Yun Q. Shi / Hyoung-Joong Kim / Stefan Katzenbeisser (Volume editor)6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007, Proceedings
Digital Watermarking
6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007, Proceedings
Herausgegeben:Shi, Yun Q.; Kim, Hyoung-Joong; Katzenbeisser, Stefan
Yun Q. Shi / Hyoung-Joong Kim / Stefan Katzenbeisser (Volume editor)6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007, Proceedings
Digital Watermarking
6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007, Proceedings
Herausgegeben:Shi, Yun Q.; Kim, Hyoung-Joong; Katzenbeisser, Stefan
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in December 2007. The 24 revised full papers together with 3 invited papers were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on watermark security; steganalysis; authentication; reversible data hiding; robust watermarking; poster session; theory and methods in watermarking.
Andere Kunden interessierten sich auch für
- Digital Watermarking42,99 €
- Andreas Pfitzmann (ed.)Information Hiding83,99 €
- Digital Forensics and Watermarking37,99 €
- Transactions on Data Hiding and Multimedia Security I42,99 €
- Joan Feigenbaum (ed.)Digital Rights Management42,99 €
- Digital-Forensics and Watermarking37,99 €
- Information Theoretic Security42,99 €
-
-
-
This book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in December 2007. The 24 revised full papers together with 3 invited papers were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on watermark security; steganalysis; authentication; reversible data hiding; robust watermarking; poster session; theory and methods in watermarking.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 5041
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 12451173, 978-3-540-92237-7
- 2008
- Seitenzahl: 496
- Erscheinungstermin: 18. Dezember 2008
- Englisch
- Abmessung: 235mm x 155mm x 27mm
- Gewicht: 753g
- ISBN-13: 9783540922377
- ISBN-10: 3540922377
- Artikelnr.: 25700744
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Lecture Notes in Computer Science 5041
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 12451173, 978-3-540-92237-7
- 2008
- Seitenzahl: 496
- Erscheinungstermin: 18. Dezember 2008
- Englisch
- Abmessung: 235mm x 155mm x 27mm
- Gewicht: 753g
- ISBN-13: 9783540922377
- ISBN-10: 3540922377
- Artikelnr.: 25700744
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Invited Lecture.- Watermarking, a Mature Technology - Retrospect and Prospect.- The Marriage of Cryptography and Watermarking - Beneficial and Challenging for Secure Watermarking and Detection.- Detecting Photographic Composites of People.- Session I: Watermark Security.- (In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005.- Attack Analysis for He & Wu's Joint Watermarking/Fingerprinting Scheme.- Multiple Watermarking in Visual Cryptography.- Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding.- Session II: Steganalysis.- Fusion Based Blind Image Steganalysis by Boosting Feature Selection.- Steganalysis of Multi Bit Plane Image Steganography.- Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis.- Weaknesses of MB2.- Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis.- Steganalysis Versus Splicing Detection.- Session III: Authentication.- Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning.- A General Data Hiding Framework and Multi-level Signature for Binary Images.- High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents.- Session IV: Reversible Data Hiding.- Reversible Quantization-Index Modulation Using Neighboring Correlation.- High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain.- Reversible Data Hiding Using Prediction Error Values Embedding.- An Improved Reversible Difference Expansion Watermarking Algorithm.- Optimum Histogram Pair Based Image Lossless Data Embedding.- Session V: Robust Watermarking.- Multiple Domain Watermarking for Print-Scanand JPEG Resilient Data Hiding.- GA-Based Robustness Evaluation Method for Digital Image Watermarking.- Dither Modulation in the Logarithmic Domain.- Session VI: Poster Session.- A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack.- Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption.- Design an Aperiodic Stochastic Resonance Signal Processor for Digital Watermarking.- Watermarking for Authentication of LZ-77 Compressed Documents.- Robust Audio Zero-Watermark Based on LWT and Chaotic Modulation.- A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone Images.- Session VII: Theory and Methods in Watermarking.- On the Complexity of Obtaining Optimal Watermarking Schemes.- A Theoretical Framework for Watermarking of Compressed Signals.- Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model.- Multiple Scrambling and Adaptive Synchronization for Audio Watermarking.- A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality.- A High Payload VQ Steganographic Method for Binary Images.
Invited Lecture.- Watermarking, a Mature Technology - Retrospect and Prospect.- The Marriage of Cryptography and Watermarking - Beneficial and Challenging for Secure Watermarking and Detection.- Detecting Photographic Composites of People.- Session I: Watermark Security.- (In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005.- Attack Analysis for He & Wu's Joint Watermarking/Fingerprinting Scheme.- Multiple Watermarking in Visual Cryptography.- Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding.- Session II: Steganalysis.- Fusion Based Blind Image Steganalysis by Boosting Feature Selection.- Steganalysis of Multi Bit Plane Image Steganography.- Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis.- Weaknesses of MB2.- Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis.- Steganalysis Versus Splicing Detection.- Session III: Authentication.- Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning.- A General Data Hiding Framework and Multi-level Signature for Binary Images.- High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents.- Session IV: Reversible Data Hiding.- Reversible Quantization-Index Modulation Using Neighboring Correlation.- High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain.- Reversible Data Hiding Using Prediction Error Values Embedding.- An Improved Reversible Difference Expansion Watermarking Algorithm.- Optimum Histogram Pair Based Image Lossless Data Embedding.- Session V: Robust Watermarking.- Multiple Domain Watermarking for Print-Scanand JPEG Resilient Data Hiding.- GA-Based Robustness Evaluation Method for Digital Image Watermarking.- Dither Modulation in the Logarithmic Domain.- Session VI: Poster Session.- A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack.- Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption.- Design an Aperiodic Stochastic Resonance Signal Processor for Digital Watermarking.- Watermarking for Authentication of LZ-77 Compressed Documents.- Robust Audio Zero-Watermark Based on LWT and Chaotic Modulation.- A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone Images.- Session VII: Theory and Methods in Watermarking.- On the Complexity of Obtaining Optimal Watermarking Schemes.- A Theoretical Framework for Watermarking of Compressed Signals.- Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model.- Multiple Scrambling and Adaptive Synchronization for Audio Watermarking.- A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality.- A High Payload VQ Steganographic Method for Binary Images.