We are delighted to welcome the attendees of the Fourth International Wo- shop on Digital Watermarking (IWDW). Watermarking continues to generate strong academic interest. Commercialization of the technology is proceeding at a steadypace. We haveseen watermarkingadoptedfor DVD audio.Fingerpri- ing technology was successfully used to determine the source of pirated video material. Furthermore, a number of companies are using watermarking as an enabling technology for broadcast monitoring services. Watermarking of digital cinema contentis anticipated. Future applications may also come from areas- related to digital rights management. For example, the use of watermarking to enhance legacy broadcast and communication systems is now being considered. IWDW 2005 o?ers an opportunity to re?ect upon the state of the art in digital watermarking as well as discuss directions for future research and applications. This year we accepted 31 papers from 74 submissions. This 42% acceptance rate indicates our commitment to ensuring a very high quality conference. We thankthemembersoftheTechnicalProgramCommitteeformakingthispossible by their timely and insightful reviews. Thanks to their hard work this is the ?rst IWDW at which the ?nal proceedings are available to the participants at the time of the workshop as a Springer LNCS publication.
Author(s): Junhui He, Jiwu Huang, Guoping Qiu (auth.), Mauro Barni, Ingemar Cox, Ton Kalker, Hyoung-Joong Kim (eds.)
Series: Lecture Notes in Computer Science 3710 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005
Language: English
Pages: 492
Tags: Data Encryption; Operating Systems; Algorithm Analysis and Problem Complexity; Multimedia Information Systems; Computers and Society; Management of Computing and Information Systems
Front Matter....Pages -
A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography....Pages 1-14
Information Transmission and Steganography....Pages 15-29
On the Existence of Perfect Stegosystems....Pages 30-38
Towards Multi-class Blind Steganalyzer for JPEG Images....Pages 39-53
An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption....Pages 54-66
Collusion Secure Convolutional Spread Spectrum Fingerprinting....Pages 67-83
Performance Study on Multimedia Fingerprinting Employing Traceability Codes....Pages 84-96
Regular Simplex Fingerprints and Their Optimality Properties....Pages 97-109
A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet Domain....Pages 110-123
Robust Detection of Transform Domain Additive Watermarks....Pages 124-138
Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis....Pages 139-146
A New Inter-frame Collusion Attack and a Countermeasure....Pages 147-157
Effectiveness of ST-DM Watermarking Against Intra-video Collusion....Pages 158-170
Oracle Attacks and Covert Channels....Pages 171-185
Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images....Pages 186-200
A Survey of Watermarking Security....Pages 201-215
Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy....Pages 216-230
Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information....Pages 231-243
Practical Data-Hiding: Additive Attacks Performance Analysis....Pages 244-259
The Return of the Sensitivity Attack....Pages 260-274
Look Up Table(LUT) Method for Halftone Image Watermarking....Pages 275-285
New Public-Key Authentication Watermarking for JBIG2 Resistant to Parity Attacks....Pages 286-298
Software Watermarking as a Proof of Identity: A Study of Zero Knowledge Proof Based Software Watermarking....Pages 299-312
Watermarking of 3D Irregular Meshes Based on Wavelet Multiresolution Analysis....Pages 313-324
Digital Watermarking Robustness and Fragility Characteristics: New Modelling and Coding Influence....Pages 325-335
New Geometric Analysis of Spread-Spectrum Data Hiding with Repetition Coding, with Implications for Side-Informed Schemes....Pages 336-350
Trellis-Coded Rational Dither Modulation for Digital Watermarking....Pages 351-360
Closed-Form Formulas for Private Watermarking Capacities of Laplacian Sources with the Magnitude-Error Distortion Measure and Under Additive Attacks....Pages 361-371
Improved QIM Strategies for Gaussian Watermarking....Pages 372-386
On the Achievable Rate of Side Informed Embedding Techniques with Steganographic Constraints....Pages 387-402
Performance Lower Bounds for Existing and New Uncoded Digital Watermarking Modulation Techniques....Pages 403-417
Evaluation of Feature Extraction Techniques for Robust Watermarking....Pages 418-431
Perceptual Video Watermarking in the 3D-DWT Domain Using a Multiplicative Approach....Pages 432-443
Robustness Enhancement of Content-Based Watermarks Using Entropy Masking Effect....Pages 444-458
Secure Mutual Distrust Transaction Tracking Using Cryptographic Elements....Pages 459-469
ViWiD : Visible Watermarking Based Defense Against Phishing....Pages 470-483
Back Matter....Pages -