Digital Watermarking: 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007, Proceedings

Front Cover
Springer Science & Business Media, Dec 18, 2008 - Computers - 484 pages

This book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in December 2007.

The 24 revised full papers together with 3 invited papers were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on watermark security; steganalysis; authentication; reversible data hiding; robust watermarking; poster session; theory and methods in watermarking.

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Watermarking a Mature Technology Retrospect and Prospect
1
Watermarking Beneficial and Challenging for Secure Watermarking and Detection
2
Detecting Photographic Composites of People
19
InSecurity of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005
34
Attack Analysis for He Wus Joint WatermarkingFingerprinting Scheme
45
Multiple Watermarking in Visual Cryptography
60
Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding
71
Fusion Based Blind Image Steganalysis by Boosting Feature Selection
87
An Improved Reversible Difference Expansion Watermarking Algorithm
254
Optimum Histogram Pair Based Image Lossless Data Embedding
264
Multiple Domain Watermarking for PrintScan and JPEG Resilient Data Hiding
279
GABased Robustness Evaluation Method for Digital Image Watermarking
294
Dither Modulation in the Logarithmic Domain
308
A Practical RealTime Video Watermarking Scheme Robust against Downscaling Attack
323
Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption
335
Design an Aperiodic Stochastic Resonance Signal Processor for Digital Watermarking
350

Steganalysis of Multi Bit Plane Image Steganography
99
Steganalysis of Enhanced BPCS Steganography Using the HilbertHuang Transform Based Sequential Analysis
112
Weaknesses of MB2
127
Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis
143
Steganalysis Versus Splicing Detection
158
Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning
173
A General Data Hiding Framework and Multilevel Signature for Binary Images
188
HighCapacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents
203
Reversible QuantizationIndex Modulation Using Neighboring Correlation
222
High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain
233
Reversible Data Hiding Using Prediction Error Values Embedding
244
Watermarking for Authentication of LZ77 Compressed Documents
365
Robust Audio ZeroWatermark Based on LWT and Chaotic Modulation
373
A Modified KernelsAlternated Error Diffusion Watermarking Algorithm for Halftone Images
382
On the Complexity of Obtaining Optimal Watermarking Schemes
395
A Theoretical Framework for Watermarking of Compressed Signals
410
Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model
423
Multiple Scrambling and Adaptive Synchronization for Audio Watermarking
440
AComparisonofDCTandDWTBlockBased Watermarking on Medical Image Quality
454
A High Payload VQ Steganographic Method for Binary Images
467
Author Index
482
Copyright

Other editions - View all

Common terms and phrases

About the author (2008)

Stefan Katzenbeisser is a student of computer science at the Vienna University of Technology.