single bit embedding algorithms; 2.3 Image watermarking optimized for pre-specified PSNR; 3 Experimental Results; 4 Conclusions; References; 7 High-capacity Robust Watermarking Approach for Protecting Ownership Right; Abstract. 000778139 5058_ $$aKeywords1 Introduction; 2 Proposed Method; 3 Experimental Results; 4 Conclusion; References; 8 High Payload Data Hiding Based on Jus tNoticeable Distortion Profile and LSB Substitution; Abstract; Keywords; 1 Introduction; 2 Related Works; 2.1 Swain's data hiding scheme; 2.2 Chou and Li's profile estimation method; 3 The Proposed Scheme; 4 Experimental Results; 5 Conclusions; References; 9 An Improved Data Hiding Method of Five Pixel Pair Differencing and LSB Substitution Hiding Scheme; Abstract; 1 Introduction; 2 Related Work; 2.1 Pixel Value Differencing (PVD); 3 Proposed Method. 000778139 5058_ $$a3.1 Embedding Phase3.2 Extraction Process; 4 Experimental Results; 5 Conclusion; References; 10 A Data Hiding Method based on Multi-predictor and Pixel Value Ordering; Abstract; Key words; 1 Introduction; 2 Related Works; 2.1 Pixel-based Pixel Value Ordering (PPVO) [9]; 2.2 Media Edge Detect (MED) [17]; 2.3 Data Hiding Method Using Image Interpolation (NMI) [4]; 2.4 Interpolating Neighboring Pixels (INP) [5]; 2.5 High Payload Reversible Data Embedding Method [13]; 3 The Proposed Method; 3.1 The Prediction Phase; 3.2 The Embedding Phase; 3.3 The Data Extraction Phase. 000778139 506__ $$aAccess limited to authorized users. 000778139 588__ $$aDescription based on print version record. 000778139 650_0 $$aMultimedia systems$$vCongresses. 000778139 650_0 $$aImage processing$$vCongresses. 000778139 650_0 $$aSignal processing$$vCongresses. 000778139 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 000778139 650_0 $$aDigital watermarking$$vCongresses. 000778139 650_0 $$aData encryption (Computer science)$$vCongresses. 000778139 7001_ $$aPan, Jeng-Shyang. 000778139 7001_ $$aTsai, Pei-Wei. 000778139 7001_ $$aHuang, Hsiang-Cheh. 000778139 77608 $$iPrint version:$$aPan, Jeng-Shyang.$$tAdvances in Intelligent Information Hiding and Multimedia Signal Processing : Proceeding of the Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Nov., 21-23, 2016, Kaohsiung, Taiwan, Volume 1.$$dCham : Springer International Publishing, ©2016$$z9783319502083 000778139 830_0 $$aSmart innovation, systems, and technologies ;$$v63. 000778139 852__ $$bebk 000778139 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-50209-0$$zOnline Access$$91397441.1 000778139 909CO $$ooai:library.usi.edu:778139$$pGLOBAL_SET 000778139 980__ $$aEBOOK 000778139 980__ $$aBIB 000778139 982__ $$aEbook 000778139 983__ $$aOnline 000778139 994__ $$a92$$bISE