Digital Watermarking
Springer Berlin (Verlag)
978-3-540-21061-0 (ISBN)
Invited Talks.- The Importance of Aliasing in Structured Quantization Index Modulation Data Hiding.- Watermark Embedding for Black-Box Channels.- Image Steganography and Steganalysis: Concepts and Practice.- On the Integration of Watermarks and Cryptography.- I: DRM I.- Content-Dependent Anti-disclosure Image Watermark.- Performance Measurement of Watermark Embedding Patterns.- II: Theory.- Image Fusion Based Visible Watermarking Using Dual-Tree Complex Wavelet Transform.- Optimal Data-Hiding Strategies for Games with BER Payoffs.- Robust Wavelet-Based Information Hiding through Low-Density Parity-Check (LDPC) Codes.- III: Non-St+Stego.- Natural Language Watermarking Using Semantic Substitution for Chinese Text.- Resilient Information Hiding for Abstract Semi-structures.- Model-Based Steganography.- IV: Systems.- Authentication of 3-D Polygonal Meshes.- Use of Motion Estimation to Improve Video Watermarking for MPEG Encoders.- A Robust Printed Image Watermarking Based on Iterative Halftoning Method.- A Feature-Watermarking Scheme for JPEG Image Authentication.- V: Estimation.- An Intelligent Watermark Detection Decoder Based on Independent Component Analysis.- Coefficient Selection Methods for Scalable Spread Spectrum Watermarking.- Performance Analysis of Order Statistical Patchwork.- Rotation-Tolerant Watermark Detection Using Circular Harmonic Function Correlation Filter.- VI: Perception+Audio.- On Perceptual Quality of Watermarked Images - An Experimental Approach.- Audio Watermarking Based on Music Content Analysis: Robust against Time Scale Modification.- Multi-bit Video Watermarking Based on 3D DFT Using Perceptual Models.- EM Estimation of Scale Factor for Quantization-Based Audio Watermarking.- VII: DRM II.- Semi-fragile Watermarking for Tamper Proofing andAuthentication of Still Images.- Secure Video Watermarking via Embedding Strength Modulation.- On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving.- Posters.- RST-Resistant Image Watermarking Using Invariant Centroid and Reordered Fourier-Mellin Transform.- Robust Audio Watermarking Using Both DWT and Masking Effect.- Normalization Domain Watermarking Method Based on Pattern Extraction.- Robust Watermarking with Adaptive Receiving.- A Robust Logo Multiresolution Watermarking Based on Independent Component Analysis Extraction.- Highly Reliable Stochastic Perceptual Watermarking Model Based on Multiwavelet Transform.- Metadata Hiding for Content Adaptation.- Echo Watermarking in Sub-band Domain.- Modification of Polar Echo Kernel for Performance Improvement of Audio Watermarking.- Increasing Robustness of an Improved Spread Spectrum Audio Watermarking Method Using Attack Characterization.- Enhancement Methods of Image Quality in Screen Mark Attack.- A Method to Improve the Stego-Image Quality for Palette-Based Image Steganography.- A Secure Steganographic Scheme against Statistical Analyses.- A Three-Dimensional Watermarking Algorithm Using the DCT Transform of Triangle Strips.- High Quality Perceptual Steganographic Techniques.- A Watermarking Scheme Applicable for Fingerprinting Protocol.- A New Digital Watermarking for Architectural Design Drawing Using LINEs and ARCs Based on Vertex.- Public Watermark Detection Using Multiple Proxies and Secret Sharing.- Towards Generic Detection Scheme in Zero Knowledge Protocol for Blind Watermark Detection.- Lossless Watermarking Considering the Human Visual System.- Data-Hiding Capacity Improvement for Text Watermarking Using Space Coding Method.
Erscheint lt. Verlag | 24.2.2004 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XII, 604 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 880 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | 3D • Algorithm analysis and problem complexity • algorithms • augmented reality • copy protection • copyright protection • cryptoglogy • cryptography • Digitale Wasserzeichen • Digital rights management • digital rights protection • digital watermarking • digital watermarking algorithms • digital watermarking attacks • digital watermarking systems • Hardcover, Softcover / Informatik, EDV • HC/Informatik, EDV • HC/Informatik, EDV/Informatik • Information • Information Hiding • Kernel • Performance • Resolution • security • Steganography |
ISBN-10 | 3-540-21061-X / 354021061X |
ISBN-13 | 978-3-540-21061-0 / 9783540210610 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich