HOME > 상세정보

상세정보

Digital watermarking : 5th international workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006 : proceedings

Digital watermarking : 5th international workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006 : proceedings

자료유형
단행본
개인저자
Shi, Yun Q. Jeon, Byeungwoo.
서명 / 저자사항
Digital watermarking : 5th international workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006 : proceedings / Yun Qing Shi, Byeungwoo Jeon (eds.).
발행사항
Berlin ;   New York :   Springer,   c2006.  
형태사항
xii, 474 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 4283
ISBN
9783540488255 (pbk.) 3540488251 (pbk.)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security --Congresses. Data protection --Congresses. Digital watermarking --Congresses.
000 00000cam u2200205 a 4500
001 000046044832
005 20200910165445
008 200902s2006 gw a b 101 0 eng d
010 ▼a 2006935426
020 ▼a 9783540488255 (pbk.)
020 ▼a 3540488251 (pbk.)
035 ▼a (KERIS)REF000013001570
040 ▼a OHX ▼c OHX ▼d CUS ▼d BAKER ▼d MnU ▼d DLC ▼d 211009
050 0 0 ▼a QA76.9.A25 ▼b I89 2006
082 0 0 ▼a 005.8 ▼2 23
084 ▼a 005.8 ▼2 DDCK
090 ▼a 005.8 ▼b I96d ▼c 2005
111 2 ▼a IWDW 2006 ▼d (2006 : ▼c Cheju-do, Korea)
245 1 0 ▼a Digital watermarking : ▼b 5th international workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006 : proceedings / ▼c Yun Qing Shi, Byeungwoo Jeon (eds.).
246 1 0 ▼a IWDW 2006
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2006.
300 ▼a xii, 474 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 4283
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Data protection ▼v Congresses.
650 0 ▼a Digital watermarking ▼v Congresses.
700 1 ▼a Shi, Yun Q.
700 1 ▼a Jeon, Byeungwoo.
830 0 ▼a Lecture notes in computer science ; ▼v 4283.
945 ▼a KLPA

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I96d 2005 등록번호 521005104 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

This book constitutes the refereed proceedings of the 5th International Workshop on Digital Watermarking Secure Data Management, IWDW 2006, held in Jeju Island, Korea in November 2006. The 34 revised full papers presented together with 3 invited lectures cover both theoretical and practical issues in digital watermarking.



Welcome to the proceedings of the Fifth International Workshop on Digital Watermarking (IWDW). Since the first IWDW held in Seoul, Korea in 2002, it has been a focal point for meeting in person and disseminating valuable scientific and technological developments in watermarking. IWDW 2006 was held on Jeju, the dream island in Korea. The main theme of the workshop was “Meet the Challenges in this Digital World!” As we all know, digital watermarking and its related technologies have emerged as the key ingredients of this digital world. We report on new developments and discuss how to best utilize the watermarking and its related new technologies to cope with many challenging issues in this digital world. This year, we accepted 34 papers out of 76 highly qualified submissions from 14 different countries. Each paper was reviewed by three reviewers. The acceptance ratio of 44% indicates IWDW’s continuing commitment to ensuring the quality of the workshop. In addition, we had three invited lectures and one panel discussion that shed invaluable insights to the watermarking community on new developments and future directions. The technical program featured such topics as steganography and steganalysis, data forensics, digital right management, secure watermarking, and their applications. The 34 accepted papers, three invited lectures, and the panel discussion covered both theoretical and practical issues that all of us can benefit from. Furthermore, 13 of the 34 papers were arranged in a poster session in order to facilitate more efficient and interactive information exchange.


정보제공 : Aladin

목차

Watermarking Is Not Cryptography.- Secure Quantization Index Modulation Watermark Detection.- Steganalysis in the Presence of Weak Cryptography and Encoding.- Category Attack for LSB Steganalysis of JPEG Images.- Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA).- Multi Bit Plane Image Steganography.- Reversible Watermarking for Error Diffused Halftone Images Using Statistical Features.- Wavelet Domain Print-Scan and JPEG Resilient Data Hiding Method.- A New Multi-set Modulation Technique for Increasing Hiding Capacity of Binary Watermark for Print and Scan Processes.- A Novel Multibit Watermarking Scheme Combining Spread Spectrum and Quantization.- Wavelet Analysis Based Blind Watermarking for 3-D Surface Meshes.- Watermarking for 3D Keyframe Animation Based on Geometry and Interpolator.- A Robust Video Watermarking Scheme Via Temporal Segmentation and Middle Frequency Component Adaptive Modification.- Capacity Enhancement of Compressed Domain Watermarking Channel Using Duo-binary Coding.- Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition.- Intellectual Property Rights Management Using Combination Encryption in MPEG-4.- Data Hiding in Film Grain.- Joint Screening Halftoning and Visual Cryptography for Image Protection.- Robust Audio Watermarking Based on Low-Order Zernike Moments.- Analysis of Optimal Search Interval for Estimation of Modified Quantization Step Size in Quantization-Based Audio Watermark Detection.- Universal JPEG Steganalysis in the Compressed Frequency Domain.- Attack on JPEG2000 Steganography Using LRCA.- A Low-Cost Attack on Branch-Based Software Watermarking Schemes.- Geometric Invariant Domain for Image Watermarking.- Desynchronization in Compression Process for Collusion Resilient Video Fingerprint.- Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets.- Analysis and Comparison of Typical Reversible Watermarking Methods.- A Reversible Watermarking Based on Histogram Shifting.- Towards Lower Bounds on Embedding Distortion in Information Hiding.- Improved Differential Energy Watermarking for Embedding Watermark.- A Colorization Based Animation Broadcast System with Traitor Tracing Capability.- Adaptive Video Watermarking Utilizing Video Characteristics in 3D-DCT Domain.- Scalable Protection and Access Control in Full Scalable Video Coding.- A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication.- Secure Watermark Embedding Through Partial Encryption.- A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform.- Error Resilient Image Authentication Using Feature Statistical and Spatial Properties.

관련분야 신착자료

Harvard Business Review (2025)