ICIP 2017 | 2017 IEEE International Conference on Image Processing | 17-20 September 2017 | Beijing, China
Login Paper Search My Schedule Paper Index Help

My ICIP 2017 Schedule

Note: Your custom schedule will not be saved unless you create a new account or login to an existing account.
  1. Create a login based on your email (takes less than one minute)
  2. Perform 'Paper Search'
  3. Select papers that you desire to save in your personalized schedule
  4. Click on 'My Schedule' to see the current list of selected papers
  5. Click on 'Printable Version' to create a separate window suitable for printing (the header and menu will appear, but will not actually print)

Clicking on the Add button next to a paper title will add that paper to your custom schedule.
Clicking on the Remove button next to a paper will remove that paper from your custom schedule.

WQ-PC: Security and Forensics Applications

Session Type: Poster
Time: Wednesday, September 20, 16:30 - 18:00
Location: Poster Area C
Session Chair: Zhaohui Harry Sun, Kitware
 
  WQ-PC.1: REFLECTION CORRESPONDENCE FOR EXPOSING PHOTOGRAPH MANIPULATION
         Eric Wengrowski; Rutgers University
         Zhaohui Sun; Kitware Inc.
         Anthony Hoogs; Kitware Inc
 
  WQ-PC.2: ADAPTIVE CODE EMBEDDING FOR REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES
         Shuang Yi; University of Macau
         Yicong Zhou; University of Macau
 
  WQ-PC.3: ONLINE SVM AND BACKWARD MODEL VALIDATION BASED VISUAL TRACKING
         Dhruv Mullick; Netaji Subhas Institute of Technology, Delhi University, India
         A V Subramanyam Subramanyam; Indraprastha Institute of Information Technology Delhi
         Sabu Emmanuel; College of Computing Sciences and Engineering, Kuwait University, Kuwait
 
  WQ-PC.4: CONTEXT MULTI-TASK VISUAL OBJECT TRACKING VIA GUIDED FILTER
         Yong Wang; School of Electrical and Computer Engineering, University of Ottawa
         Xinbin Luo; School of Electronic information and Electrical Engineering, Shanghai Jiao Tong University
         Shiqiang Hu; School of Aeronautics and Astronautics, Shanghai Jiao Tong University
 
  WQ-PC.5: CAMERA MODEL IDENTIFICATION WITH RESIDUAL NEURAL NETWORK
         Yunshu Chen; Xiamen University
         Yue Huang; Xiamen University
         Xinghao Ding; Xiamen University
 
  WQ-PC.6: ROBUST IMAGE IDENTIFICATION WITH SECURE FEATURES FOR JPEG IMAGES
         Kenta Iida; Tokyo Metropolitan University
         Hitoshi Kiya; Tokyo Metropolitan University
 
  WQ-PC.7: VISUAL SALIENCY-BASED CONFIDENTIALITY METRIC FOR SELECTIVE CRYPTO-COMPRESSED JPEG IMAGES
         Noé Le Philippe; University of Montpellier
         Vincent Itier; University of Montpellier
         William Puech; University of Montpellier
 
  WQ-PC.8: A CONSISTENT TWO-LEVEL METRIC FOR EVALUATION OF AUTOMATED ABANDONED OBJECT DETECTION METHODS
         Patrick Krusch; Technische Universität Berlin
         Erik Bochinski; Technische Universität Berlin
         Volker Eiselein; Technische Universität Berlin
         Thomas Sikora; Technische Universität Berlin
 
  WQ-PC.9: ROBUSTNESS ANALYSIS OF A PASSIVE PRINTER IDENTIFICATION SCHEME FOR HALFTONE IMAGES
         Stephan Escher; TU Dresden
         Thorsten Strufe; TU Dresden
 
  WQ-PC.10: DOUBLE RANDOM SCRAMBLING ENCODING IN THE RPMPFRHT DOMAIN
         Xuejing Kang; Beijing University of Posts and Telecommunications
         Zhao Han; Beijing University of Posts and Telecommunications
         Aiwei Yu; Beijing University of Posts and Telecommunications
         Peiqi Duan; Beijing University of Posts and Telecommunications