Digital Watermarking 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings

This book constitutes the refereed proceedings of the 8th Interntaional Workshop, IWDW 2009, held in Guildford, Surrey, UK, August 24-26, 2009. The 25 revised full papers, including 4 poster presentations, presented together with 3 invited papers were carefully reviewed and selected from 50 submissi...

Full description

Bibliographic Details
Other Authors: Ho, Anthony T. S. (Editor), Shi, Yun Q. (Editor), Kim, Hyoung-Joong (Editor), Barni, Mauro (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2009, 2009
Edition:1st ed. 2009
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 04327nmm a2200481 u 4500
001 EB000382907
003 EBX01000000000000000235959
005 00000000000000.0
007 cr|||||||||||||||||||||
008 130626 ||| eng
020 |a 9783642036880 
100 1 |a Ho, Anthony T. S.  |e [editor] 
245 0 0 |a Digital Watermarking  |h Elektronische Ressource  |b 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings  |c edited by Anthony T. S. Ho, Yun Q. Shi, Hyoung-Joong Kim, Mauro Barni 
250 |a 1st ed. 2009 
260 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2009, 2009 
300 |a XIII, 337 p  |b online resource 
505 0 |a Invited Lectures (Abstracts) -- Data Hiding and the Statistics of Images -- The Changing Face of Cryptography -- Forensic Techniques for Image Source Classification: A Comparative Study -- Session I: Robust Watermarking -- Digital Watermarking Schemes Using Multi-resolution Curvelet and HVS Model -- Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques -- Robust AVS Audio Watermarking -- Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG Attacks -- Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks -- Session II: Video Watermarking -- A Robust Watermarking for MPEG-2 -- Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping -- Blind Digital Watermarking of Low Bit-Rate Advanced H.264/AVC Compressed Video -- Session III: Poster Session -- Fast Embedding Technique for Dirty Paper Trellis Watermarking --  
505 0 |a Camera-Model Identification Using Markovian Transition Probability Matrix -- A Survey of Passive Image Tampering Detection -- An Enhanced Statistical Approach to Identifying Photorealistic Images 
505 0 |a A Homomorphic Method for Sharing Secret Images -- Dot-Size Variant Visual Cryptography -- High Capacity Data Hiding in Binary Document Images -- Session IV: Steganography and Steganalysis -- Hiding Information by Context-Based Synonym Substitution -- A Statistical and Iterative Method for Data Hiding in Palette-Based Images -- Estimating the Information Theoretic Optimal Stego Noise -- Multi-class Blind Steganalysis Based on Image Run-Length Analysis -- Session V: Multimedia Watermarking and Security Protocols -- Local Patch Blind Spectral Watermarking Method for 3D Graphics -- Reading Watermarks from Printed Binary Images with a Camera Phone -- A New Approach in Reversible Watermarking -- Classification Framework for Fair Content Tracing Protocols -- Session VI: Image Forensics and Authentication -- Fragile Watermarking Scheme with Extensive Content Restoration Capability -- Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking --  
653 |a Coding and Information Theory 
653 |a Computer graphics 
653 |a Coding theory 
653 |a Computer vision 
653 |a Computer Graphics 
653 |a Cryptography 
653 |a Information Storage and Retrieval 
653 |a Data Structures and Information Theory 
653 |a Computer Vision 
653 |a Information storage and retrieval systems 
653 |a Information theory 
653 |a Data encryption (Computer science) 
653 |a Data structures (Computer science) 
653 |a Cryptology 
700 1 |a Shi, Yun Q.  |e [editor] 
700 1 |a Kim, Hyoung-Joong  |e [editor] 
700 1 |a Barni, Mauro  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Security and Cryptology 
028 5 0 |a 10.1007/978-3-642-03688-0 
856 4 0 |u https://doi.org/10.1007/978-3-642-03688-0?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.824 
520 |a This book constitutes the refereed proceedings of the 8th Interntaional Workshop, IWDW 2009, held in Guildford, Surrey, UK, August 24-26, 2009. The 25 revised full papers, including 4 poster presentations, presented together with 3 invited papers were carefully reviewed and selected from 50 submissions. The papers are organized in topical sections on robust watermarking, video watermarking, steganography and steganalysis, multimedia watermarking and security protocols, as well as image forensics and authentication