Ingemar J. Cox, Gwenaël Doërr, Teddy Furon (auth.), Yun Qing Shi, Byeungwoo Jeon (eds.)3540488251, 9783540488255
Table of contents :
Front Matter….Pages –
Watermarking Is Not Cryptography….Pages 1-15
Secure Quantization Index Modulation Watermark Detection….Pages 16-18
Steganalysis in the Presence of Weak Cryptography and Encoding….Pages 19-34
Category Attack for LSB Steganalysis of JPEG Images….Pages 35-48
Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA)….Pages 49-60
Multi Bit Plane Image Steganography….Pages 61-70
Reversible Watermarking for Error Diffused Halftone Images Using Statistical Features….Pages 71-81
Wavelet Domain Print-Scan and JPEG Resilient Data Hiding Method….Pages 82-95
A New Multi-set Modulation Technique for Increasing Hiding Capacity of Binary Watermark for Print and Scan Processes….Pages 96-110
A Novel Multibit Watermarking Scheme Combining Spread Spectrum and Quantization….Pages 111-122
Wavelet Analysis Based Blind Watermarking for 3-D Surface Meshes….Pages 123-137
Watermarking for 3D Keyframe Animation Based on Geometry and Interpolator….Pages 138-149
A Robust Video Watermarking Scheme Via Temporal Segmentation and Middle Frequency Component Adaptive Modification….Pages 150-161
Capacity Enhancement of Compressed Domain Watermarking Channel Using Duo-binary Coding….Pages 162-176
Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition….Pages 177-187
Intellectual Property Rights Management Using Combination Encryption in MPEG-4….Pages 188-196
Data Hiding in Film Grain….Pages 197-211
Joint Screening Halftoning and Visual Cryptography for Image Protection….Pages 212-225
Robust Audio Watermarking Based on Low-Order Zernike Moments….Pages 226-240
Analysis of Optimal Search Interval for Estimation of Modified Quantization Step Size in Quantization-Based Audio Watermark Detection….Pages 241-252
Universal JPEG Steganalysis in the Compressed Frequency Domain….Pages 253-267
Attack on JPEG2000 Steganography Using LRCA….Pages 268-281
A Low-Cost Attack on Branch-Based Software Watermarking Schemes….Pages 282-293
Geometric Invariant Domain for Image Watermarking….Pages 294-307
Desynchronization in Compression Process for Collusion Resilient Video Fingerprint….Pages 308-322
Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets….Pages 323-332
Analysis and Comparison of Typical Reversible Watermarking Methods….Pages 333-347
A Reversible Watermarking Based on Histogram Shifting….Pages 348-361
Towards Lower Bounds on Embedding Distortion in Information Hiding….Pages 362-376
Improved Differential Energy Watermarking for Embedding Watermark….Pages 377-386
A Colorization Based Animation Broadcast System with Traitor Tracing Capability….Pages 387-396
Adaptive Video Watermarking Utilizing Video Characteristics in 3D-DCT Domain….Pages 397-406
Scalable Protection and Access Control in Full Scalable Video Coding….Pages 407-421
A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication….Pages 422-432
Secure Watermark Embedding Through Partial Encryption….Pages 433-445
A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform….Pages 446-460
Error Resilient Image Authentication Using Feature Statistical and Spatial Properties….Pages 461-472
Back Matter….Pages –
Reviews
There are no reviews yet.