LEADER 05406nam 2200649 450 001 9910484691103321 005 20220814174019.0 010 $a3-540-92238-5 024 7 $a10.1007/978-3-540-92238-4 035 $a(CKB)1000000000545799 035 $a(SSID)ssj0000317223 035 $a(PQKBManifestationID)11237302 035 $a(PQKBTitleCode)TC0000317223 035 $a(PQKBWorkID)10287793 035 $a(PQKB)11121564 035 $a(DE-He213)978-3-540-92238-4 035 $a(MiAaPQ)EBC3063877 035 $a(MiAaPQ)EBC6806078 035 $a(Au-PeEL)EBL6806078 035 $a(OCoLC)311507287 035 $a(PPN)132861844 035 $a(EXLCZ)991000000000545799 100 $a20220814d2008 uy 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aDigital watermarking $e6th international workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007 : proceedings /$fedited by Yun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser 205 $a1st ed. 2008. 210 1$aBerlin, Germany :$cSpringer,$d[2008] 210 4$dİ2008 215 $a1 online resource (XII, 484 p.) 225 1 $aSecurity and Cryptology ;$v5041 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-92237-7 320 $aIncludes bibliographical references and index. 327 $aInvited Lecture -- Watermarking, a Mature Technology ? Retrospect and Prospect -- The Marriage of Cryptography and Watermarking ? Beneficial and Challenging for Secure Watermarking and Detection -- Detecting Photographic Composites of People -- Session I: Watermark Security -- (In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005 -- Attack Analysis for He & Wu?s Joint Watermarking/Fingerprinting Scheme -- Multiple Watermarking in Visual Cryptography -- Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding -- Session II: Steganalysis -- Fusion Based Blind Image Steganalysis by Boosting Feature Selection -- Steganalysis of Multi Bit Plane Image Steganography -- Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis -- Weaknesses of MB2 -- Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis -- Steganalysis Versus Splicing Detection -- Session III: Authentication -- Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning -- A General Data Hiding Framework and Multi-level Signature for Binary Images -- High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents -- Session IV: Reversible Data Hiding -- Reversible Quantization-Index Modulation Using Neighboring Correlation -- High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain -- Reversible Data Hiding Using Prediction Error Values Embedding -- An Improved Reversible Difference Expansion Watermarking Algorithm -- Optimum Histogram Pair Based Image Lossless Data Embedding -- Session V: Robust Watermarking -- Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding -- GA-Based Robustness Evaluation Method for Digital Image Watermarking -- Dither Modulation in the Logarithmic Domain -- Session VI: Poster Session -- A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack -- Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption -- Design an Aperiodic Stochastic Resonance Signal Processor for Digital Watermarking -- Watermarking for Authentication of LZ-77 Compressed Documents -- Robust Audio Zero-Watermark Based on LWT and Chaotic Modulation -- A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone Images -- Session VII: Theory and Methods in Watermarking -- On the Complexity of Obtaining Optimal Watermarking Schemes -- A Theoretical Framework for Watermarking of Compressed Signals -- Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model -- Multiple Scrambling and Adaptive Synchronization for Audio Watermarking -- A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality -- A High Payload VQ Steganographic Method for Binary Images. 330 $aThis book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in December 2007. The 24 revised full papers together with 3 invited papers were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on watermark security; steganalysis; authentication; reversible data hiding; robust watermarking; poster session; theory and methods in watermarking. 410 0$aSecurity and Cryptology ;$v5041 606 $aDigital watermarking$vCongresses 615 0$aDigital watermarking 676 $a005.82 686 $aDAT 050f$2stub 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 702 $aShi$b Yun Q. 702 $aKim$b Hyoung Joong$f1954- 702 $aKatzenbeisser$b Stefan 712 12$aIWDW 2007 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484691103321 996 $aDigital Watermarking$9772245 997 $aUNINA