top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Digital watermarking : third international workshop, IWDW 2004, Seoul, Korea, October 30 - November 1, 2004 : revised selected papers / / Ingemar J. Cox, Ton Kalker, Heung-Kyu Lee (eds.)
Digital watermarking : third international workshop, IWDW 2004, Seoul, Korea, October 30 - November 1, 2004 : revised selected papers / / Ingemar J. Cox, Ton Kalker, Heung-Kyu Lee (eds.)
Edizione [1st ed.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, 2005
Descrizione fisica 1 online resource (IX, 306 p.)
Disciplina 005.8
Altri autori (Persone) CoxI. J (Ingemar J.)
KalkerTon
LeeHeung-Kyu
Collana Lecture notes in computer science
Soggetto topico Computer security
Data protection
Digital watermarking
ISBN 3-540-31805-4
3-540-24839-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Lecture -- Reversible Data Hiding -- Fingerprinting Curves -- Informed Detection Revisited -- Session I: Systems -- A Counter-Geometric Distortions Data Hiding Scheme Using Double Channels in Color Images -- A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition -- Better Use of Human Visual Model in Watermarking Based on Linear Prediction Synthesis Filter -- Watermarking System for QoS Aware Content Adaptation -- Session II: Theory -- Weighted Segmented Digital Watermarking -- Robust Estimation of Amplitude Modification for Scalar Costa Scheme Based Audio Watermark Detection -- Reversible Data Hiding Using Integer Wavelet Transform and Companding Technique -- Session III: Authentication and Stego -- Alteration-Locating Authentication Watermarking for Binary Images -- On Security Notions of Steganographic Systems -- A Multi-feature Based Invertible Authentication Watermarking for JPEG Images -- Steganographic Scheme Using a Block Cipher -- Watermarking Attack: Security of WSS Techniques -- Session IV: Cryptography -- Flaws in Generic Watermarking Protocols Based on Zero-Knowledge Proofs -- Cryptanalysis of a Wavelet Based Watermarking Scheme -- A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems -- Towards the Public but Noninvertible Watermarking -- A Generalization of an Anonymous Buyer-Seller Watermarking Protocol and Its Application to Mobile Communications -- Session V: Methods -- Robust Frequency Domain Audio Watermarking: A Tuning Analysis -- Watermarking Technique for Authentication of 3-D Polygonal Meshes -- Fidelity-Controlled Robustness Enhancement of Blind Watermarking Schemes Using Evolutionary Computational Techniques -- Robust Watermarking on Polygonal Meshes Using Distribution of Vertex Norms -- A Video Watermarking Using the 3-D Wavelet Transform and Two Perceptual Watermarks.
Record Nr. UNINA-9910483198003321
Berlin ; ; New York, : Springer, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital watermarking and steganography [[electronic resource] /] / Ingemar J. Cox ... [et al.]
Digital watermarking and steganography [[electronic resource] /] / Ingemar J. Cox ... [et al.]
Edizione [2nd ed.]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Morgan Kaufmann Publishers, c2008
Descrizione fisica 1 online resource (623 p.)
Disciplina 005.8
Altri autori (Persone) CoxI. J (Ingemar J.)
Collana The Morgan Kaufmann series in multimedia information and systems
The Morgan kaufmann series in computer security
Soggetto topico Computer security
Digital watermarking
Data protection
Soggetto genere / forma Electronic books.
ISBN 1-281-09616-4
9786611096168
0-08-055580-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Digital Watermarking and Steganography; Copyright Page; Table of Contents; Preface to the First Edition; Preface to the Second Edition; Example Watermarking Systems; Chapter 1. Introduction; 1.1 Information Hiding, Steganography, and Watermarking; 1.2 History of Watermarking; 1.3 History of Steganography; 1.4 Importance of Digital Watermarking; 1.5 Importance of Steganography; Chapter 2. Applications and Properties; 2.1 Applications of Watermarking; 2.2 Applications of Steganography; 2.3 Properties of Watermarking Systems; 2.4 Evaluating Watermarking Systems
2.5 Properties of Steganographic and Steganalysis Systems2.6 Evaluating and Testing Steganographic Systems; 2.7 Summary; Chapter 3. Models of Watermarking; 3.1 Notation; 3.2 Communications; 3.3 Communication-Based Models of Watermarking; 3.4 Geometric Models of Watermarking; 3.5 Modeling Watermark Detection by Correlation; 3.6 Summary; Chapter 4. Basic Message Coding; 4.1 Mapping Messages into Message Vectors; 4.2 Error Correction Coding; 4.3 Detecting Multisymbol Watermarks; 4.4 Summary; Chapter 5. Watermarking with Side Information; 5.1 Informed Embedding
5.2 Watermarking Using Side Information5.3 Dirty-Paper Codes; 5.4 Summary; Chapter 6. Practical Dirty-Paper Codes; 6.1 Practical Considerations for Dirty-Paper Codes; 6.2 Broad Approaches to Dirty-Paper Code Design; 6.3 Implementing DM with A Simple Lattice Code; 6.4 Typical Tricks in Implementing Lattice Codes; 6.5 Coding with Better Lattices; 6.6 Making Lattice Codes Survive Valumetric Scaling; 6.7 Dirty-Paper Trellis Codes; 6.8 Summary; Chapter 7. Analyzing Errors; 7.1 Message Errors; 7.2 False Positive Errors; 7.3 False Negative Errors; 7.4 ROC Curves
7.5 The Effect of Whitening on Error Rates7.6 Analysis of Normalized Correlation; 7.7 Summary; Chapter 8. Using Perceptual Models; 8.1 Evaluating Perceptual Impact of Watermarks; 8.2 General Form of A Perceptual Model; 8.3 Two Examples of Perceptual Models; 8.4 Perceptually Adaptive Watermarking; 8.5 Summary; Chapter 9. Robust Watermarking; 9.1 Approaches; 9.2 Robustness to Valumetric Distortions; 9.3 Robustness to Temporal and Geometric Distortions; 9.4 Summary; Chapter 10. Watermark Security; 10.1 Security Requirements; 10.2 Watermark Security and Cryptography
10.3 Some Significant Known Attacks10.4 Summary; Chapter 11. Content Authentication; 11.1 Exact Authentication; 11.2 Selective Authentication; 11.3 Localization; 11.4 Restoration; 11.5 Summary; Chapter 12. Steganography; 12.1 Steganographic Communication; 12.2 Notation and Terminology; 12.3 Information-Theoretic Foundations of Steganography; 12.4 Practical Steganographic Methods; 12.5 Minimizing the Embedding Impact; 12.6 Summary; Chapter 13. Steganalysis; 13.1 Steganalysis Scenarios; 13.2 Some Significant Steganalysis Algorithms; 13.3 Summary; Appendix A. Background Concepts
A.1 Information Theory
Record Nr. UNINA-9910450945103321
Amsterdam ; ; Boston, : Morgan Kaufmann Publishers, c2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital watermarking and steganography [[electronic resource] /] / Ingemar J. Cox ... [et al.]
