This book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in December 2007.
The 24 revised full papers together with 3 invited papers were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on watermark security; steganalysis; authentication; reversible data hiding; robust watermarking; poster session; theory and methods in watermarking.
Author(s): Bede Liu (auth.), Yun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser (eds.)
Series: Lecture Notes in Computer Science 5041 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2008
Language: English
Pages: 484
Tags: Data Encryption; Data Structures, Cryptology and Information Theory; Coding and Information Theory; Computer Graphics; Computer Imaging, Vision, Pattern Recognition and Graphics; Document Preparation and Text Processing
Front Matter....Pages -
Watermarking, a Mature Technology – Retrospect and Prospect....Pages 1-1
The Marriage of Cryptography and Watermarking — Beneficial and Challenging for Secure Watermarking and Detection....Pages 2-18
Detecting Photographic Composites of People....Pages 19-33
(In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005....Pages 34-44
Attack Analysis for He & Wu’s Joint Watermarking/Fingerprinting Scheme....Pages 45-59
Multiple Watermarking in Visual Cryptography....Pages 60-70
Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding....Pages 71-86
Fusion Based Blind Image Steganalysis by Boosting Feature Selection....Pages 87-98
Steganalysis of Multi Bit Plane Image Steganography....Pages 99-111
Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis....Pages 112-126
Weaknesses of MB2....Pages 127-142
Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis....Pages 143-157
Steganalysis Versus Splicing Detection....Pages 158-172
Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning....Pages 173-187
A General Data Hiding Framework and Multi-level Signature for Binary Images....Pages 188-202
High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents....Pages 203-221
Reversible Quantization-Index Modulation Using Neighboring Correlation....Pages 222-232
High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain....Pages 233-243
Reversible Data Hiding Using Prediction Error Values Embedding....Pages 244-253
An Improved Reversible Difference Expansion Watermarking Algorithm....Pages 254-263
Optimum Histogram Pair Based Image Lossless Data Embedding....Pages 264-278
Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding....Pages 279-293
GA-Based Robustness Evaluation Method for Digital Image Watermarking....Pages 294-307
Dither Modulation in the Logarithmic Domain....Pages 308-322
A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack....Pages 323-334
Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption....Pages 335-349
Design an Aperiodic Stochastic Resonance Signal Processor for Digital Watermarking....Pages 350-364
Watermarking for Authentication of LZ-77 Compressed Documents....Pages 365-372
Robust Audio Zero-Watermark Based on LWT and Chaotic Modulation....Pages 373-381
A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone Images....Pages 382-394
On the Complexity of Obtaining Optimal Watermarking Schemes....Pages 395-409
A Theoretical Framework for Watermarking of Compressed Signals....Pages 410-422
Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model....Pages 423-439
Multiple Scrambling and Adaptive Synchronization for Audio Watermarking....Pages 440-453
A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality....Pages 454-466
A High Payload VQ Steganographic Method for Binary Images....Pages 467-481
Back Matter....Pages -