LEADER 06626nam 22009735 450 001 9910484691103321 005 20251226202708.0 010 $a3-540-92238-5 024 7 $a10.1007/978-3-540-92238-4 035 $a(CKB)1000000000545799 035 $a(SSID)ssj0000317223 035 $a(PQKBManifestationID)11237302 035 $a(PQKBTitleCode)TC0000317223 035 $a(PQKBWorkID)10287793 035 $a(PQKB)11121564 035 $a(DE-He213)978-3-540-92238-4 035 $a(MiAaPQ)EBC3063877 035 $a(MiAaPQ)EBC6806078 035 $a(Au-PeEL)EBL6806078 035 $a(OCoLC)311507287 035 $a(PPN)132861844 035 $a(EXLCZ)991000000000545799 100 $a20100301d2008 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDigital Watermarking $e6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007, Proceedings /$fedited by Yun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser 205 $a1st ed. 2008. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2008. 215 $a1 online resource (XII, 484 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5041 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-92237-7 320 $aIncludes bibliographical references and index. 327 $aInvited Lecture -- Watermarking, a Mature Technology ? Retrospect and Prospect -- The Marriage of Cryptography and Watermarking ? Beneficial and Challenging for Secure Watermarking and Detection -- Detecting Photographic Composites of People -- Session I: Watermark Security -- (In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005 -- Attack Analysis for He & Wu?s Joint Watermarking/Fingerprinting Scheme -- Multiple Watermarking in Visual Cryptography -- Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding -- Session II: Steganalysis -- Fusion Based Blind Image Steganalysis by Boosting Feature Selection -- Steganalysis of Multi Bit Plane Image Steganography -- Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis -- Weaknesses of MB2 -- Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis -- Steganalysis Versus Splicing Detection -- Session III: Authentication -- Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning -- A General Data Hiding Framework and Multi-level Signature for Binary Images -- High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents -- Session IV: Reversible Data Hiding -- Reversible Quantization-Index Modulation Using Neighboring Correlation -- High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain -- Reversible Data Hiding Using Prediction Error Values Embedding -- An Improved Reversible Difference Expansion Watermarking Algorithm -- Optimum Histogram Pair Based Image Lossless Data Embedding -- Session V: Robust Watermarking -- Multiple Domain Watermarking for Print-Scanand JPEG Resilient Data Hiding -- GA-Based Robustness Evaluation Method for Digital Image Watermarking -- Dither Modulation in the Logarithmic Domain -- Session VI: Poster Session -- A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack -- Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption -- Design an Aperiodic Stochastic Resonance Signal Processor for Digital Watermarking -- Watermarking for Authentication of LZ-77 Compressed Documents -- Robust Audio Zero-Watermark Based on LWT and Chaotic Modulation -- A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone Images -- Session VII: Theory and Methods in Watermarking -- On the Complexity of Obtaining Optimal Watermarking Schemes -- A Theoretical Framework for Watermarking of Compressed Signals -- Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model -- Multiple Scrambling and Adaptive Synchronization for Audio Watermarking -- A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality -- A High Payload VQ Steganographic Method for Binary Images. 330 $aThis book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in December 2007. The 24 revised full papers together with 3 invited papers were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on watermark security; steganalysis; authentication; reversible data hiding; robust watermarking; poster session; theory and methods in watermarking. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5041 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer programming 606 $aData structures (Computer science) 606 $aInformation theory 606 $aCoding theory 606 $aComputer graphics 606 $aImage processing$xDigital techniques 606 $aComputer vision 606 $aCryptology 606 $aProgramming Techniques 606 $aData Structures and Information Theory 606 $aCoding and Information Theory 606 $aComputer Graphics 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer programming. 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 0$aCoding theory. 615 0$aComputer graphics. 615 0$aImage processing$xDigital techniques. 615 0$aComputer vision. 615 14$aCryptology. 615 24$aProgramming Techniques. 615 24$aData Structures and Information Theory. 615 24$aCoding and Information Theory. 615 24$aComputer Graphics. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 676 $a005.82 686 $aDAT 050f$2stub 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 702 $aShi$b Yun Q. 702 $aKim$b Hyoung Joong$f1954- 702 $aKatzenbeisser$b Stefan 712 12$aIWDW 2007 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484691103321 996 $aDigital Watermarking$9772245 997 $aUNINA