Digital Watermarking 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings
This book constitutes the refereed proceedings of the 8th Interntaional Workshop, IWDW 2009, held in Guildford, Surrey, UK, August 24-26, 2009. The 25 revised full papers, including 4 poster presentations, presented together with 3 invited papers were carefully reviewed and selected from 50 submissi...
Other Authors: | , , , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2009, 2009
|
Edition: | 1st ed. 2009 |
Series: | Security and Cryptology
|
Subjects: | |
Online Access: | |
Collection: | Springer eBooks 2005- - Collection details see MPG.ReNa |
Table of Contents:
- Invited Lectures (Abstracts)
- Data Hiding and the Statistics of Images
- The Changing Face of Cryptography
- Forensic Techniques for Image Source Classification: A Comparative Study
- Session I: Robust Watermarking
- Digital Watermarking Schemes Using Multi-resolution Curvelet and HVS Model
- Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques
- Robust AVS Audio Watermarking
- Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG Attacks
- Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks
- Session II: Video Watermarking
- A Robust Watermarking for MPEG-2
- Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping
- Blind Digital Watermarking of Low Bit-Rate Advanced H.264/AVC Compressed Video
- Session III: Poster Session
- Fast Embedding Technique for Dirty Paper Trellis Watermarking
- Camera-Model Identification Using Markovian Transition Probability Matrix
- A Survey of Passive Image Tampering Detection
- An Enhanced Statistical Approach to Identifying Photorealistic Images
- A Homomorphic Method for Sharing Secret Images
- Dot-Size Variant Visual Cryptography
- High Capacity Data Hiding in Binary Document Images
- Session IV: Steganography and Steganalysis
- Hiding Information by Context-Based Synonym Substitution
- A Statistical and Iterative Method for Data Hiding in Palette-Based Images
- Estimating the Information Theoretic Optimal Stego Noise
- Multi-class Blind Steganalysis Based on Image Run-Length Analysis
- Session V: Multimedia Watermarking and Security Protocols
- Local Patch Blind Spectral Watermarking Method for 3D Graphics
- Reading Watermarks from Printed Binary Images with a Camera Phone
- A New Approach in Reversible Watermarking
- Classification Framework for Fair Content Tracing Protocols
- Session VI: Image Forensics and Authentication
- Fragile Watermarking Scheme with Extensive Content Restoration Capability
- Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking