, ,

Digital Watermarking

6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007, Proceedings

Specificaties
Paperback, 484 blz. | Engels
Springer Berlin Heidelberg | 2008e druk, 2008
ISBN13: 9783540922377
Rubricering
Springer Berlin Heidelberg 2008e druk, 2008 9783540922377
Onderdeel van serie Lecture Notes in Computer Science
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

This book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in December 2007. The 24 revised full papers together with 3 invited papers were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on watermark security; steganalysis; authentication; reversible data hiding; robust watermarking; poster session; theory and methods in watermarking.

Specificaties

ISBN13:9783540922377
Taal:Engels
Bindwijze:paperback
Aantal pagina's:484
Uitgever:Springer Berlin Heidelberg
Druk:2008

Inhoudsopgave

Invited Lecture.- Watermarking, a Mature Technology – Retrospect and Prospect.- The Marriage of Cryptography and Watermarking — Beneficial and Challenging for Secure Watermarking and Detection.- Detecting Photographic Composites of People.- Session I: Watermark Security.- (In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005.- Attack Analysis for He & Wu’s Joint Watermarking/Fingerprinting Scheme.- Multiple Watermarking in Visual Cryptography.- Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding.- Session II: Steganalysis.- Fusion Based Blind Image Steganalysis by Boosting Feature Selection.- Steganalysis of Multi Bit Plane Image Steganography.- Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis.- Weaknesses of MB2.- Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis.- Steganalysis Versus Splicing Detection.- Session III: Authentication.- Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning.- A General Data Hiding Framework and Multi-level Signature for Binary Images.- High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents.- Session IV: Reversible Data Hiding.- Reversible Quantization-Index Modulation Using Neighboring Correlation.- High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain.- Reversible Data Hiding Using Prediction Error Values Embedding.- An Improved Reversible Difference Expansion Watermarking Algorithm.- Optimum Histogram Pair Based Image Lossless Data Embedding.- Session V: Robust Watermarking.- Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding.- GA-Based Robustness Evaluation Method for Digital Image Watermarking.- Dither Modulation in the Logarithmic Domain.- Session VI: Poster Session.- A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack.- Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption.- Design an Aperiodic Stochastic Resonance Signal Processor for Digital Watermarking.- Watermarking for Authentication of LZ-77 Compressed Documents.- Robust Audio Zero-Watermark Based on LWT and Chaotic Modulation.- A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone Images.- Session VII: Theory and Methods in Watermarking.- On the Complexity of Obtaining Optimal Watermarking Schemes.- A Theoretical Framework for Watermarking of Compressed Signals.- Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model.- Multiple Scrambling and Adaptive Synchronization for Audio Watermarking.- A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality.- A High Payload VQ Steganographic Method for Binary Images.

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Digital Watermarking