Digital Watermarking: 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in December 2007.

The 24 revised full papers together with 3 invited papers were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on watermark security; steganalysis; authentication; reversible data hiding; robust watermarking; poster session; theory and methods in watermarking.

Author(s): Bede Liu (auth.), Yun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser (eds.)
Series: Lecture Notes in Computer Science 5041 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2008

Language: English
Pages: 484
Tags: Data Encryption; Data Structures, Cryptology and Information Theory; Coding and Information Theory; Computer Graphics; Computer Imaging, Vision, Pattern Recognition and Graphics; Document Preparation and Text Processing

Front Matter....Pages -
Watermarking, a Mature Technology – Retrospect and Prospect....Pages 1-1
The Marriage of Cryptography and Watermarking — Beneficial and Challenging for Secure Watermarking and Detection....Pages 2-18
Detecting Photographic Composites of People....Pages 19-33
(In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005....Pages 34-44
Attack Analysis for He & Wu’s Joint Watermarking/Fingerprinting Scheme....Pages 45-59
Multiple Watermarking in Visual Cryptography....Pages 60-70
Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding....Pages 71-86
Fusion Based Blind Image Steganalysis by Boosting Feature Selection....Pages 87-98
Steganalysis of Multi Bit Plane Image Steganography....Pages 99-111
Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis....Pages 112-126
Weaknesses of MB2....Pages 127-142
Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis....Pages 143-157
Steganalysis Versus Splicing Detection....Pages 158-172
Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning....Pages 173-187
A General Data Hiding Framework and Multi-level Signature for Binary Images....Pages 188-202
High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents....Pages 203-221
Reversible Quantization-Index Modulation Using Neighboring Correlation....Pages 222-232
High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain....Pages 233-243
Reversible Data Hiding Using Prediction Error Values Embedding....Pages 244-253
An Improved Reversible Difference Expansion Watermarking Algorithm....Pages 254-263
Optimum Histogram Pair Based Image Lossless Data Embedding....Pages 264-278
Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding....Pages 279-293
GA-Based Robustness Evaluation Method for Digital Image Watermarking....Pages 294-307
Dither Modulation in the Logarithmic Domain....Pages 308-322
A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack....Pages 323-334
Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption....Pages 335-349
Design an Aperiodic Stochastic Resonance Signal Processor for Digital Watermarking....Pages 350-364
Watermarking for Authentication of LZ-77 Compressed Documents....Pages 365-372
Robust Audio Zero-Watermark Based on LWT and Chaotic Modulation....Pages 373-381
A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone Images....Pages 382-394
On the Complexity of Obtaining Optimal Watermarking Schemes....Pages 395-409
A Theoretical Framework for Watermarking of Compressed Signals....Pages 410-422
Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model....Pages 423-439
Multiple Scrambling and Adaptive Synchronization for Audio Watermarking....Pages 440-453
A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality....Pages 454-466
A High Payload VQ Steganographic Method for Binary Images....Pages 467-481
Back Matter....Pages -