|
The papers included in this volume were part of the technical conference cited on the cover and title page. Papers were selected and subject to review by the editors and conference program committee. Some conference presentations may not be available for publication. The papers published in these proceedings reflect the work and thoughts of the authors and are published herein as submitted. The publishers are not responsible for the validity of the information or for any outcomes resulting from reliance thereon. Please use the following format to cite material from this book: Author(s), “Title of Paper,” in Media Watermarking, Security, and Forensics 2014, edited by Adnan M. Alattar, Nasir D. Memon, Chad D. Heitzenrater, Proceedings of SPIE-IS&T Electronic Imaging, SPIE Vol. 9028, Article CID Number (2014) ISSN: 0277-786X ISBN: 9780819499455 Copublished by SPIE P.O. Box 10, Bellingham, Washington 98227-0010 USA Telephone +1 360 676 3290 (Pacific Time) · Fax +1 360 647 1445 and IS&T–The Society for Imaging Science and Technology 7003 Kilworth Lane, Springfield, Virginia, 22151 USA Telephone +1 703 642 9090 (Eastern Time)· Fax +1 703 642 9094 Copyright © 2014, Society of Photo-Optical Instrumentation Engineers and The Society for Imaging Science and Technology. Copying of material in this book for internal or personal use, or for the internal or personal use of specific clients, beyond the fair use provisions granted by the U.S. Copyright Law is authorized by the publishers subject to payment of copying fees. The Transactional Reporting Service base fee for this volume is $18.00 per article (or portion thereof), which should be paid directly to the Copyright Clearance Center (CCC), 222 Rosewood Drive, Danvers, MA 01923. Payment may also be made electronically through CCC Online at copyright.com. Other copying for republication, resale, advertising or promotion, or any form of systematic or multiple reproduction of any material in this book is prohibited except with permission in writing from the publisher. The CCC fee code is 0277-786X/14/$18.00. Printed in the United States of America. Paper Numbering: Proceedings of SPIE follow an e-First publication model, with papers published first online and then in print and on CD-ROM. Papers are published as they are submitted and meet publication criteria. A unique, consistent, permanent citation identifier (CID) number is assigned to each article at the time of the first publication. Utilization of CIDs allows articles to be fully citable as soon as they are published online, and connects the same identifier to all online, print, and electronic versions of the publication. SPIE uses a six-digit CID article numbering system in which:
The CID Number appears on each page of the manuscript. The complete citation is used on the first page, and an abbreviated version on subsequent pages. Numbers in the index correspond to the last two digits of the six-digit CID Number. Conference CommitteeSymposium Chair Symposium Co-chair Conference Chairs
Conference Program Committee
Session Chairs
IntroductionIt is our pleasure to bring you the papers presented at the 2014 Media Watermarking, Security, and Forensics Conference. This year’s conference was a great success, as it maintained and strengthened its status as the premier conference in the field. It was held at the Hilton, in the popular tourist destination of downtown San Francisco. This convenient location let the attendees enjoy their San Francisco stay while participating in the outstanding technical exchange this forum is well known for. For three full days, researchers from all over the globe in the field of watermarking, steganography, and forensics presented state-of-the-art research results in a lecture style. Thirty-one top-quality, original research papers were presented in a well-attended single track. Many great papers were submitted, but unfortunately not all could be accommodated by the conference. Attendees from academic, industrial, and governmental establishments enjoyed the presentations of latest research results. After the presentations and during the coffee breaks, presenters enjoyed discussing their research approaches and results with colleagues. The valuable feedback and comments they received planted the seeds for more research to advance the state-of-the-art of watermarking, security, and forensics. Attendees also enjoyed the strong industrial flavor of this conference. This year, three distinguished keynote speakers from industry and academia addressed recent technological developments in their field of expertise:
All three speeches were informative, illuminating, and well-received by the audience. In addition to the keynote speeches, representatives from the industry gave three demos of their innovative products and solutions of related technologies:
All three demos showed the great potential of the technology being developed by the attendees of the conference. New this year, to acknowledge excellent contributions to the field, the program committee of the conference decided to offer a Best Paper award. The committee sought input from the session chairs of the conference, and in response they received the following nominations:
All nominated papers will be reviewed by the technical committee of the conference. The papers will be judged based on their originality, creativity, clarity, and potential impact on the field of watermarking, security, and forensics. The winner will be announced in the next year’s call for papers or in a special event during next year’s conference. Finally, the conference chairs express appreciation for all the hard work and for the enthusiastic participation of the researchers, scientists, practitioners, industry and government representatives, keynote speakers, and the organization committee of the conference. The chairs also congratulate all of you on the success of this conference. Without your dedicated effort, little could have been achieved. Together, we will have another great conference next year. Thank you. Adnan Alattar Nasir Memon Chad Heitzenrater |