top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing : (IIH-MSP 2006) : proceedings ; 18-20 December, 2006, Pasadena, California, USA
2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing : (IIH-MSP 2006) : proceedings ; 18-20 December, 2006, Pasadena, California, USA
Pubbl/distr/stampa [Place of publication not identified], : IEEE Computer Society, 2006
Disciplina 005.8
Soggetto topico Computer security - Security measures
Computer networks
Cryptography
Digital watermarking
Data protection
Engineering & Applied Sciences
Computer Science
ISBN 1-5090-9149-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996199008303316
[Place of publication not identified], : IEEE Computer Society, 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing : (IIH-MSP 2006) : proceedings ; 18-20 December, 2006, Pasadena, California, USA
2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing : (IIH-MSP 2006) : proceedings ; 18-20 December, 2006, Pasadena, California, USA
Pubbl/distr/stampa [Place of publication not identified], : IEEE Computer Society, 2006
Disciplina 005.8
Soggetto topico Computer security - Security measures
Computer networks
Cryptography
Digital watermarking
Data protection
Engineering & Applied Sciences
Computer Science
ISBN 9781509091492
1509091491
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910142716203321
[Place of publication not identified], : IEEE Computer Society, 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Security Solutions for Multimedia
Advanced Security Solutions for Multimedia
Autore Ansari Irshad Ahmad
Edizione [1st ed.]
Pubbl/distr/stampa Bristol : , : Institute of Physics Publishing, , 2021
Descrizione fisica 1 online resource (276 pages)
Altri autori (Persone) BajajVarun
SinhalRishi
SharmaTarun Kumar
NajafiEsmaeil
ShahManan
GohilJay
PatelJay
WuHanzhou
AbazarMahdie
Collana IOP Ebooks Series
Soggetto topico Data encryption (Computer science)
Digital watermarking
ISBN 0-7503-4572-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Acknowledgements -- Editor biographies -- Irshad Ahmad Ansari -- Varun Bajaj -- Contributor biographies -- Mahdie Abazar -- Parmeshwar Birajadar -- Seyed Mostafa FakhrAhmad -- Vikram M Gadre -- Ali Ghorbani -- Jay Gohil -- Abdelhamid Helali -- Sunil Kumar Jauhar -- Ameya Kshirsagar -- S Kuppa -- Hassen Maaref -- V M Manikandan -- Suja Cherukullapurath Mana -- Peyman Masjedi -- Ridha Mghaieth -- Amina Msolli -- Esmaeil Najafi -- Akash S Palde -- Jay Patel -- D S Raghukumar -- Vishal Rajput -- Antti Rissanen -- Marjo Rissanen -- T Saipraba -- Sagar G Sangodkar -- Manan Shah -- Tarun Kumar Sharma -- Rishi Sinhal -- M Suresha -- Niranjan Suthar -- Mohammad Taheri -- Hanzhou Wu -- Chapter 1 Blind image watermarking with efficient dual restoration feature -- 1.1 Introduction -- 1.2 Literature review -- 1.3 Proposed fragile watermarking scheme -- 1.3.1 Watermark pre-processing -- 1.3.2 Watermark embedding -- 1.3.3 Watermark extraction -- 1.3.4 Self-recovery process -- 1.4 Experimental results and discussion -- 1.4.1 Tamper detection anaylsis -- 1.4.2 Self-recovery of the tampered portion -- 1.5 Conclusion -- Acknowledgements -- References -- Chapter 2 Secure, robust and imperceptible image watermarking scheme based on sharp frequency localized contourlet transform -- 2.1 Introduction -- 2.2 The properties of SFLCT -- 2.3 The proposed SFLCT watermarking scheme -- 2.3.1 Computing strength factors -- 2.4 Implementations and results of the proposed SFLCT scheme -- 2.4.1 Robustness of the proposed SFLCT scheme -- 2.4.2 The security examination of the proposed scheme -- 2.5 Comparative analysis of the proposed scheme -- 2.6 Conclusion -- References -- Chapter 3 Content watermarking and data hiding in multimedia security -- 3.1 Introduction -- 3.2 Content watermarking in multimedia security -- 3.2.1 Introduction.
