HOME > 상세정보

상세정보

Digital watermarking : 6th international workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007 : proceedings

Digital watermarking : 6th international workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007 : proceedings

자료유형
단행본
개인저자
Shi, Yun Q. Kim, Hyoung Joong, 1954-. Katzenbeisser, Stefan.
서명 / 저자사항
Digital watermarking : 6th international workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007 : proceedings / Yun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser (eds.).
발행사항
Berlin ;   New York :   Springer,   c2008.  
형태사항
xii, 484 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 5041
ISBN
9783540922377 3540922377
서지주기
Includes bibliographical references and index.
일반주제명
Digital watermarking --Congresses. Data encryption (Computer science) --Congresses. Data protection --Congresses. Computer security --Congresses.
000 00000cam u2200205 a 4500
001 000046045757
005 20200911102258
008 200911s2008 gw a b 101 0 eng d
010 ▼a 2008941293
015 ▼a 991447573 ▼2 dnb
020 ▼a 9783540922377
020 ▼a 3540922377
035 ▼a (KERIS)REF000017350398
040 ▼a BTCTA ▼c BTCTA ▼d OHX ▼d YDXCP ▼d EMU ▼d IXA ▼d GBVCP ▼d DEBBG ▼d DLC ▼d 211009
050 0 0 ▼a QA76.9.A25 ▼b I89 2007
082 0 4 ▼a 005.8 ▼2 23
084 ▼a 005.8 ▼2 DDCK
090 ▼a 005.8 ▼b I96d ▼c 2007
111 2 ▼a IWDW 2007 ▼n (6th: ▼d 2007 : ▼c Guangzhou, China)
245 1 0 ▼a Digital watermarking : ▼b 6th international workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007 : proceedings / ▼c Yun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser (eds.).
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2008.
300 ▼a xii, 484 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 5041
490 1 ▼a LNCS sublibrary: SL 4 -- Security and cryptology
504 ▼a Includes bibliographical references and index.
650 0 ▼a Digital watermarking ▼v Congresses.
650 0 ▼a Data encryption (Computer science) ▼v Congresses.
650 0 ▼a Data protection ▼v Congresses.
650 0 ▼a Computer security ▼v Congresses.
700 1 ▼a Shi, Yun Q.
700 1 ▼a Kim, Hyoung Joong, ▼d 1954-.
700 1 ▼a Katzenbeisser, Stefan.
830 0 ▼a Lecture notes in computer science ; ▼v 5041.
830 0 ▼a LNCS sublibrary. ▼n SL 4 ▼p Security and cryptology.
945 ▼a KLPA

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I96d 2007 등록번호 521005225 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

This book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in December 2007. The 24 revised full papers together with 3 invited papers were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on watermark security; steganalysis; authentication; reversible data hiding; robust watermarking; poster session; theory and methods in watermarking.

This book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in December 2007. The 24 revised full papers together with 3 invited papers were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on watermark security; steganalysis; authentication; reversible data hiding; robust watermarking; poster session; theory and methods in watermarking.

New feature

This book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in December 2007.

The 24 revised full papers together with 3 invited papers were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on watermark security; steganalysis; authentication; reversible data hiding; robust watermarking; poster session; theory and methods in watermarking.




정보제공 : Aladin

목차

Invited Lecture.- Watermarking, a Mature Technology - Retrospect and Prospect.- The Marriage of Cryptography and Watermarking - Beneficial and Challenging for Secure Watermarking and Detection.- Detecting Photographic Composites of People.- Session I: Watermark Security.- (In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005.- Attack Analysis for He & Wu''s Joint Watermarking/Fingerprinting Scheme.- Multiple Watermarking in Visual Cryptography.- Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding.- Session II: Steganalysis.- Fusion Based Blind Image Steganalysis by Boosting Feature Selection.- Steganalysis of Multi Bit Plane Image Steganography.- Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis.- Weaknesses of MB2.- Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis.- Steganalysis Versus Splicing Detection.- Session III: Authentication.- Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning.- A General Data Hiding Framework and Multi-level Signature for Binary Images.- High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents.- Session IV: Reversible Data Hiding.- Reversible Quantization-Index Modulation Using Neighboring Correlation.- High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain.- Reversible Data Hiding Using Prediction Error Values Embedding.- An Improved Reversible Difference Expansion Watermarking Algorithm.- Optimum Histogram Pair Based Image Lossless Data Embedding.- Session V: Robust Watermarking.- Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding.- GA-Based Robustness Evaluation Method for Digital Image Watermarking.- Dither Modulation in the Logarithmic Domain.- Session VI: Poster Session.- A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack.- Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption.- Design an Aperiodic Stochastic Resonance Signal Processor for Digital Watermarking.- Watermarking for Authentication of LZ-77 Compressed Documents.- Robust Audio Zero-Watermark Based on LWT and Chaotic Modulation.- A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone Images.- Session VII: Theory and Methods in Watermarking.- On the Complexity of Obtaining Optimal Watermarking Schemes.- A Theoretical Framework for Watermarking of Compressed Signals.- Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model.- Multiple Scrambling and Adaptive Synchronization for Audio Watermarking.- A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality.- A High Payload VQ Steganographic Method for Binary Images.

관련분야 신착자료

Harvard Business Review (2025)