LEADER 06489nam 22008415 450 001 996465769403316 005 20240106002204.0 010 $a3-540-36617-2 024 7 $a10.1007/3-540-36617-2 035 $a(CKB)1000000000211944 035 $a(SSID)ssj0000322632 035 $a(PQKBManifestationID)11937871 035 $a(PQKBTitleCode)TC0000322632 035 $a(PQKBWorkID)10290257 035 $a(PQKB)10111961 035 $a(DE-He213)978-3-540-36617-1 035 $a(MiAaPQ)EBC3072645 035 $a(PPN)155230107 035 $a(EXLCZ)991000000000211944 100 $a20121227d2003 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDigital Watermarking$b[electronic resource] $eFirst International Workshop, IWDW 2002, Seoul, Korea, November 21-22, 2002, Revised Papers /$fedited by Fabien Petitcolas, Hyoung Joong Kim 205 $a1st ed. 2003. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2003. 215 $a1 online resource (XII, 272 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v2613 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-01217-6 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aInvited Talks -- Information-Hiding Games -- Informed Embedding for Multi-bit Watermarks -- Fundamentals I -- The Design and Application of DWT-Domain Optimum Decoders -- Enhanced Watermarking Scheme Based on Removal of Local Means -- New Algorithms -- A Multi-user Based Watermarking System with Two-Security-Level Keys -- A New Blind Watermarking Technique Based on Independent Component Analysis -- A New Collusion Attack and Its Performance Evaluation -- A Multistage VQ Based Watermarking Technique with Fake Watermarks -- Fundamentals II -- BER Formulation for the Blind Retrieval of MPEG Video Watermark -- Optimal Detection of Transform Domain Additive Watermark by Using Low Density Diversity -- Watermarking Unusual Content -- Implications for Image Watermarking of Recent Work in Image Analysis and Representation -- On Watermarking Numeric Sets -- Watermarking Techniques for Electronic Circuit Design -- Fragile Watermarking -- A SVD-Based Fragile Watermarking Scheme for Image Authentication -- A DWT-Based Fragile Watermarking Tolerant of JPEG Compression -- Robust Watermarking -- Robust Local Watermarking on Salient Image Areas -- Image Normalization Using Invariant Centroid for RST Invariant Digital Image Watermarking -- An Image Watermarking Algorithm Robust to Geometric Distortion -- Adaptive Watermarking -- Spatial Frequency Band Division in Human Visual System Based-Watermarking -- Two-Step Detection Algorithm in a HVS-Based Blind Watermarking of Still Images -- Content Adaptive Watermark Embedding in the Multiwavelet Transform Using a Stochastic Image Model. 330 $aThe 1st International Workshop on Digital Watermarking (IWDW), the conference covering all aspects of digital watermarking, was held at the Hotel Riviera situated along the beautiful Han River in Seoul, Korea from November 21 to 22, 2002. These proceedings contain 21 papers that were accepted for presentation at the conference. These papers were selected from 67 submissions including 3 invited papers. They went through a thorough review process by the Program Committee and were selected on the basis of excellence and novelty. The following is a brief description of the history of this conference and - viewing process: In August 2001 some members of the Special Interest Group on Multimedia Protection (SIGMP) of the Korea Institute of Information Security and Cryptology (KIISC) agreed to create the IWDW. In November 2001 we set up a Program Committee and solicited papers while asking Springer-Verlag to publish the proceedings of the workshop in their Lecture Notes in Computer Science series. In July 2002 we received 64 submissions from 14 countries using Microsoft?s conference management site (http://cmt. research. microsoft. com/ iwdw2002/). Each submission was assigned a number automatically by the conference management tool and the paper was sent to the Program Committee members for their review. We also encouraged different sets of experts to join for fair reviews. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v2613 606 $aData encryption (Computer science) 606 $aComputers and civilization 606 $aMultimedia information systems 606 $aNatural language processing (Computer science) 606 $aOptical data processing 606 $aManagement information systems 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aMultimedia Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I18059 606 $aNatural Language Processing (NLP)$3https://scigraph.springernature.com/ontologies/product-market-codes/I21040 606 $aImage Processing and Computer Vision$3https://scigraph.springernature.com/ontologies/product-market-codes/I22021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science). 615 0$aComputers and civilization. 615 0$aMultimedia information systems. 615 0$aNatural language processing (Computer science). 615 0$aOptical data processing. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aCryptology. 615 24$aComputers and Society. 615 24$aMultimedia Information Systems. 615 24$aNatural Language Processing (NLP). 615 24$aImage Processing and Computer Vision. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aPetitcolas$b Fabien$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKim$b Hyoung Joong$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aIWDW 2002 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465769403316 996 $aDigital Watermarking$9772245 997 $aUNISA