Digital Watermarking: 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006. Proceedings

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 4283 : Security and Cryptology

ISBN: 3540488251, 9783540488255

Size: 7 MB (7729506 bytes)

Pages: 476/484

File format:

Language:

Publishing Year:

Category: Tags: , , , , ,

Ingemar J. Cox, Gwenaël Doërr, Teddy Furon (auth.), Yun Qing Shi, Byeungwoo Jeon (eds.)3540488251, 9783540488255

Welcome to the proceedings of the Fifth International Workshop on Digital Watermarking (IWDW). Since the first IWDW held in Seoul, Korea in 2002, it has been a focal point for meeting in person and disseminating valuable scientific and technological developments in watermarking. IWDW 2006 was held on Jeju, the dream island in Korea. The main theme of the workshop was “Meet the Challenges in this Digital World!” As we all know, digital watermarking and its related technologies have emerged as the key ingredients of this digital world. We report on new developments and discuss how to best utilize the watermarking and its related new technologies to cope with many challenging issues in this digital world. This year, we accepted 34 papers out of 76 highly qualified submissions from 14 different countries. Each paper was reviewed by three reviewers. The acceptance ratio of 44% indicates IWDW’s continuing commitment to ensuring the quality of the workshop. In addition, we had three invited lectures and one panel discussion that shed invaluable insights to the watermarking community on new developments and future directions. The technical program featured such topics as steganography and steganalysis, data forensics, digital right management, secure watermarking, and their applications. The 34 accepted papers, three invited lectures, and the panel discussion covered both theoretical and practical issues that all of us can benefit from. Furthermore, 13 of the 34 papers were arranged in a poster session in order to facilitate more efficient and interactive information exchange.

Table of contents :
Front Matter….Pages –
Watermarking Is Not Cryptography….Pages 1-15
Secure Quantization Index Modulation Watermark Detection….Pages 16-18
Steganalysis in the Presence of Weak Cryptography and Encoding….Pages 19-34
Category Attack for LSB Steganalysis of JPEG Images….Pages 35-48
Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA)….Pages 49-60
Multi Bit Plane Image Steganography….Pages 61-70
Reversible Watermarking for Error Diffused Halftone Images Using Statistical Features….Pages 71-81
Wavelet Domain Print-Scan and JPEG Resilient Data Hiding Method….Pages 82-95
A New Multi-set Modulation Technique for Increasing Hiding Capacity of Binary Watermark for Print and Scan Processes….Pages 96-110
A Novel Multibit Watermarking Scheme Combining Spread Spectrum and Quantization….Pages 111-122
Wavelet Analysis Based Blind Watermarking for 3-D Surface Meshes….Pages 123-137
Watermarking for 3D Keyframe Animation Based on Geometry and Interpolator….Pages 138-149
A Robust Video Watermarking Scheme Via Temporal Segmentation and Middle Frequency Component Adaptive Modification….Pages 150-161
Capacity Enhancement of Compressed Domain Watermarking Channel Using Duo-binary Coding….Pages 162-176
Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition….Pages 177-187
Intellectual Property Rights Management Using Combination Encryption in MPEG-4….Pages 188-196
Data Hiding in Film Grain….Pages 197-211
Joint Screening Halftoning and Visual Cryptography for Image Protection….Pages 212-225
Robust Audio Watermarking Based on Low-Order Zernike Moments….Pages 226-240
Analysis of Optimal Search Interval for Estimation of Modified Quantization Step Size in Quantization-Based Audio Watermark Detection….Pages 241-252
Universal JPEG Steganalysis in the Compressed Frequency Domain….Pages 253-267
Attack on JPEG2000 Steganography Using LRCA….Pages 268-281
A Low-Cost Attack on Branch-Based Software Watermarking Schemes….Pages 282-293
Geometric Invariant Domain for Image Watermarking….Pages 294-307
Desynchronization in Compression Process for Collusion Resilient Video Fingerprint….Pages 308-322
Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets….Pages 323-332
Analysis and Comparison of Typical Reversible Watermarking Methods….Pages 333-347
A Reversible Watermarking Based on Histogram Shifting….Pages 348-361
Towards Lower Bounds on Embedding Distortion in Information Hiding….Pages 362-376
Improved Differential Energy Watermarking for Embedding Watermark….Pages 377-386
A Colorization Based Animation Broadcast System with Traitor Tracing Capability….Pages 387-396
Adaptive Video Watermarking Utilizing Video Characteristics in 3D-DCT Domain….Pages 397-406
Scalable Protection and Access Control in Full Scalable Video Coding….Pages 407-421
A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication….Pages 422-432
Secure Watermark Embedding Through Partial Encryption….Pages 433-445
A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform….Pages 446-460
Error Resilient Image Authentication Using Feature Statistical and Spatial Properties….Pages 461-472
Back Matter….Pages –

Reviews

There are no reviews yet.

Be the first to review “Digital Watermarking: 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006. Proceedings”
Shopping Cart
Scroll to Top