Digital Watermarking
Springer Berlin (Verlag)
978-3-540-92237-7 (ISBN)
Invited Lecture.- Watermarking, a Mature Technology - Retrospect and Prospect.- The Marriage of Cryptography and Watermarking - Beneficial and Challenging for Secure Watermarking and Detection.- Detecting Photographic Composites of People.- Session I: Watermark Security.- (In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005.- Attack Analysis for He & Wu's Joint Watermarking/Fingerprinting Scheme.- Multiple Watermarking in Visual Cryptography.- Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding.- Session II: Steganalysis.- Fusion Based Blind Image Steganalysis by Boosting Feature Selection.- Steganalysis of Multi Bit Plane Image Steganography.- Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis.- Weaknesses of MB2.- Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis.- Steganalysis Versus Splicing Detection.- Session III: Authentication.- Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning.- A General Data Hiding Framework and Multi-level Signature for Binary Images.- High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents.- Session IV: Reversible Data Hiding.- Reversible Quantization-Index Modulation Using Neighboring Correlation.- High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain.- Reversible Data Hiding Using Prediction Error Values Embedding.- An Improved Reversible Difference Expansion Watermarking Algorithm.- Optimum Histogram Pair Based Image Lossless Data Embedding.- Session V: Robust Watermarking.- Multiple Domain Watermarking for Print-Scanand JPEG Resilient Data Hiding.- GA-Based Robustness Evaluation Method for Digital Image Watermarking.- Dither Modulation in the Logarithmic Domain.- Session VI: Poster Session.- A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack.- Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption.- Design an Aperiodic Stochastic Resonance Signal Processor for Digital Watermarking.- Watermarking for Authentication of LZ-77 Compressed Documents.- Robust Audio Zero-Watermark Based on LWT and Chaotic Modulation.- A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone Images.- Session VII: Theory and Methods in Watermarking.- On the Complexity of Obtaining Optimal Watermarking Schemes.- A Theoretical Framework for Watermarking of Compressed Signals.- Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model.- Multiple Scrambling and Adaptive Synchronization for Audio Watermarking.- A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality.- A High Payload VQ Steganographic Method for Binary Images.
Erscheint lt. Verlag | 18.12.2008 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XII, 484 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 753 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • algorithms • Audio Watermarking • Calculus • Complexity • cryptography • Encryption • Fingerprinting • halftone images • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • JPEG • scrambling • security • signal processor • Steganography |
ISBN-10 | 3-540-92237-7 / 3540922377 |
ISBN-13 | 978-3-540-92237-7 / 9783540922377 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich