Digital Watermarking

Digital Watermarking
-0 %
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.
8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings
 PDF
Sofort lieferbar | Lieferzeit: Sofort lieferbar

Unser bisheriger Preis:ORGPRICE: 71,39 €

Jetzt 55,80 €* PDF

Artikel-Nr:
9783642036880
Veröffentl:
2009
Einband:
PDF
Seiten:
337
Autor:
Mauro Barni
Serie:
Lecture Notes in Computer Science
eBook Typ:
PDF
eBook Format:
PDF
Kopierschutz:
Adobe DRM [Hard-DRM]
Sprache:
Englisch
Beschreibung:

th The 8 International Workshop on Digital Watermarking (IWDW 2009) was hosted by the University of Surrey, Guildford, Surrey, UK, during August 24– 26, 2009.As with previous workshops,IWDW 2009 aimed to providea balanced program covering the latest state-of-the-art theoretical and practical devel- ments in digital watermarking, steganography and steganalysis, and the eme- ing area of image forensics. The selection of the program was a challenging task for the Technical Programme Committee members and reviewers, who ensured the highest quality and reputation of the workshop. From around 50 submissions received from authors in 14 countries, the c- mittee selected 26 regular papers (22 oral and 4 poster presentations). In - dition to the contributed papers, the workshop featured three keynote lectures on watermarking, cryptography and forensics kindly delivered by internati- ally renowned experts, Ingemar Cox, Fred Piper and Ed Delp, respectively. The regular papers and keynote lectures can be found in this proceedings volume. First of all, we would like to thank all the authors, speakers, reviewers and participants for their signi?cant contributions to the success of IWDW 2009.
th The 8 International Workshop on Digital Watermarking (IWDW 2009) was hosted by the University of Surrey, Guildford, Surrey, UK, during August 24– 26, 2009.As with previous workshops,IWDW 2009 aimed to providea balanced program covering the latest state-of-the-art theoretical and practical devel- ments in digital watermarking, steganography and steganalysis, and the eme- ing area of image forensics. The selection of the program was a challenging task for the Technical Programme Committee members and reviewers, who ensured the highest quality and reputation of the workshop. From around 50 submissions received from authors in 14 countries, the c- mittee selected 26 regular papers (22 oral and 4 poster presentations). In - dition to the contributed papers, the workshop featured three keynote lectures on watermarking, cryptography and forensics kindly delivered by internati- ally renowned experts, Ingemar Cox, Fred Piper and Ed Delp, respectively. The regular papers and keynote lectures can be found in this proceedings volume. First of all, we would like to thank all the authors, speakers, reviewers and participants for their signi?cant contributions to the success of IWDW 2009.
Invited Lectures (Abstracts).- Data Hiding and the Statistics of Images.- The Changing Face of Cryptography.- Forensic Techniques for Image Source Classification: A Comparative Study.- Session I: Robust Watermarking.- Digital Watermarking Schemes Using Multi-resolution Curvelet and HVS Model.- Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques.- Robust AVS Audio Watermarking.- Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG Attacks.- Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks.- Session II: Video Watermarking.- A Robust Watermarking for MPEG-2.- Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping.- Blind Digital Watermarking of Low Bit-Rate Advanced H.264/AVC Compressed Video.- Session III: Poster Session.- Fast Embedding Technique for Dirty Paper Trellis Watermarking.- A Homomorphic Method for Sharing Secret Images.- Dot-Size Variant Visual Cryptography.- High Capacity Data Hiding in Binary Document Images.- Session IV: Steganography and Steganalysis.- Hiding Information by Context-Based Synonym Substitution.- A Statistical and Iterative Method for Data Hiding in Palette-Based Images.- Estimating the Information Theoretic Optimal Stego Noise.- Multi-class Blind Steganalysis Based on Image Run-Length Analysis.- Session V: Multimedia Watermarking and Security Protocols.- Local Patch Blind Spectral Watermarking Method for 3D Graphics.- Reading Watermarks from Printed Binary Images with a Camera Phone.- A New Approach in Reversible Watermarking.- Classification Framework for Fair Content Tracing Protocols.- Session VI: Image Forensics and Authentication.- Fragile Watermarking Scheme with Extensive Content Restoration Capability.- Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking.- Camera-Model Identification Using Markovian Transition Probability Matrix.- A Survey of Passive Image Tampering Detection.- An Enhanced Statistical Approach to Identifying Photorealistic Images.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.