3.2.2 Content watermarking technique reviews -- 3.2.3 Table pertaining to research work on content watermarking in multimedia security -- 3.2.4 Inference -- 3.3 Data hiding in multimedia security -- 3.3.1 Background -- 3.3.2 Data hiding technique reviews -- 3.3.3 Table pertaining to research work on data hiding in multimedia security -- 3.3.4 Inference -- 3.4 Conclusion -- Acknowledgments -- References -- Chapter 4 Recent advances in reversible watermarking in an encrypted domain -- 4.1 Introduction -- 4.2 Preliminaries -- 4.2.1 Cover source and formats -- 4.2.2 Encryption methods -- 4.2.3 Evaluation metrics -- 4.2.4 Auxiliary data -- 4.3 State-of-the-art methods -- 4.3.1 General framework -- 4.3.2 Reserving room after encryption -- 4.3.3 Reserving room before encryption -- 4.3.4 Challenges and opportunities -- 4.4 Conclusion -- Acknowledgements -- References -- Chapter 5 An analysis of deep steganography and steganalysis -- 5.1 Introduction -- 5.2 Deep learning -- 5.2.1 Steganalysis -- 5.2.2 Steganography -- 5.3 Conclusion -- References -- Chapter 6 Recent trends in reversible data hiding techniques -- 6.1 Introduction -- 6.2 Types of RDH schemes -- 6.2.1 RDH in natural images -- 6.2.2 RDH in encrypted images -- 6.2.3 RDH through encryption (RDHTE) -- 6.3 Analysis of RDH schemes -- 6.4 Image dataset for experimental study -- 6.5 Future scope of the research in RDH -- 6.6 Conclusion -- References -- Chapter 7 Anatomized study of security solutions for multimedia: deep learning-enabled authentication, cryptography and information hiding -- 7.1 Introduction -- 7.2 Hurdles in conventional approaches for security -- 7.2.1 Vulnerability due to expansion -- 7.2.2 Authentication and computational latency -- 7.2.3 Discrepancy in authentication -- 7.3 Vulnerability to multimedia content -- 7.3.1 Data disclosure -- 7.3.2 Content manipulation.
7.3.3 Link sharing -- 7.3.4 Steganography -- 7.3.5 Common workspace -- 7.4 Analysis of security solutions for multimedia content -- 7.4.1 Cryptography -- 7.4.2 Data hiding -- 7.4.3 Deep learning enabled authentication -- 7.5 Future scope -- 7.6 Conclusion -- Acknowledgements -- References -- Chapter 8 New lightweight image encryption algorithm for the Internet of Things and wireless multimedia sensor networks -- 8.1 Introduction -- 8.2 Cryptographic primitives -- 8.2.1 Cryptanalysis -- 8.2.2 Cryptography system -- 8.3 Proposed lightweight algorithm -- 8.4 Safety assessment -- 8.4.1 Statistical analysis -- 8.4.2 Sensitivity test: robustness against differential attacks -- 8.4.3 Calculations speed analysis -- 8.5 Conclusion -- References -- Chapter 9 Applying the capabilities of machine learning for multimedia security: an analysis -- 9.1 Introduction -- 9.2 Overview of machine learning -- 9.2.1 Classification -- 9.2.2 Regression -- 9.2.3 Deep learning -- 9.3 Machine learning algorithms for multimedia security -- 9.4 Advantages of using ML based security mechanism for multimedia -- 9.5 Conclusion -- References -- Chapter 10 Assistive communication technology options for elderly care -- 10.1 Introduction -- 10.2 Cameras for patient monitoring in hospitals -- 10.2.1 Cameras for patient supervising in elderly care -- 10.2.2 Extending camera monitoring from the hospital to the home -- 10.2.3 Home-access video service as experienced by family members -- 10.2.4 Home-access video service as experienced by staff -- 10.2.5 New contexts and possibilities for camera surveillance in elderly care -- 10.3 Home-access monitoring and security -- 10.4 Benefits of the service -- 10.4.1 Benefit for the hospital patient -- 10.4.2 Benefit to the patient's relatives -- 10.4.3 Benefit to the organization -- 10.5 Requirements for the service model.
