Digital Watermarking (eBook, PDF)
8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings
Redaktion: Ho, Anthony T. S.; Barni, Mauro; Kim, Hyoung-Joong; Shi, Yun Q.
Alle Infos zum eBook verschenken
Digital Watermarking (eBook, PDF)
8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings
Redaktion: Ho, Anthony T. S.; Barni, Mauro; Kim, Hyoung-Joong; Shi, Yun Q.
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Hier können Sie sich einloggen
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the 8th Interntaional Workshop, IWDW 2009, held in Guildford, Surrey, UK, August 24-26, 2009.
The 25 revised full papers, including 4 poster presentations, presented together with 3 invited papers were carefully reviewed and selected from 50 submissions. The papers are organized in topical sections on robust watermarking, video watermarking, steganography and steganalysis, multimedia watermarking and security protocols, as well as image forensics and authentication.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 10.67MB
- Digital Forensics and Watermarking (eBook, PDF)40,95 €
- Information Hiding (eBook, PDF)40,95 €
- Digital Forensics and Watermarking (eBook, PDF)40,95 €
- Digital Watermarking (eBook, PDF)40,95 €
- Transactions on Data Hiding and Multimedia Security III (eBook, PDF)40,95 €
- Digital Forensics and Watermarking (eBook, PDF)40,95 €
- Digital Watermarking (eBook, PDF)40,95 €
-
-
-
The 25 revised full papers, including 4 poster presentations, presented together with 3 invited papers were carefully reviewed and selected from 50 submissions. The papers are organized in topical sections on robust watermarking, video watermarking, steganography and steganalysis, multimedia watermarking and security protocols, as well as image forensics and authentication.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 337
- Erscheinungstermin: 17. August 2009
- Englisch
- ISBN-13: 9783642036880
- Artikelnr.: 44614637
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 337
- Erscheinungstermin: 17. August 2009
- Englisch
- ISBN-13: 9783642036880
- Artikelnr.: 44614637
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Data Hiding and the Statistics of Images.
The Changing Face of Cryptography.
Forensic Techniques for Image Source Classification: A Comparative Study.
Session I: Robust Watermarking.
Digital Watermarking Schemes Using Multi
resolution Curvelet and HVS Model.
Semi
blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques.
Robust AVS Audio Watermarking.
Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG Attacks.
Watermark Embedding and Recovery in the Presence of C
LPCD De
synchronization Attacks.
Session II: Video Watermarking.
A Robust Watermarking for MPEG
2.
Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping.
Blind Digital Watermarking of Low Bit
Rate Advanced H.264/AVC Compressed Video.
Session III: Poster Session.
Fast Embedding Technique for Dirty Paper Trellis Watermarking.
A Homomorphic Method for Sharing Secret Images.
Dot
Size Variant Visual Cryptography.
High Capacity Data Hiding in Binary Document Images.
Session IV: Steganography and Steganalysis.
Hiding Information by Context
Based Synonym Substitution.
A Statistical and Iterative Method for Data Hiding in Palette
Based Images.
Estimating the Information Theoretic Optimal Stego Noise.
Multi
class Blind Steganalysis Based on Image Run
Length Analysis.
Session V: Multimedia Watermarking and Security Protocols.
Local Patch Blind Spectral Watermarking Method for 3D Graphics.
Reading Watermarks from Printed Binary Images with a Camera Phone.
A New Approach in Reversible Watermarking.
Classification Framework for Fair Content Tracing Protocols.
Session VI: Image Forensics and Authentication.
Fragile Watermarking Scheme with Extensive Content Restoration Capability.
Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking.
Camera
Model Identification Using Markovian Transition Probability Matrix.
A Survey of Passive Image Tampering Detection.
An Enhanced Statistical Approach to Identifying Photorealistic Images.
Data Hiding and the Statistics of Images.
The Changing Face of Cryptography.
Forensic Techniques for Image Source Classification: A Comparative Study.
Session I: Robust Watermarking.
Digital Watermarking Schemes Using Multi
resolution Curvelet and HVS Model.
Semi
blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques.
Robust AVS Audio Watermarking.
Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG Attacks.
Watermark Embedding and Recovery in the Presence of C
LPCD De
synchronization Attacks.
Session II: Video Watermarking.
A Robust Watermarking for MPEG
2.
Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping.
Blind Digital Watermarking of Low Bit
Rate Advanced H.264/AVC Compressed Video.
Session III: Poster Session.
Fast Embedding Technique for Dirty Paper Trellis Watermarking.
A Homomorphic Method for Sharing Secret Images.
Dot
Size Variant Visual Cryptography.
High Capacity Data Hiding in Binary Document Images.
Session IV: Steganography and Steganalysis.
Hiding Information by Context
Based Synonym Substitution.
A Statistical and Iterative Method for Data Hiding in Palette
Based Images.
Estimating the Information Theoretic Optimal Stego Noise.
Multi
class Blind Steganalysis Based on Image Run
Length Analysis.
Session V: Multimedia Watermarking and Security Protocols.
Local Patch Blind Spectral Watermarking Method for 3D Graphics.
Reading Watermarks from Printed Binary Images with a Camera Phone.
A New Approach in Reversible Watermarking.
Classification Framework for Fair Content Tracing Protocols.
Session VI: Image Forensics and Authentication.
Fragile Watermarking Scheme with Extensive Content Restoration Capability.
Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking.
Camera
Model Identification Using Markovian Transition Probability Matrix.
A Survey of Passive Image Tampering Detection.
An Enhanced Statistical Approach to Identifying Photorealistic Images.