Digital Watermarking 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings

This book constitutes the refereed proceedings of the 8th Interntaional Workshop, IWDW 2009, held in Guildford, Surrey, UK, August 24-26, 2009. The 25 revised full papers, including 4 poster presentations, presented together with 3 invited papers were carefully reviewed and selected from 50 submissi...

Full description

Bibliographic Details
Other Authors: Ho, Anthony T. S. (Editor), Shi, Yun Q. (Editor), Kim, Hyoung-Joong (Editor), Barni, Mauro (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2009, 2009
Edition:1st ed. 2009
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Invited Lectures (Abstracts)
  • Data Hiding and the Statistics of Images
  • The Changing Face of Cryptography
  • Forensic Techniques for Image Source Classification: A Comparative Study
  • Session I: Robust Watermarking
  • Digital Watermarking Schemes Using Multi-resolution Curvelet and HVS Model
  • Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques
  • Robust AVS Audio Watermarking
  • Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG Attacks
  • Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks
  • Session II: Video Watermarking
  • A Robust Watermarking for MPEG-2
  • Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping
  • Blind Digital Watermarking of Low Bit-Rate Advanced H.264/AVC Compressed Video
  • Session III: Poster Session
  • Fast Embedding Technique for Dirty Paper Trellis Watermarking
  • Camera-Model Identification Using Markovian Transition Probability Matrix
  • A Survey of Passive Image Tampering Detection
  • An Enhanced Statistical Approach to Identifying Photorealistic Images
  • A Homomorphic Method for Sharing Secret Images
  • Dot-Size Variant Visual Cryptography
  • High Capacity Data Hiding in Binary Document Images
  • Session IV: Steganography and Steganalysis
  • Hiding Information by Context-Based Synonym Substitution
  • A Statistical and Iterative Method for Data Hiding in Palette-Based Images
  • Estimating the Information Theoretic Optimal Stego Noise
  • Multi-class Blind Steganalysis Based on Image Run-Length Analysis
  • Session V: Multimedia Watermarking and Security Protocols
  • Local Patch Blind Spectral Watermarking Method for 3D Graphics
  • Reading Watermarks from Printed Binary Images with a Camera Phone
  • A New Approach in Reversible Watermarking
  • Classification Framework for Fair Content Tracing Protocols
  • Session VI: Image Forensics and Authentication
  • Fragile Watermarking Scheme with Extensive Content Restoration Capability
  • Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking