Digital Watermarking: 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008. Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Digital Watermarking, IWDW 2008, held in Busan, Korea, in November 2008.

The 36 regular papers included in the volume were carefully reviewed and selected from 62 submissions. Areas of interest to the conference are mathematical modeling of embedding and detection; information theoretic, stochastic aspects of data hiding; security issues, including attacks and counter-attacks; combination of data hiding and cryptography; optimum watermark detection and reliable recovery; estimation of watermark capacity; channel coding techniques for watermarking; large-scale experimental tests and benchmarking; new statistical and perceptual models of content; reversible data hiding; data hiding in special media; data hiding and authentication; steganography and steganalysis; data forensics; copyright protection, DRM, and forensic watermarking; and visual cryptography.

Author(s): Jian Li, Hongmei Liu, Jiwu Huang, Yongping Zhang (auth.), Hyoung-Joong Kim, Stefan Katzenbeisser, Anthony T. S. Ho (eds.)
Series: Lecture Notes in Computer Science 5450 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2009

Language: English
Pages: 472
Tags: Data Encryption; Data Structures, Cryptology and Information Theory; Coding and Information Theory; Discrete Mathematics in Computer Science; Computer Graphics; Image Processing and Computer Vision

Front Matter....Pages -
A Robust Watermarking Scheme for H.264....Pages 1-15
Detection of Double MPEG Compression Based on First Digit Statistics....Pages 16-30
A Time Series Intra-Video Collusion Attack on Frame-by-Frame Video Watermarking....Pages 31-44
A Novel Real-Time MPEG-2 Video Watermarking Scheme in Copyright Protection....Pages 45-51
Reversible Data Hiding Based On H.264/AVC Intra Prediction....Pages 52-60
Scalability Evaluation of Blind Spread-Spectrum Image Watermarking....Pages 61-75
Run-Length and Edge Statistics Based Approach for Image Splicing Detection....Pages 76-87
Scale-Space Feature Based Image Watermarking in Contourlet Domain....Pages 88-102
A Practical Print-and-Scan Resilient Watermarking for High Resolution Images....Pages 103-112
Adaptive SVD-Based Digital Image Watermarking....Pages 113-123
Robust Audio Watermarking Based on Log-Polar Frequency Index....Pages 124-138
Adaptive Threshold Based Robust Watermark Detection Method....Pages 139-151
A Digital Forgery Image Detection Algorithm Based on Wavelet Homomorphic Filtering....Pages 152-160
Blind Detection of Digital Forgery Image Based on the Local Entropy of the Gradient....Pages 161-169
Exposure Time Change Attack on Image Watermarking Systems....Pages 170-183
Steganalysis Based on Difference Image....Pages 184-198
A Novel Steganographic Algorithm Resisting Targeted Steganalytic Attacks on LSB Matching....Pages 199-208
A Novel Approach for JPEG Steganography....Pages 209-217
A High Capacity Steganographic Algorithm in Color Images....Pages 218-228
A Novel Method for Block Size Forensics Based on Morphological Operations....Pages 229-239
Non-malleable Schemes Resisting Adaptive Adversaries....Pages 240-253
An Algorithm for Modeling Print and Scan Operations Used for Watermarking....Pages 254-265
Space Time Block Coding for Spread Spectrum Watermarking Systems....Pages 266-277
Formal Analysis of Two Buyer-Seller Watermarking Protocols....Pages 278-292
Detection of Hidden Information in Webpage Based on Higher-Order Statistics....Pages 293-302
Secret Sharing Based Video Watermark Algorithm for Multiuser....Pages 303-312
GSM Based Security Analysis for Add-SS Watermarking....Pages 313-326
Video Watermarking Based on Spatio-temporal JND Profile....Pages 327-341
On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography....Pages 342-349
Balanced Multiwavelets Based Digital Image Watermarking....Pages 350-362
A Generalised Model for Distortion Performance Analysis of Wavelet Based Watermarking....Pages 363-378
Multiple Watermarking with Side Information....Pages 379-387
Content Sharing Based on Personal Information in Virtually Secured Space....Pages 388-400
Evaluation and Improvement of Digital Watermarking Algorithm Based on Cryptographic Security Models....Pages 401-418
A Color Image Watermarking Scheme in the Associated Domain of DWT and DCT Domains Based on Multi-channel Watermarking Framework....Pages 419-432
An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption....Pages 433-447
First Digit Law and Its Application to Digital Forensics....Pages 448-453
Digital Camera Identification from Images – Estimating False Acceptance Probability....Pages 454-468
Design of Collusion-Resistant Fingerprinting Systems: Review and New Results....Pages 469-469
Back Matter....Pages -