10.5.1 When is a home-access camera a facet of quality? -- 10.5.2 Conditions for practice -- 10.6 Security issues in networked health infrastructure -- 10.6.1 Information security at the strategic level -- 10.6.2 Different layers of security -- 10.6.3 Key elements of safe IT infrastructure in healthcare in the future -- 10.7 Deploying novel surveillance services in healthcare -- 10.7.1 Underlining the basics -- 10.7.2 Design cycles and relevant frames for design -- 10.7.3 Shared leadership -- 10.7.4 Challenges of innovation adaptation -- 10.7.5 New service models and translational design challenges -- 10.8 Conclusion -- References -- Chapter 11 Deep learning approach for scenario-based abnormality detection -- 11.1 Introduction -- 11.2 Literature study -- 11.3 Scenario understanding -- 11.3.1 Key frame extraction using instance segmentation -- 11.3.2 State full artifacts modelling -- 11.3.3 Action recognition and attention of key action -- 11.3.4 A hybrid model for spatio-temporal features -- 11.3.5 Classification and captioning -- 11.4 Abnormality detection -- 11.4.1 Natural abnormality translation -- 11.5 Datasets -- 11.6 Challenges -- 11.7 Trends and strengths -- 11.8 Conclusion -- References -- Chapter 12 Ear recognition for multimedia security -- 12.1 Introduction -- 12.1.1 Components of a biometric system -- 12.1.2 Modes of operation -- 12.1.3 Performance evaluation metrics -- 12.2 Ear recognition -- 12.3 Ear detection -- 12.4 Ear feature extraction -- 12.4.1 Multiresolution technique for feature extraction -- 12.4.2 Deep learning technique for feature extraction -- 12.4.3 Identification and verification experiments -- 12.5 Conclusion -- Acknowledgements -- References -- Chapter 13 Secure multimedia management: currents trends and future avenues -- 13.1 Introduction -- 13.2 Data collection and screening -- 13.3 Results.
13.3.1 General performance of selected publications -- 13.3.2 Performance of countries, institutions, and authors -- 13.3.3 Performance of journals, citations, and keywords -- 13.3.4 Factorial analysis -- 13.3.5 Co-citation network -- 13.3.6 Collaboration worldwide -- 13.4 Conclusion -- References.
Record Nr. UNINA-9910915783003321
Ansari Irshad Ahmad  
Bristol : , : Institute of Physics Publishing, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital forensics and watermarking : 20th international workshop, IWDW 2021, Beijing, China, November 20-22, 2021 : revised selected papers / / Xianfeng Zhao, Alessandro Piva, Pedro Comesaña-Alfaro (editors)
Digital forensics and watermarking : 20th international workshop, IWDW 2021, Beijing, China, November 20-22, 2021 : revised selected papers / / Xianfeng Zhao, Alessandro Piva, Pedro Comesaña-Alfaro (editors)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (279 pages)
Disciplina 005.82
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Digital watermarking
ISBN 3-030-95398-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910523772503321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital forensics and watermarking : 20th international workshop, IWDW 2021, Beijing, China, November 20-22, 2021 : revised selected papers / / Xianfeng Zhao, Alessandro Piva, Pedro Comesaña-Alfaro (editors)
Digital forensics and watermarking : 20th international workshop, IWDW 2021, Beijing, China, November 20-22, 2021 : revised selected papers / / Xianfeng Zhao, Alessandro Piva, Pedro Comesaña-Alfaro (editors)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (279 pages)
Disciplina 005.82
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Digital watermarking
ISBN 3-030-95398-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464539303316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Digital watermarking [electronic resource] / Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom
Digital watermarking [electronic resource] / Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom
Autore Cox, I. J. (Ingemar J.)
