Digital Watermarking: 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-conference
proceedings of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held in Seoul, Korea, in October 2010.

The 26 revised full papers presented were carefully reviewed and
selected from 48 submissions. The papers are organized in topical
sections on forensics, visual cryptography, robust watermarking,
steganography, fingerprinting, and steganalysis.

Author(s): Yu Qian Zhao, Frank Y. Shih, Yun Q. Shi (auth.), Hyoung-Joong Kim, Yun Qing Shi, Mauro Barni (eds.)
Series: Lecture Notes in Computer Science 6526
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2011

Language: English
Pages: 317
Tags: Data Encryption; Data Structures, Cryptology and Information Theory; Coding and Information Theory; Information Storage and Retrieval; Computer Graphics; Image Processing and Computer Vision

Front Matter....Pages -
Passive Detection of Paint-Doctored JPEG Images....Pages 1-11
Detecting Digital Image Splicing in Chroma Spaces....Pages 12-22
Discriminating Computer Graphics Images and Natural Images Using Hidden Markov Tree Model....Pages 23-28
A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane....Pages 29-44
Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit....Pages 45-59
Plane Transform Visual Cryptography....Pages 60-74
A Statistical Model for Quantized AC Block DCT Coefficients in JPEG Compression and its Application to Detecting Potential Compression History in Bitmap Images....Pages 75-89
A Smart Phone Image Database for Single Image Recapture Detection....Pages 90-104
Detection of Tampering Inconsistencies on Mobile Photos....Pages 105-119
Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise....Pages 120-133
Robust Audio Watermarking by Using Low-Frequency Histogram....Pages 134-147
Robust Blind Watermarking Scheme Using Wave Atoms....Pages 148-158
Robust Watermarking of H.264/SVC-Encoded Video: Quality and Resolution Scalability....Pages 159-169
Reversible Watermarking Using Prediction Error Histogram and Blocking....Pages 170-180
An Efficient Pattern Substitution Watermarking Method for Binary Images....Pages 181-188
New JPEG Steganographic Scheme with High Security Performance....Pages 189-201
Ternary Data Hiding Technique for JPEG Steganography....Pages 202-210
Interleaving Embedding Scheme for ECC-Based Multimedia Fingerprinting....Pages 211-223
A Novel Collusion Attack Strategy for Digital Fingerprinting....Pages 224-238
Privacy Preserving Facial and Fingerprint Multi-biometric Authentication....Pages 239-250
Blind Linguistic Steganalysis against Translation Based Steganography....Pages 251-265
Blind Quantitative Steganalysis Based on Feature Fusion and Gradient Boosting....Pages 266-279
IR Hiding: A Method to Prevent Video Re-shooting by Exploiting Differences between Human Perceptions and Recording Device Characteristics....Pages 280-292
On Limits of Embedding in 3D Images Based on 2D Watson’s Model....Pages 293-304
A Reversible Acoustic Steganography for Integrity Verification....Pages 305-316
Back Matter....Pages -