We are happy to present to you the proceedings of the 2nd International Workshop on Digital Watermarking, IWDW 2003. Since its modern re-appearance in the academic community in the early 1990s, great progress has been made in understanding both the capabilities and the weaknesses of digital watermarking. On the theoretical side, we all are now well aware of the fact that digital waterma- ing is best viewed as a form of communication using side information. In the case of digital watermarking the side information in question is the document to be wat- marked. This insight has led to a better understanding of the limits of the capacity and robustness of digital watermarking algorithms. It has also led to new and improved watermarking algorithms, both in terms of capacity and imperceptibility. Similarly, the role of human perception, and models thereof, has been greatly enhanced in the study and design of digital watermarking algorithms and systems. On the practical side, applications of watermarking are not yet abundant. The original euphoria on the role of digital watermarking in copy protection and copyright prot- tion has not resulted in widespread usage in practical systems. With hindsight, a n- ber of reasons can be given for this lack of practical applications.
Author(s): Fernando Pérez-González (auth.), Ton Kalker, Ingemar Cox, Yong Man Ro (eds.)
Series: Lecture Notes in Computer Science 2939
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2004
Language: English
Pages: 604
Tags: Computers and Society; Operating Systems; Data Encryption; Algorithm Analysis and Problem Complexity; Multimedia Information Systems; Management of Computing and Information Systems
Front Matter....Pages -
The Importance of Aliasing in Structured Quantization Index Modulation Data Hiding....Pages 1-17
Watermark Embedding for Black-Box Channels....Pages 18-34
Image Steganography and Steganalysis: Concepts and Practice....Pages 35-49
On the Integration of Watermarks and Cryptography....Pages 50-60
Content-Dependent Anti-disclosure Image Watermark....Pages 61-76
Performance Measurement of Watermark Embedding Patterns....Pages 77-85
Image Fusion Based Visible Watermarking Using Dual-Tree Complex Wavelet Transform....Pages 86-100
Optimal Data-Hiding Strategies for Games with BER Payoffs....Pages 101-116
Robust Wavelet-Based Information Hiding through Low-Density Parity-Check (LDPC) Codes....Pages 117-128
Natural Language Watermarking Using Semantic Substitution for Chinese Text....Pages 129-140
Resilient Information Hiding for Abstract Semi-structures....Pages 141-153
Model-Based Steganography....Pages 154-167
Authentication of 3-D Polygonal Meshes....Pages 168-183
Use of Motion Estimation to Improve Video Watermarking for MPEG Encoders....Pages 184-199
A Robust Printed Image Watermarking Based on Iterative Halftoning Method....Pages 200-211
A Feature-Watermarking Scheme for JPEG Image Authentication....Pages 212-222
An Intelligent Watermark Detection Decoder Based on Independent Component Analysis....Pages 223-234
Coefficient Selection Methods for Scalable Spread Spectrum Watermarking....Pages 235-246
Performance Analysis of Order Statistical Patchwork....Pages 247-262
Rotation-Tolerant Watermark Detection Using Circular Harmonic Function Correlation Filter....Pages 263-276
On Perceptual Quality of Watermarked Images – An Experimental Approach....Pages 277-288
Audio Watermarking Based on Music Content Analysis: Robust against Time Scale Modification....Pages 289-300
Multi-bit Video Watermarking Based on 3D DFT Using Perceptual Models....Pages 301-315
EM Estimation of Scale Factor for Quantization-Based Audio Watermarking....Pages 316-327
Semi-fragile Watermarking for Tamper Proofing and Authentication of Still Images....Pages 328-339
Secure Video Watermarking via Embedding Strength Modulation....Pages 340-354
On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving....Pages 355-369
RST-Resistant Image Watermarking Using Invariant Centroid and Reordered Fourier-Mellin Transform....Pages 370-381
Robust Audio Watermarking Using Both DWT and Masking Effect....Pages 382-389
Normalization Domain Watermarking Method Based on Pattern Extraction....Pages 390-395
Robust Watermarking with Adaptive Receiving....Pages 396-407
A Robust Logo Multiresolution Watermarking Based on Independent Component Analysis Extraction....Pages 408-422
Highly Reliable Stochastic Perceptual Watermarking Model Based on Multiwavelet Transform....Pages 423-434
Metadata Hiding for Content Adaptation....Pages 435-446
Echo Watermarking in Sub-band Domain....Pages 447-455
Modification of Polar Echo Kernel for Performance Improvement of Audio Watermarking....Pages 456-466
Increasing Robustness of an Improved Spread Spectrum Audio Watermarking Method Using Attack Characterization....Pages 467-473
Enhancement Methods of Image Quality in Screen Mark Attack....Pages 474-482
A Method to Improve the Stego-Image Quality for Palette-Based Image Steganography....Pages 483-496
A Secure Steganographic Scheme against Statistical Analyses....Pages 497-507
A Three-Dimensional Watermarking Algorithm Using the DCT Transform of Triangle Strips....Pages 508-517
High Quality Perceptual Steganographic Techniques....Pages 518-531
A Watermarking Scheme Applicable for Fingerprinting Protocol....Pages 532-543
A New Digital Watermarking for Architectural Design Drawing Using LINEs and ARCs Based on Vertex....Pages 544-557
Public Watermark Detection Using Multiple Proxies and Secret Sharing....Pages 558-569
Towards Generic Detection Scheme in Zero Knowledge Protocol for Blind Watermark Detection....Pages 570-580
Lossless Watermarking Considering the Human Visual System....Pages 581-592
Data-Hiding Capacity Improvement for Text Watermarking Using Space Coding Method....Pages 593-599
Back Matter....Pages -