Pubbl/distr/stampa San Diego, CA : Academic Press, 2001
Descrizione fisica xxv, 542 p. : ill. ; 24 cm.
Disciplina 005.8
Altri autori (Persone) Miller, Matthew L.
Bloom, Jeffrey A. (Jeffrey Adam), 1964-
Collana The Morgan Kaufmann series in multimedia information and systems
Soggetto topico Computer security
Digital watermarking
Data protection
Soggetto genere / forma Electronic books.
ISBN 9781558607149
1558607145
Formato Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface -- Example Watermarking Systems -- 1 Introduction -- 2 Applications and Properties -- 3 Models of Watermarking -- 4 Basic Message Coding -- 5 Watermarking with Side Information -- 6 Analyzing Errors -- 7 Using Perceptual Models -- 8 Robust Watermarking -- 9 Watermark Security -- 10 Content Authentication -- Appendix A: Background Concepts -- Appendix B: Selected Theoretical Results -- Appendix C: Source Code -- Appendix D: Notationand Common Variables -- Glossary -- References -- Index -- About the Authors.
Record Nr. UNISALENTO-991003248509707536
Cox, I. J. (Ingemar J.)  
San Diego, CA : Academic Press, 2001
Risorse elettroniche
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
Digital watermarking : 8th international workshop, IWDW 2009, Guildford, UK, August 24-26, 2009 : proceedings / / Anthony T.S. Ho ... [et al.] (eds.)
Digital watermarking : 8th international workshop, IWDW 2009, Guildford, UK, August 24-26, 2009 : proceedings / / Anthony T.S. Ho ... [et al.] (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, : Springer, c2009
Descrizione fisica 1 online resource (XIII, 337 p.)
Disciplina 005.8
Altri autori (Persone) HoAnthony Tung-Shuen
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Computer security
Data protection
Digital watermarking
ISBN 3-642-03688-0
Classificazione DAT 050f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Lectures (Abstracts) -- Data Hiding and the Statistics of Images -- The Changing Face of Cryptography -- Forensic Techniques for Image Source Classification: A Comparative Study -- Session I: Robust Watermarking -- Digital Watermarking Schemes Using Multi-resolution Curvelet and HVS Model -- Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques -- Robust AVS Audio Watermarking -- Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG Attacks -- Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks -- Session II: Video Watermarking -- A Robust Watermarking for MPEG-2 -- Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping -- Blind Digital Watermarking of Low Bit-Rate Advanced H.264/AVC Compressed Video -- Session III: Poster Session -- Fast Embedding Technique for Dirty Paper Trellis Watermarking -- A Homomorphic Method for Sharing Secret Images -- Dot-Size Variant Visual Cryptography -- High Capacity Data Hiding in Binary Document Images -- Session IV: Steganography and Steganalysis -- Hiding Information by Context-Based Synonym Substitution -- A Statistical and Iterative Method for Data Hiding in Palette-Based Images -- Estimating the Information Theoretic Optimal Stego Noise -- Multi-class Blind Steganalysis Based on Image Run-Length Analysis -- Session V: Multimedia Watermarking and Security Protocols -- Local Patch Blind Spectral Watermarking Method for 3D Graphics -- Reading Watermarks from Printed Binary Images with a Camera Phone -- A New Approach in Reversible Watermarking -- Classification Framework for Fair Content Tracing Protocols -- Session VI: Image Forensics and Authentication -- Fragile Watermarking Scheme with Extensive Content Restoration Capability -- Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking -- Camera-Model Identification Using Markovian Transition Probability Matrix -- A Survey of Passive Image Tampering Detection -- An Enhanced Statistical Approach to Identifying Photorealistic Images.
Altri titoli varianti IWDW 2009
Record Nr. UNINA-9910484839803321
Berlin, : Springer, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital watermarking : 7th international workshop, IWDW 2008, Busan, Korea, November 10-12, 2008 ; selected papers / / Hyoung-Joong Kim, Stefan Katzenbeisser, Anthony T.S. Ho (eds.)
Digital watermarking : 7th international workshop, IWDW 2008, Busan, Korea, November 10-12, 2008 ; selected papers / / Hyoung-Joong Kim, Stefan Katzenbeisser, Anthony T.S. Ho (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, c2009
Descrizione fisica 1 online resource (XI, 472 p.)
Disciplina 005.8
Altri autori (Persone) HoAnthony Tung-Shuen
KatzenbeisserStefan
KimHyoung Joong <1954->
Collana Lecture notes in computer science
Soggetto topico Computer security
Data protection
Digital watermarking
ISBN 3-642-04438-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Robust Watermarking Scheme for H.264 -- Detection of Double MPEG Compression Based on First Digit Statistics -- A Time Series Intra-Video Collusion Attack on Frame-by-Frame Video Watermarking -- A Novel Real-Time MPEG-2 Video Watermarking Scheme in Copyright Protection -- Reversible Data Hiding Based On H.264/AVC Intra Prediction -- Scalability Evaluation of Blind Spread-Spectrum Image Watermarking -- Run-Length and Edge Statistics Based Approach for Image Splicing Detection -- Scale-Space Feature Based Image Watermarking in Contourlet Domain -- A Practical Print-and-Scan Resilient Watermarking for High Resolution Images -- Adaptive SVD-Based Digital Image Watermarking -- Robust Audio Watermarking Based on Log-Polar Frequency Index -- Adaptive Threshold Based Robust Watermark Detection Method -- A Digital Forgery Image Detection Algorithm Based on Wavelet Homomorphic Filtering -- Blind Detection of Digital Forgery Image Based on the Local Entropy of the Gradient -- Exposure Time Change Attack on Image Watermarking Systems -- Steganalysis Based on Difference Image -- A Novel Steganographic Algorithm Resisting Targeted Steganalytic Attacks on LSB Matching -- A Novel Approach for JPEG Steganography -- A High Capacity Steganographic Algorithm in Color Images -- A Novel Method for Block Size Forensics Based on Morphological Operations -- Non-malleable Schemes Resisting Adaptive Adversaries -- An Algorithm for Modeling Print and Scan Operations Used for Watermarking -- Space Time Block Coding for Spread Spectrum Watermarking Systems -- Formal Analysis of Two Buyer-Seller Watermarking Protocols -- Detection of Hidden Information in Webpage Based on Higher-Order Statistics -- Secret Sharing Based Video Watermark Algorithm for Multiuser -- GSM Based Security Analysis for Add-SS Watermarking -- Video Watermarking Based on Spatio-temporal JND Profile -- On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography -- Balanced Multiwavelets Based Digital Image Watermarking -- A Generalised Model for Distortion Performance Analysis of Wavelet Based Watermarking -- Multiple Watermarking with Side Information -- Content Sharing Based on Personal Information in Virtually Secured Space -- Evaluation and Improvement of Digital Watermarking Algorithm Based on Cryptographic Security Models -- A Color Image Watermarking Scheme in the Associated Domain of DWT and DCT Domains Based on Multi-channel Watermarking Framework -- An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption -- First Digit Law and Its Application to Digital Forensics -- Digital Camera Identification from Images – Estimating False Acceptance Probability -- Design of Collusion-Resistant Fingerprinting Systems: Review and New Results.
Altri titoli varianti IWDW 2008
Record Nr. UNINA-9910484694603321
Berlin ; ; New York, : Springer, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital watermarking : 6th international workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007 : proceedings / / edited by Yun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser
Digital watermarking : 6th international workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007 : proceedings / / edited by Yun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Germany : , : Springer, , [2008]
Descrizione fisica 1 online resource (XII, 484 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Digital watermarking
ISBN 3-540-92238-5
Classificazione DAT 050f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Lecture -- Watermarking, a Mature Technology – Retrospect and Prospect -- The Marriage of Cryptography and Watermarking — Beneficial and Challenging for Secure Watermarking and Detection -- Detecting Photographic Composites of People -- Session I: Watermark Security -- (In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005 -- Attack Analysis for He & Wu’s Joint Watermarking/Fingerprinting Scheme -- Multiple Watermarking in Visual Cryptography -- Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding -- Session II: Steganalysis -- Fusion Based Blind Image Steganalysis by Boosting Feature Selection -- Steganalysis of Multi Bit Plane Image Steganography -- Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis -- Weaknesses of MB2 -- Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis -- Steganalysis Versus Splicing Detection -- Session III: Authentication -- Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning -- A General Data Hiding Framework and Multi-level Signature for Binary Images -- High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents -- Session IV: Reversible Data Hiding -- Reversible Quantization-Index Modulation Using Neighboring Correlation -- High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain -- Reversible Data Hiding Using Prediction Error Values Embedding -- An Improved Reversible Difference Expansion Watermarking Algorithm -- Optimum Histogram Pair Based Image Lossless Data Embedding -- Session V: Robust Watermarking -- Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding -- GA-Based Robustness Evaluation Method for Digital Image Watermarking -- Dither Modulation in the Logarithmic Domain -- Session VI: Poster Session -- A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack -- Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption -- Design an Aperiodic Stochastic Resonance Signal Processor for Digital Watermarking -- Watermarking for Authentication of LZ-77 Compressed Documents -- Robust Audio Zero-Watermark Based on LWT and Chaotic Modulation -- A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone Images -- Session VII: Theory and Methods in Watermarking -- On the Complexity of Obtaining Optimal Watermarking Schemes -- A Theoretical Framework for Watermarking of Compressed Signals -- Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model -- Multiple Scrambling and Adaptive Synchronization for Audio Watermarking -- A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality -- A High Payload VQ Steganographic Method for Binary Images.
Record Nr. UNISA-996465399003316
Berlin, Germany : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Digital watermarking : 6th international workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007 : proceedings / / edited by Yun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser
Digital watermarking : 6th international workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007 : proceedings / / edited by Yun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Germany : , : Springer, , [2008]
Descrizione fisica 1 online resource (XII, 484 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Digital watermarking
ISBN 3-540-92238-5
Classificazione DAT 050f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Lecture -- Watermarking, a Mature Technology – Retrospect and Prospect -- The Marriage of Cryptography and Watermarking — Beneficial and Challenging for Secure Watermarking and Detection -- Detecting Photographic Composites of People -- Session I: Watermark Security -- (In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005 -- Attack Analysis for He & Wu’s Joint Watermarking/Fingerprinting Scheme -- Multiple Watermarking in Visual Cryptography -- Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding -- Session II: Steganalysis -- Fusion Based Blind Image Steganalysis by Boosting Feature Selection -- Steganalysis of Multi Bit Plane Image Steganography -- Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis -- Weaknesses of MB2 -- Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis -- Steganalysis Versus Splicing Detection -- Session III: Authentication -- Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning -- A General Data Hiding Framework and Multi-level Signature for Binary Images -- High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents -- Session IV: Reversible Data Hiding -- Reversible Quantization-Index Modulation Using Neighboring Correlation -- High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain -- Reversible Data Hiding Using Prediction Error Values Embedding -- An Improved Reversible Difference Expansion Watermarking Algorithm -- Optimum Histogram Pair Based Image Lossless Data Embedding -- Session V: Robust Watermarking -- Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding -- GA-Based Robustness Evaluation Method for Digital Image Watermarking -- Dither Modulation in the Logarithmic Domain -- Session VI: Poster Session -- A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack -- Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption -- Design an Aperiodic Stochastic Resonance Signal Processor for Digital Watermarking -- Watermarking for Authentication of LZ-77 Compressed Documents -- Robust Audio Zero-Watermark Based on LWT and Chaotic Modulation -- A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone Images -- Session VII: Theory and Methods in Watermarking -- On the Complexity of Obtaining Optimal Watermarking Schemes -- A Theoretical Framework for Watermarking of Compressed Signals -- Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model -- Multiple Scrambling and Adaptive Synchronization for Audio Watermarking -- A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality -- A High Payload VQ Steganographic Method for Binary Images.
Record Nr. UNINA-9910484691103321
Berlin, Germany : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui

Data di pubblicazione

Altro...