The 1st International Workshop on Digital Watermarking (IWDW), the con- rence covering all aspects of digital watermarking, was held at the Hotel Riviera situated along the beautiful Han River in Seoul, Korea from November 21 to 22, 2002. These proceedings contain 21 papers that were accepted for presentation at the conference. These papers were selected from 67 submissions including 3 invited papers. They went through a thorough review process by the Program Committee and were selected on the basis of excellence and novelty. The following is a brief description of the history of this conference and - viewing process: In August 2001 some members of the Special Interest Group on Multimedia Protection (SIGMP) of the Korea Institute of Information Security and Cryptology (KIISC) agreed to create the IWDW. In November 2001 we set up a Program Committee and solicited papers while asking Springer-Verlag to publish the proceedings of the workshop in their Lecture Notes in Computer Science series. In July 2002 we received 64 submissions from 14 countries using Microsoft’s conference management site (http://cmt. research. microsoft. com/ iwdw2002/). Each submission was assigned a number automatically by the c- ference management tool and the paper was sent to the Program Committee members for their review. We also encouraged di?erent sets of experts to join for fair reviews.
Author(s): Pierre Moulin (auth.), Hyoung Joong Kim (eds.)
Series: Lecture Notes in Computer Science 2613
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2003
Language: English
Pages: 272
Tags: Computers and Society; Data Encryption; Multimedia Information Systems; Document Preparation and Text Processing; Image Processing and Computer Vision; Management of Computing and Information Systems
Information-Hiding Games....Pages 1-12
Informed Embedding for Multi-bit Watermarks....Pages 13-21
The Design and Application of DWT-Domain Optimum Decoders....Pages 22-30
Enhanced Watermarking Scheme Based on Removal of Local Means....Pages 31-39
A Multi-user Based Watermarking System with Two-Security-Level Keys....Pages 40-50
A New Blind Watermarking Technique Based on Independent Component Analysis....Pages 51-63
A New Collusion Attack and Its Performance Evaluation....Pages 64-80
A Multistage VQ Based Watermarking Technique with Fake Watermarks....Pages 81-90
BER Formulation for the Blind Retrieval of MPEG Video Watermark....Pages 91-104
Optimal Detection of Transform Domain Additive Watermark by Using Low Density Diversity....Pages 105-112
Implications for Image Watermarking of Recent Work in Image Analysis and Representation....Pages 113-129
On Watermarking Numeric Sets....Pages 130-146
Watermarking Techniques for Electronic Circuit Design....Pages 147-169
A SVD-Based Fragile Watermarking Scheme for Image Authentication....Pages 170-178
A DWT-Based Fragile Watermarking Tolerant of JPEG Compression....Pages 179-188
Robust Local Watermarking on Salient Image Areas....Pages 189-201
Image Normalization Using Invariant Centroid for RST Invariant Digital Image Watermarking....Pages 202-211
An Image Watermarking Algorithm Robust to Geometric Distortion....Pages 212-223
Spatial Frequency Band Division in Human Visual System Based-Watermarking....Pages 224-234
Two-Step Detection Algorithm in a HVS-Based Blind Watermarking of Still Images....Pages 235-248
Content Adaptive Watermark Embedding in the Multiwavelet Transform Using a Stochastic Image Model....Pages 249-263