Digital Watermarking

6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007, Proceedings
Buch | Softcover
XII, 484 Seiten
2008 | 2008
Springer Berlin (Verlag)
978-3-540-92237-7 (ISBN)

Lese- und Medienproben

Digital Watermarking -
53,49 inkl. MwSt
This book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in December 2007. The 24 revised full papers together with 3 invited papers were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on watermark security; steganalysis; authentication; reversible data hiding; robust watermarking; poster session; theory and methods in watermarking.

Invited Lecture.- Watermarking, a Mature Technology - Retrospect and Prospect.- The Marriage of Cryptography and Watermarking - Beneficial and Challenging for Secure Watermarking and Detection.- Detecting Photographic Composites of People.- Session I: Watermark Security.- (In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005.- Attack Analysis for He & Wu's Joint Watermarking/Fingerprinting Scheme.- Multiple Watermarking in Visual Cryptography.- Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding.- Session II: Steganalysis.- Fusion Based Blind Image Steganalysis by Boosting Feature Selection.- Steganalysis of Multi Bit Plane Image Steganography.- Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis.- Weaknesses of MB2.- Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis.- Steganalysis Versus Splicing Detection.- Session III: Authentication.- Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning.- A General Data Hiding Framework and Multi-level Signature for Binary Images.- High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents.- Session IV: Reversible Data Hiding.- Reversible Quantization-Index Modulation Using Neighboring Correlation.- High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain.- Reversible Data Hiding Using Prediction Error Values Embedding.- An Improved Reversible Difference Expansion Watermarking Algorithm.- Optimum Histogram Pair Based Image Lossless Data Embedding.- Session V: Robust Watermarking.- Multiple Domain Watermarking for Print-Scanand JPEG Resilient Data Hiding.- GA-Based Robustness Evaluation Method for Digital Image Watermarking.- Dither Modulation in the Logarithmic Domain.- Session VI: Poster Session.- A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack.- Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption.- Design an Aperiodic Stochastic Resonance Signal Processor for Digital Watermarking.- Watermarking for Authentication of LZ-77 Compressed Documents.- Robust Audio Zero-Watermark Based on LWT and Chaotic Modulation.- A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone Images.- Session VII: Theory and Methods in Watermarking.- On the Complexity of Obtaining Optimal Watermarking Schemes.- A Theoretical Framework for Watermarking of Compressed Signals.- Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model.- Multiple Scrambling and Adaptive Synchronization for Audio Watermarking.- A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality.- A High Payload VQ Steganographic Method for Binary Images.

Erscheint lt. Verlag 18.12.2008
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XII, 484 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 753 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Access Control • algorithms • Audio Watermarking • Calculus • Complexity • cryptography • Encryption • Fingerprinting • halftone images • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • JPEG • scrambling • security • signal processor • Steganography
ISBN-10 3-540-92237-7 / 3540922377
ISBN-13 978-3-540-92237-7 / 9783540922377
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich