Digital Watermarking 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005. Proceedings /
We are delighted to welcome the attendees of the Fourth International Wo- shop on Digital Watermarking (IWDW). Watermarking continues to generate strong academic interest. Commercialization of the technology is proceeding at a steadypace. We haveseen watermarkingadoptedfor DVD audio.Fingerpri- ing t...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2005.
|
Σειρά: | Lecture Notes in Computer Science,
3710 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Session I: Steganography and Steganalysis
- A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography
- Information Transmission and Steganography
- On the Existence of Perfect Stegosystems
- Towards Multi-class Blind Steganalyzer for JPEG Images
- Session II: Fingerprinting
- An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption
- Collusion Secure Convolutional Spread Spectrum Fingerprinting
- Performance Study on Multimedia Fingerprinting Employing Traceability Codes
- Regular Simplex Fingerprints and Their Optimality Properties
- Session III: Watermarking I
- A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet Domain
- Robust Detection of Transform Domain Additive Watermarks
- Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis
- Session IV: Attacks
- A New Inter-frame Collusion Attack and a Countermeasure
- Effectiveness of ST-DM Watermarking Against Intra-video Collusion
- Oracle Attacks and Covert Channels
- Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images
- Session V: Special Session on Watermarking Security
- A Survey of Watermarking Security
- Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy
- Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information
- Practical Data-Hiding: Additive Attacks Performance Analysis
- The Return of the Sensitivity Attack
- Session VI: Watermarking of Unconventional Media
- Look Up Table(LUT) Method for Halftone Image Watermarking
- New Public-Key Authentication Watermarking for JBIG2 Resistant to Parity Attacks
- Software Watermarking as a Proof of Identity: A Study of Zero Knowledge Proof Based Software Watermarking
- Watermarking of 3D Irregular Meshes Based on Wavelet Multiresolution Analysis
- Session VII: Channel Coding and Watermarking
- Digital Watermarking Robustness and Fragility Characteristics: New Modelling and Coding Influence
- New Geometric Analysis of Spread-Spectrum Data Hiding with Repetition Coding, with Implications for Side-Informed Schemes
- Trellis-Coded Rational Dither Modulation for Digital Watermarking
- Session VIII: Theory
- Closed-Form Formulas for Private Watermarking Capacities of Laplacian Sources with the Magnitude-Error Distortion Measure and Under Additive Attacks
- Improved QIM Strategies for Gaussian Watermarking
- On the Achievable Rate of Side Informed Embedding Techniques with Steganographic Constraints
- Performance Lower Bounds for Existing and New Uncoded Digital Watermarking Modulation Techniques
- Session IX: Watermarking II
- Evaluation of Feature Extraction Techniques for Robust Watermarking
- Perceptual Video Watermarking in the 3D-DWT Domain Using a Multiplicative Approach
- Robustness Enhancement of Content-Based Watermarks Using Entropy Masking Effect
- Session X: Applications
- Secure Mutual Distrust Transaction Tracking Using Cryptographic Elements
- ViWiD : Visible Watermarking Based Defense Against Phishing.