000 05401nam a22006975i 4500
001 978-3-642-03688-0
003 DE-He213
005 20240730193029.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 _a9783642036880
_9978-3-642-03688-0
024 7 _a10.1007/978-3-642-03688-0
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aDigital Watermarking
_h[electronic resource] :
_b8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings /
_cedited by Anthony T. S. Ho, Yun Q. Shi, Hyoung-Joong Kim, Mauro Barni.
250 _a1st ed. 2009.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2009.
300 _aXIII, 337 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v5703
505 0 _aInvited Lectures (Abstracts) -- Data Hiding and the Statistics of Images -- The Changing Face of Cryptography -- Forensic Techniques for Image Source Classification: A Comparative Study -- Session I: Robust Watermarking -- Digital Watermarking Schemes Using Multi-resolution Curvelet and HVS Model -- Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques -- Robust AVS Audio Watermarking -- Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG Attacks -- Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks -- Session II: Video Watermarking -- A Robust Watermarking for MPEG-2 -- Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping -- Blind Digital Watermarking of Low Bit-Rate Advanced H.264/AVC Compressed Video -- Session III: Poster Session -- Fast Embedding Technique for Dirty Paper Trellis Watermarking -- A Homomorphic Method for Sharing Secret Images -- Dot-Size Variant Visual Cryptography -- High Capacity Data Hiding in Binary Document Images -- Session IV: Steganography and Steganalysis -- Hiding Information by Context-Based Synonym Substitution -- A Statistical and Iterative Method for Data Hiding in Palette-Based Images -- Estimating the Information Theoretic Optimal Stego Noise -- Multi-class Blind Steganalysis Based on Image Run-Length Analysis -- Session V: Multimedia Watermarking and Security Protocols -- Local Patch Blind Spectral Watermarking Method for 3D Graphics -- Reading Watermarks from Printed Binary Images with a Camera Phone -- A New Approach in Reversible Watermarking -- Classification Framework for Fair Content Tracing Protocols -- Session VI: Image Forensics and Authentication -- Fragile Watermarking Scheme with Extensive Content Restoration Capability -- Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking -- Camera-Model Identification Using Markovian Transition Probability Matrix -- A Survey of Passive Image Tampering Detection -- An Enhanced Statistical Approach to Identifying Photorealistic Images.
520 _aThis book constitutes the refereed proceedings of the 8th Interntaional Workshop, IWDW 2009, held in Guildford, Surrey, UK, August 24-26, 2009. The 25 revised full papers, including 4 poster presentations, presented together with 3 invited papers were carefully reviewed and selected from 50 submissions. The papers are organized in topical sections on robust watermarking, video watermarking, steganography and steganalysis, multimedia watermarking and security protocols, as well as image forensics and authentication.
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aData structures (Computer science).
_98188
650 0 _aInformation theory.
_914256
650 0 _aCoding theory.
_94154
650 0 _aInformation storage and retrieval systems.
_922213
650 0 _aComputer graphics.
_94088
650 0 _aComputer vision.
_9152206
650 1 4 _aCryptology.
_931769
650 2 4 _aData Structures and Information Theory.
_931923
650 2 4 _aCoding and Information Theory.
_9152207
650 2 4 _aInformation Storage and Retrieval.
_923927
650 2 4 _aComputer Graphics.
_94088
650 2 4 _aComputer Vision.
_9152208
700 1 _aHo, Anthony T. S.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9152209
700 1 _aShi, Yun Q.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9152210
700 1 _aKim, Hyoung-Joong.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9152211
700 1 _aBarni, Mauro.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9152212
710 2 _aSpringerLink (Online service)
_9152213
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642036873
776 0 8 _iPrinted edition:
_z9783642036897
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v5703
_9152214
856 4 0 _uhttps://doi.org/10.1007/978-3-642-03688-0
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c94561
_d94561