Digital watermarking and steganography [[electronic resource] /] / Ingemar J. Cox ... [et al.]
Edizione [2nd ed.]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Morgan Kaufmann Publishers, c2008
Descrizione fisica 1 online resource (623 p.)
Disciplina 005.8
Altri autori (Persone) CoxI. J (Ingemar J.)
Collana The Morgan Kaufmann series in multimedia information and systems
The Morgan kaufmann series in computer security
Soggetto topico Computer security
Digital watermarking
Data protection
ISBN 1-281-09616-4
9786611096168
0-08-055580-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Digital Watermarking and Steganography; Copyright Page; Table of Contents; Preface to the First Edition; Preface to the Second Edition; Example Watermarking Systems; Chapter 1. Introduction; 1.1 Information Hiding, Steganography, and Watermarking; 1.2 History of Watermarking; 1.3 History of Steganography; 1.4 Importance of Digital Watermarking; 1.5 Importance of Steganography; Chapter 2. Applications and Properties; 2.1 Applications of Watermarking; 2.2 Applications of Steganography; 2.3 Properties of Watermarking Systems; 2.4 Evaluating Watermarking Systems
2.5 Properties of Steganographic and Steganalysis Systems2.6 Evaluating and Testing Steganographic Systems; 2.7 Summary; Chapter 3. Models of Watermarking; 3.1 Notation; 3.2 Communications; 3.3 Communication-Based Models of Watermarking; 3.4 Geometric Models of Watermarking; 3.5 Modeling Watermark Detection by Correlation; 3.6 Summary; Chapter 4. Basic Message Coding; 4.1 Mapping Messages into Message Vectors; 4.2 Error Correction Coding; 4.3 Detecting Multisymbol Watermarks; 4.4 Summary; Chapter 5. Watermarking with Side Information; 5.1 Informed Embedding
5.2 Watermarking Using Side Information5.3 Dirty-Paper Codes; 5.4 Summary; Chapter 6. Practical Dirty-Paper Codes; 6.1 Practical Considerations for Dirty-Paper Codes; 6.2 Broad Approaches to Dirty-Paper Code Design; 6.3 Implementing DM with A Simple Lattice Code; 6.4 Typical Tricks in Implementing Lattice Codes; 6.5 Coding with Better Lattices; 6.6 Making Lattice Codes Survive Valumetric Scaling; 6.7 Dirty-Paper Trellis Codes; 6.8 Summary; Chapter 7. Analyzing Errors; 7.1 Message Errors; 7.2 False Positive Errors; 7.3 False Negative Errors; 7.4 ROC Curves
7.5 The Effect of Whitening on Error Rates7.6 Analysis of Normalized Correlation; 7.7 Summary; Chapter 8. Using Perceptual Models; 8.1 Evaluating Perceptual Impact of Watermarks; 8.2 General Form of A Perceptual Model; 8.3 Two Examples of Perceptual Models; 8.4 Perceptually Adaptive Watermarking; 8.5 Summary; Chapter 9. Robust Watermarking; 9.1 Approaches; 9.2 Robustness to Valumetric Distortions; 9.3 Robustness to Temporal and Geometric Distortions; 9.4 Summary; Chapter 10. Watermark Security; 10.1 Security Requirements; 10.2 Watermark Security and Cryptography
10.3 Some Significant Known Attacks10.4 Summary; Chapter 11. Content Authentication; 11.1 Exact Authentication; 11.2 Selective Authentication; 11.3 Localization; 11.4 Restoration; 11.5 Summary; Chapter 12. Steganography; 12.1 Steganographic Communication; 12.2 Notation and Terminology; 12.3 Information-Theoretic Foundations of Steganography; 12.4 Practical Steganographic Methods; 12.5 Minimizing the Embedding Impact; 12.6 Summary; Chapter 13. Steganalysis; 13.1 Steganalysis Scenarios; 13.2 Some Significant Steganalysis Algorithms; 13.3 Summary; Appendix A. Background Concepts
A.1 Information Theory
Record Nr. UNINA-9910777307303321
Amsterdam ; ; Boston, : Morgan Kaufmann Publishers, c2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui