HOME > 상세정보

상세정보

Digital watermarking : 4th international workshop, IWDW 2005, Siena, Italy, September 15-17, 2005 : proceedings

Digital watermarking : 4th international workshop, IWDW 2005, Siena, Italy, September 15-17, 2005 : proceedings (1회 대출)

자료유형
단행본
개인저자
Barni, Mauro, Ph. D.
서명 / 저자사항
Digital watermarking : 4th international workshop, IWDW 2005, Siena, Italy, September 15-17, 2005 : proceedings / Mauro Barni ... [et al.] (eds.).
발행사항
Berlin ;   New York :   Springer,   c2005.  
형태사항
xii, 483 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 3710
ISBN
354028768X (pbk. : alk. paper) 9783540287681 (pbk. : alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security -- Congresses. Data protection -- Congresses. Digital watermarking -- Congresses.
000 01535camuu2200397 a 4500
001 000045562082
005 20091127111307
008 091127s2005 gw a b 101 0 eng
010 ▼a 2005931932
020 ▼a 354028768X (pbk. : alk. paper)
020 ▼a 9783540287681 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm61488310
035 ▼a (OCoLC)61488310
035 ▼a (CStRLIN)NYCGQ5434453-B
035 ▼a (NNC)NYCG5434453
035 ▼a (KERIS)REF000012739161
040 ▼a NNC ▼c NNC ▼d DLC ▼d 211009
042 ▼a lccopycat
050 0 0 ▼a QA76.9.A25 ▼b I89 2005
082 0 0 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b I96d ▼c 2005
111 2 ▼a IWDW 2005 ▼d (2005 : ▼c Siena, Italy)
245 1 0 ▼a Digital watermarking : ▼b 4th international workshop, IWDW 2005, Siena, Italy, September 15-17, 2005 : proceedings / ▼c Mauro Barni ... [et al.] (eds.).
246 3 0 ▼a IWDW 2005
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2005.
300 ▼a xii, 483 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 3710
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Data protection ▼v Congresses.
650 0 ▼a Digital watermarking ▼v Congresses.
700 1 ▼a Barni, Mauro, ▼c Ph. D.
830 0 ▼a Lecture notes in computer science ; ▼v 3710.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I96d 2005 등록번호 121186787 (1회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

We are delighted to welcome the attendees of the Fourth International Wo- shop on Digital Watermarking (IWDW). Watermarking continues to generate strong academic interest. Commercialization of the technology is proceeding at a steadypace. We haveseen watermarkingadoptedfor DVD audio.Fingerpri- ing technology was successfully used to determine the source of pirated video material. Furthermore, a number of companies are using watermarking as an enabling technology for broadcast monitoring services. Watermarking of digital cinema contentis anticipated. Future applications may also come from areas- related to digital rights management. For example, the use of watermarking to enhance legacy broadcast and communication systems is now being considered. IWDW 2005 o?ers an opportunity to re?ect upon the state of the art in digital watermarking as well as discuss directions for future research and applications. This year we accepted 31 papers from 74 submissions. This 42% acceptance rate indicates our commitment to ensuring a very high quality conference. We thankthemembersoftheTechnicalProgramCommitteeformakingthispossible by their timely and insightful reviews. Thanks to their hard work this is the ?rst IWDW at which the ?nal proceedings are available to the participants at the time of the workshop as a Springer LNCS publication.

We are delighted to welcome the attendees of the Fourth International Wo- shop on Digital Watermarking (IWDW). Watermarking continues to generate strong academic interest. Commercialization of the technology is proceeding at a steadypace. We haveseen watermarkingadoptedfor DVD audio.Fingerpri- ing technology was successfully used to determine the source of pirated video material. Furthermore, a number of companies are using watermarking as an enabling technology for broadcast monitoring services. Watermarking of digital cinema contentis anticipated. Future applications may also come from areas- related to digital rights management. For example, the use of watermarking to enhance legacy broadcast and communication systems is now being considered. IWDW 2005 o?ers an opportunity to re?ect upon the state of the art in digital watermarking as well as discuss directions for future research and applications. This year we accepted 31 papers from 74 submissions. This 42% acceptance rate indicates our commitment to ensuring a very high quality conference. We thankthemembersoftheTechnicalProgramCommitteeformakingthispossible by their timely and insightful reviews. Thanks to their hard work this is the ?rst IWDW at which the ?nal proceedings are available to the participants at the time of the workshop as a Springer LNCS publication.


정보제공 : Aladin

목차

Session I: Steganography and Steganalysis.- A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography.- Information Transmission and Steganography.- On the Existence of Perfect Stegosystems.- Towards Multi-class Blind Steganalyzer for JPEG Images.- Session II: Fingerprinting.- An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption.- Collusion Secure Convolutional Spread Spectrum Fingerprinting.- Performance Study on Multimedia Fingerprinting Employing Traceability Codes.- Regular Simplex Fingerprints and Their Optimality Properties.- Session III: Watermarking I.- A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet Domain.- Robust Detection of Transform Domain Additive Watermarks.- Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis.- Session IV: Attacks.- A New Inter-frame Collusion Attack and a Countermeasure.- Effectiveness of ST-DM Watermarking Against Intra-video Collusion.- Oracle Attacks and Covert Channels.- Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images.- Session V: Special Session on Watermarking Security.- A Survey of Watermarking Security.- Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy.- Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information.- Practical Data-Hiding: Additive Attacks Performance Analysis.- The Return of the Sensitivity Attack.- Session VI: Watermarking of Unconventional Media.- Look Up Table(LUT) Method for Halftone Image Watermarking.- New Public-Key Authentication Watermarking for JBIG2 Resistant to Parity Attacks.- Software Watermarking as a Proof of Identity: A Study of Zero Knowledge Proof Based Software Watermarking.- Watermarking of 3D Irregular Meshes Based on Wavelet Multiresolution Analysis.- Session VII: Channel Coding and Watermarking.- Digital Watermarking Robustness and Fragility Characteristics: New Modelling and Coding Influence.- New Geometric Analysis of Spread-Spectrum Data Hiding with Repetition Coding, with Implications for Side-Informed Schemes.- Trellis-Coded Rational Dither Modulation for Digital Watermarking.- Session VIII: Theory.- Closed-Form Formulas for Private Watermarking Capacities of Laplacian Sources with the Magnitude-Error Distortion Measure and Under Additive Attacks.- Improved QIM Strategies for Gaussian Watermarking.- On the Achievable Rate of Side Informed Embedding Techniques with Steganographic Constraints.- Performance Lower Bounds for Existing and New Uncoded Digital Watermarking Modulation Techniques.- Session IX: Watermarking II.- Evaluation of Feature Extraction Techniques for Robust Watermarking.- Perceptual Video Watermarking in the 3D-DWT Domain Using a Multiplicative Approach.- Robustness Enhancement of Content-Based Watermarks Using Entropy Masking Effect.- Session X: Applications.- Secure Mutual Distrust Transaction Tracking Using Cryptographic Elements.- ViWiD : Visible Watermarking Based Defense Against Phishing.


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)