This book constitutes the refereed proceedings of the 8th Interntaional Workshop, IWDW 2009, held in Guildford, Surrey, UK, August 24-26, 2009.
The 25 revised full papers, including 4 poster presentations, presented together with 3 invited papers were carefully reviewed and selected from 50 submissions. The papers are organized in topical sections on robust watermarking, video watermarking, steganography and steganalysis, multimedia watermarking and security protocols, as well as image forensics and authentication.
Author(s): Ingemar J. Cox (auth.), Anthony T. S. Ho, Yun Q. Shi, H. J. Kim, Mauro Barni (eds.)
Series: Lecture Notes in Computer Science 5703 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2009
Language: English
Pages: 337
Tags: Data Encryption; Data Structures, Cryptology and Information Theory; Coding and Information Theory; Information Storage and Retrieval; Computer Graphics; Image Processing and Computer Vision
Front Matter....Pages -
Data Hiding and the Statistics of Images....Pages 1-1
The Changing Face of Cryptography....Pages 2-2
Forensic Techniques for Image Source Classification: A Comparative Study....Pages 3-3
Digital Watermarking Schemes Using Multi-resolution Curvelet and HVS Model....Pages 4-13
Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques....Pages 14-28
Robust AVS Audio Watermarking....Pages 29-38
Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG Attacks....Pages 39-53
Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks....Pages 54-68
A Robust Watermarking for MPEG-2....Pages 69-80
Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping....Pages 81-95
Blind Digital Watermarking of Low Bit-Rate Advanced H.264/AVC Compressed Video....Pages 96-109
Fast Embedding Technique for Dirty Paper Trellis Watermarking....Pages 110-120
A Homomorphic Method for Sharing Secret Images....Pages 121-135
Dot-Size Variant Visual Cryptography....Pages 136-148
High Capacity Data Hiding in Binary Document Images....Pages 149-161
Hiding Information by Context-Based Synonym Substitution....Pages 162-169
A Statistical and Iterative Method for Data Hiding in Palette-Based Images....Pages 170-183
Estimating the Information Theoretic Optimal Stego Noise....Pages 184-198
Multi-class Blind Steganalysis Based on Image Run-Length Analysis....Pages 199-210
Local Patch Blind Spectral Watermarking Method for 3D Graphics....Pages 211-226
Reading Watermarks from Printed Binary Images with a Camera Phone....Pages 227-240
A New Approach in Reversible Watermarking....Pages 241-251
Classification Framework for Fair Content Tracing Protocols....Pages 252-267
Fragile Watermarking Scheme with Extensive Content Restoration Capability....Pages 268-278
Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking....Pages 279-293
Camera-Model Identification Using Markovian Transition Probability Matrix....Pages 294-307
A Survey of Passive Image Tampering Detection....Pages 308-322
An Enhanced Statistical Approach to Identifying Photorealistic Images....Pages 323-335
Back Matter....Pages -