LEADER 06266nam 22008895 450 001 996465561103316 005 20200702225753.0 010 $a3-642-03688-0 024 7 $a10.1007/978-3-642-03688-0 035 $a(CKB)1000000000772865 035 $a(SSID)ssj0000317224 035 $a(PQKBManifestationID)11237066 035 $a(PQKBTitleCode)TC0000317224 035 $a(PQKBWorkID)10287400 035 $a(PQKB)10762626 035 $a(DE-He213)978-3-642-03688-0 035 $a(MiAaPQ)EBC3064453 035 $a(PPN)139951032 035 $a(EXLCZ)991000000000772865 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDigital Watermarking$b[electronic resource] $e8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings /$fedited by Anthony T. S. Ho, Yun Q. Shi, Hyoung-Joong Kim, Mauro Barni 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XIII, 337 p.) 225 1 $aSecurity and Cryptology ;$v5703 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-03687-2 320 $aIncludes bibliographical references and index. 327 $aInvited Lectures (Abstracts) -- Data Hiding and the Statistics of Images -- The Changing Face of Cryptography -- Forensic Techniques for Image Source Classification: A Comparative Study -- Session I: Robust Watermarking -- Digital Watermarking Schemes Using Multi-resolution Curvelet and HVS Model -- Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques -- Robust AVS Audio Watermarking -- Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG Attacks -- Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks -- Session II: Video Watermarking -- A Robust Watermarking for MPEG-2 -- Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping -- Blind Digital Watermarking of Low Bit-Rate Advanced H.264/AVC Compressed Video -- Session III: Poster Session -- Fast Embedding Technique for Dirty Paper Trellis Watermarking -- A Homomorphic Method for Sharing Secret Images -- Dot-Size Variant Visual Cryptography -- High Capacity Data Hiding in Binary Document Images -- Session IV: Steganography and Steganalysis -- Hiding Information by Context-Based Synonym Substitution -- A Statistical and Iterative Method for Data Hiding in Palette-Based Images -- Estimating the Information Theoretic Optimal Stego Noise -- Multi-class Blind Steganalysis Based on Image Run-Length Analysis -- Session V: Multimedia Watermarking and Security Protocols -- Local Patch Blind Spectral Watermarking Method for 3D Graphics -- Reading Watermarks from Printed Binary Images with a Camera Phone -- A New Approach in Reversible Watermarking -- Classification Framework for Fair Content Tracing Protocols -- Session VI: Image Forensics and Authentication -- Fragile Watermarking Scheme with Extensive Content Restoration Capability -- Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking -- Camera-Model Identification Using Markovian Transition Probability Matrix -- A Survey of Passive Image Tampering Detection -- An Enhanced Statistical Approach to Identifying Photorealistic Images. 330 $aThis book constitutes the refereed proceedings of the 8th Interntaional Workshop, IWDW 2009, held in Guildford, Surrey, UK, August 24-26, 2009. The 25 revised full papers, including 4 poster presentations, presented together with 3 invited papers were carefully reviewed and selected from 50 submissions. The papers are organized in topical sections on robust watermarking, video watermarking, steganography and steganalysis, multimedia watermarking and security protocols, as well as image forensics and authentication. 410 0$aSecurity and Cryptology ;$v5703 606 $aData encryption (Computer science) 606 $aData structures (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aInformation storage and retrieval 606 $aComputer graphics 606 $aOptical data processing 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 606 $aComputer Graphics$3https://scigraph.springernature.com/ontologies/product-market-codes/I22013 606 $aImage Processing and Computer Vision$3https://scigraph.springernature.com/ontologies/product-market-codes/I22021 608 $aGuildford (2009)$2swd 608 $aKongress.$2swd 615 0$aData encryption (Computer science). 615 0$aData structures (Computer science). 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aInformation storage and retrieval. 615 0$aComputer graphics. 615 0$aOptical data processing. 615 14$aCryptology. 615 24$aData Structures and Information Theory. 615 24$aCoding and Information Theory. 615 24$aInformation Storage and Retrieval. 615 24$aComputer Graphics. 615 24$aImage Processing and Computer Vision. 676 $a005.8 686 $aDAT 050f$2stub 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 702 $aHo$b Anthony T. S$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aShi$b Yun Q$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKim$b Hyoung-Joong$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBarni$b Mauro$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aIWDW 2009 906 $aBOOK 912 $a996465561103316 996 $aDigital Watermarking$9772245 997 $aUNISA