Digital Watermarking: Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers / Edition 1

Paperback (Print)
Buy New
Buy New from BN.com
$135.20
Used and New from Other Sellers
Used and New from Other Sellers
from $20.00
Usually ships in 1-2 business days
(Save 88%)
Other sellers (Paperback)
  • All (6) from $20.00   
  • New (3) from $119.33   
  • Used (3) from $20.00   

Overview

This book constitutes the thoroughly refereed postproceedings of the Second International Workshop on Digital Watermarking, IWDW 2003, held in Seoul, Korea, in October 2004.

The 44 revised full papers presented together with 4 invited articles were carefully selected during two rounds of reviewing and improvement from more than 90 submissions. The papers address all current aspects of digital watermarking, in particular theoretical modeling, robustness, capacity, imperceptibility and the human perceptual system, security and attacks, watermarking systems and implementations, and integration of digital watermarking in digital rights management.

Read More Show Less

Product Details

  • ISBN-13: 9783540210610
  • Publisher: Springer Berlin Heidelberg
  • Publication date: 4/14/2004
  • Series: Lecture Notes in Computer Science Series , #2939
  • Edition description: 2004
  • Edition number: 1
  • Pages: 604
  • Product dimensions: 9.21 (w) x 6.14 (h) x 1.29 (d)

Table of Contents

Invited Talks.- The Importance of Aliasing in Structured Quantization Index Modulation Data Hiding.- Watermark Embedding for Black-Box Channels.- Image Steganography and Steganalysis: Concepts and Practice.- On the Integration of Watermarks and Cryptography.- I: DRM I.- Content-Dependent Anti-disclosure Image Watermark.- Performance Measurement of Watermark Embedding Patterns.- II: Theory.- Image Fusion Based Visible Watermarking Using Dual-Tree Complex Wavelet Transform.- Optimal Data-Hiding Strategies for Games with BER Payoffs.- Robust Wavelet-Based Information Hiding through Low-Density Parity-Check (LDPC) Codes.- III: Non-St+Stego.- Natural Language Watermarking Using Semantic Substitution for Chinese Text.- Resilient Information Hiding for Abstract Semi-structures.- Model-Based Steganography.- IV: Systems.- Authentication of 3-D Polygonal Meshes.- Use of Motion Estimation to Improve Video Watermarking for MPEG Encoders.- A Robust Printed Image Watermarking Based on Iterative Halftoning Method.- A Feature-Watermarking Scheme for JPEG Image Authentication.- V: Estimation.- An Intelligent Watermark Detection Decoder Based on Independent Component Analysis.- Coefficient Selection Methods for Scalable Spread Spectrum Watermarking.- Performance Analysis of Order Statistical Patchwork.- Rotation-Tolerant Watermark Detection Using Circular Harmonic Function Correlation Filter.- VI: Perception+Audio.- On Perceptual Quality of Watermarked Images – An Experimental Approach.- Audio Watermarking Based on Music Content Analysis: Robust against Time Scale Modification.- Multi-bit Video Watermarking Based on 3D DFT Using Perceptual Models.- EM Estimation of Scale Factor for Quantization-Based Audio Watermarking.- VII: DRM II.- Semi-fragile Watermarking for Tamper Proofing and Authentication of Still Images.- Secure Video Watermarking via Embedding Strength Modulation.- On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving.- Posters.- RST-Resistant Image Watermarking Using Invariant Centroid and Reordered Fourier-Mellin Transform.- Robust Audio Watermarking Using Both DWT and Masking Effect.- Normalization Domain Watermarking Method Based on Pattern Extraction.- Robust Watermarking with Adaptive Receiving.- A Robust Logo Multiresolution Watermarking Based on Independent Component Analysis Extraction.- Highly Reliable Shastic Perceptual Watermarking Model Based on Multiwavelet Transform.- Metadata Hiding for Content Adaptation.- Echo Watermarking in Sub-band Domain.- Modification of Polar Echo Kernel for Performance Improvement of Audio Watermarking.- Increasing Robustness of an Improved Spread Spectrum Audio Watermarking Method Using Attack Characterization.- Enhancement Methods of Image Quality in Screen Mark Attack.- A Method to Improve the Stego-Image Quality for Palette-Based Image Steganography.- A Secure Steganographic Scheme against Statistical Analyses.- A Three-Dimensional Watermarking Algorithm Using the DCT Transform of Triangle Strips.- High Quality Perceptual Steganographic Techniques.- A Watermarking Scheme Applicable for Fingerprinting Prool.- A New Digital Watermarking for Architectural Design Drawing Using LINEs and ARCs Based on Vertex.- Public Watermark Detection Using Multiple Proxies and Secret Sharing.- Towards Generic Detection Scheme in Zero Knowledge Prool for Blind Watermark Detection.- Lossless Watermarking Considering the Human Visual System.- Data-Hiding Capacity Improvement for Text Watermarking Using Space Coding Method.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)