Skip to main content
padlock icon - secure page this page is secure

For more than 30 years, the Electronic Imaging Symposium has been serving those in the broad community - from academia and industry - who work on imaging science and digital technologies. The breadth of the Symposium covers the entire imaging science ecosystem, from capture (sensors, camera) through image processing (image quality, color and appearance) to how we and our surrogate machines see and interpret images. Applications covered include augmented reality, autonomous vehicles, machine vision, data analysis, digital and mobile photography, security, virtual reality, and human vision. IS&T began sole sponsorship of the meeting in 2016. All papers presented at EIs 20+ conferences are open access.

Please note: For purposes of its Digital Library content, IS&T defines Open Access as papers that will be downloadable in their entirety for free in perpetuity. Copyright restrictions on papers vary; see individual paper for details.

Publisher: Society for Imaging Science and Technology

Media Watermarking, Security, and Forensics 2017

Favourites:
ADD

Open Access Embedding Information into Objects Fabricated With 3-D Printers by Forming Fine Cavities inside Them
pp. 6-9(4)
Authors: Suzuki, Masahiro; Dechrueng, Pailin; Techavichian, Soravit; Silapasuphakornwong, Piyarat; Torii, Hideyuki; Uehira, Kazutake

Favourites:
ADD

Open Access High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction
pp. 10-15(6)
Authors: Puteaux, Pauline; Puech, William

Favourites:
ADD

Open Access The A Priori Knowledge Based Secure Payload Estimation for Additive Model
pp. 16-21(6)
Authors: Ma, Sai; Zhao, Xianfeng; Guan, Qingxiao; Zhao, Chengduo

Favourites:
ADD

Open Access Benefits of combining forensic image creation and file carving
pp. 22-27(6)
Authors: Yannikos, York; Steinebach, Martin; Rettig, Michael

Favourites:
ADD

Open Access MP3 Partial Encryption for DRM
pp. 28-35(8)
Authors: Steinebach, Martin; Berchtold, Waldemar

Favourites:
ADD

Open Access How to recompress a JPEG crypto-compressed image?
pp. 36-43(8)
Authors: Itier, Vincent; Puech, William

Favourites:
ADD
Favourites:
ADD

Open Access Model Based Steganography with Precover
pp. 56-66(11)
Authors: Denemark, Tomáš; Fridrich, Jessica

Favourites:
ADD

Open Access A Preliminary Study on Convolutional Neural Networks for Camera Model Identification
pp. 67-76(10)
Authors: Bondi, Luca; Güera, David; Baroffio, Luca; Bestagini, Paolo; Delp, Edward J; Tubaro, Stefano

Favourites:
ADD

Open Access Design Principles of Convolutional Neural Networks for Multimedia Forensics
pp. 77-86(10)
Authors: Bayar, Belhassen; Stamm, Matthew C.

Favourites:
ADD

Open Access Image Recapture Detection with Convolutional and Recurrent Neural Networks
pp. 87-91(5)
Authors: Li, Haoliang; Wang, Shiqi; Kot, Alex C.

Favourites:
ADD

Open Access Autoencoder with recurrent neural networks for video forgery detection
pp. 92-99(8)
Authors: D'Avino, Dario; Cozzolino, Davide; Poggi, Giovanni; Verdoliva, Luisa

Favourites:
ADD

Open Access Videos versus still images: Asymmetric sensor pattern noise comparison on mobile phones
pp. 100-103(4)
Authors: Galdi, Chiara; Hartung, Frank; Dugelay, Jean-Luc

Favourites:
ADD

Open Access Linear Filter Kernel Estimation Based on Digital Camera Sensor Noise
pp. 104-112(9)
Authors: Liu, Chang; Kirchner, Matthias

Favourites:
ADD

Open Access PRNU-based Image Manipulation Localization with Discriminative Random Fields
pp. 113-120(8)
Authors: Chakraborty, Sujoy; Kirchner, Matthias

Favourites:
ADD

Open Access Sensitivity of different correlation measures to print-and-scan process
pp. 121-127(7)
Authors: Tkachenko, Iuliia; Destruel, Christophe; Strauss, Olivier; Puech, William

Favourites:
ADD

Open Access Scalable Processing History Detector for JPEG Images
pp. 128-137(10)
Authors: Boroumand, Mehdi; Fridrich, Jessica

Favourites:
ADD

Open Access Deciphering Severely Degraded License Plates
pp. 138-143(6)
Authors: Agarwal, Shruti; Tran, Du; Torresani, Lorenzo; Farid, Hany

Favourites:
ADD

Open Access PCB Surface Fingerprints Based Counterfeit Detection of Electronic Devices
pp. 144-149(6)
Authors: Iqbal, Taswar; Wolf, Kai-Dietrich

Favourites:
ADD

  • Access Key
  • Free content
  • Partial Free content
  • New content
  • Open access content
  • Partial Open access content
  • Subscribed content
  • Partial Subscribed content
  • Free trial content
Cookie Policy
X
Cookie Policy
Ingenta Connect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more