Digital Watermarking 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007, Proceedings /

This book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in December 2007. The 24 revised full papers together with 3 invited papers were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on...

Full description

Corporate Author: SpringerLink (Online service)
Other Authors: Shi, Yun Q. (Editor, http://id.loc.gov/vocabulary/relators/edt), Kim, Hyoung-Joong. (Editor, http://id.loc.gov/vocabulary/relators/edt), Katzenbeisser, Stefan. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008.
Edition:1st ed. 2008.
Series:Security and Cryptology ; 5041
Subjects:
Online Access:https://doi.org/10.1007/978-3-540-92238-4
Table of Contents:
  • Invited Lecture
  • Watermarking, a Mature Technology – Retrospect and Prospect
  • The Marriage of Cryptography and Watermarking — Beneficial and Challenging for Secure Watermarking and Detection
  • Detecting Photographic Composites of People
  • Session I: Watermark Security
  • (In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005
  • Attack Analysis for He & Wu’s Joint Watermarking/Fingerprinting Scheme
  • Multiple Watermarking in Visual Cryptography
  • Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding
  • Session II: Steganalysis
  • Fusion Based Blind Image Steganalysis by Boosting Feature Selection
  • Steganalysis of Multi Bit Plane Image Steganography
  • Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis
  • Weaknesses of MB2
  • Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis
  • Steganalysis Versus Splicing Detection
  • Session III: Authentication
  • Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning
  • A General Data Hiding Framework and Multi-level Signature for Binary Images
  • High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents
  • Session IV: Reversible Data Hiding
  • Reversible Quantization-Index Modulation Using Neighboring Correlation
  • High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain
  • Reversible Data Hiding Using Prediction Error Values Embedding
  • An Improved Reversible Difference Expansion Watermarking Algorithm
  • Optimum Histogram Pair Based Image Lossless Data Embedding
  • Session V: Robust Watermarking
  • Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding
  • GA-Based Robustness Evaluation Method for Digital Image Watermarking
  • Dither Modulation in the Logarithmic Domain
  • Session VI: Poster Session
  • A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack
  • Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption
  • Design an Aperiodic Stochastic Resonance Signal Processor for Digital Watermarking
  • Watermarking for Authentication of LZ-77 Compressed Documents
  • Robust Audio Zero-Watermark Based on LWT and Chaotic Modulation
  • A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone Images
  • Session VII: Theory and Methods in Watermarking
  • On the Complexity of Obtaining Optimal Watermarking Schemes
  • A Theoretical Framework for Watermarking of Compressed Signals
  • Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model
  • Multiple Scrambling and Adaptive Synchronization for Audio Watermarking
  • A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality
  • A High Payload VQ Steganographic Method for Binary Images.