+612 9045 4394
 
CHECKOUT
Digital Watermarking : Second International Workshop, Iwdw 2003, Seoul, Korea, October 20-22, 2003, Revised Papers - Ton Kalker

Digital Watermarking

Second International Workshop, Iwdw 2003, Seoul, Korea, October 20-22, 2003, Revised Papers

By: Ton Kalker (Editor), M. Yong (Editor), I.J. Cox (Editor)

Paperback Published: 24th February 2004
ISBN: 9783540210610
Number Of Pages: 604

Share This Book:

Paperback

$204.16
or 4 easy payments of $51.04 with Learn more
Ships in 5 to 9 business days

We are happy to present to you the proceedings of the 2nd International Workshop on Digital Watermarking, IWDW 2003. Since its modern re-appearance in the academic community in the early 1990s, great progress has been made in understanding both the capabilities and the weaknesses of digital watermarking. On the theoretical side, we all are now well aware of the fact that digital waterma- ing is best viewed as a form of communication using side information. In the case of digital watermarking the side information in question is the document to be wat- marked. This insight has led to a better understanding of the limits of the capacity and robustness of digital watermarking algorithms. It has also led to new and improved watermarking algorithms, both in terms of capacity and imperceptibility. Similarly, the role of human perception, and models thereof, has been greatly enhanced in the study and design of digital watermarking algorithms and systems. On the practical side, applications of watermarking are not yet abundant. The original euphoria on the role of digital watermarking in copy protection and copyright prot- tion has not resulted in widespread usage in practical systems. With hindsight, a n- ber of reasons can be given for this lack of practical applications.

The importance of aliasing in structured quantization index modulation data hidingp. 1
Watermark embedding for black-box channelsp. 18
Image steganography and steganalysis : concepts and practicep. 35
On the integration of watermarks and cryptographyp. 50
Content-dependent anti-disclosure image watermarkp. 61
Performance measurement of watermark embedding patternsp. 77
Image fusion based visible watermarking using dual-tree complex wavelet transformp. 86
Optimal data-hiding strategies for games with BER payoffsp. 101
Robust wavelet-based information hiding through low-density parity-check (LDPC) codesp. 117
Natural language watermarking using semantic substitution for Chinese textp. 129
Resilient information hiding for abstract semi-structuresp. 141
Model-based steganographyp. 154
Authentication of 3-D polygonal meshesp. 168
Use of motion estimation to improve video watermarking for MPEG encodersp. 184
A robust printed image watermarking based on iterative halftoning methodp. 200
A feature-watermarking scheme for JPEG image authenticationp. 212
An intelligent watermark detection decoder based on independent component analysisp. 223
Coefficient selection methods for scalable spread spectrum watermarkingp. 235
Performance analysis of order statistical patchworkp. 247
Rotation-tolerant watermark detection using circular harmonic function correlation filterp. 263
On perceptual quality of watermarked images - an experimental approachp. 277
Audio watermarking based on music content analysis : robust against time scale modificationp. 289
Multi-bit video watermarking based on 3D DFT using perceptual modelsp. 301
EM estimation of scale factor for quantization-based audio watermarkingp. 316
Semi-fragile watermarking for tamper proofing and authentication of still imagesp. 328
Secure video watermarking via embedding strength modulationp. 340
On the insecurity of non-invertible watermarking schemes for dispute resolvingp. 355
RST-resistant image watermarking using invariant centroid and reordered Fourier-Mellin transformp. 370
Robust audio watermarking using both DWT and masking effectp. 382
Normalization domain watermarking method based on pattern extractionp. 390
Robust watermarking with adaptive receivingp. 396
A robust logo multiresolution watermarking based on independent component analysis extractionp. 408
Highly reliable stochastic perceptual watermarking model based on multiwavelet transformp. 423
Metadata hiding for content adaptationp. 435
Echo watermarking in sub-band domainp. 447
Modification of polar echo kernel for performance improvement of audio watermarkingp. 456
Increasing robustness of an improved spread spectrum audio watermarking method using attack characterizationp. 467
Enhancement methods of image quality in screen mark attackp. 474
A method to improve the stego-image quality for palette-based image steganographyp. 483
A secure steganographic scheme against statistical analysesp. 497
A three-dimensional watermarking algorithm using the DCT transform of triangle stripsp. 508
High quality perceptual steganographic techniquesp. 518
A watermarking scheme applicable for fingerprinting protocolp. 532
A new digital watermarking for architectural design drawing using LINEs and ARCs based on vertexp. 544
Public watermark detection using multiple proxies and secret sharingp. 558
Towards generic detection scheme in zero knowledge protocol for blind watermark detectionp. 570
Lossless watermarking considering the human visual systemp. 581
Data-hiding capacity improvement for text watermarking using space coding methodp. 593
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9783540210610
ISBN-10: 354021061X
Series: Lecture Notes in Computer Science
Audience: General
Format: Paperback
Language: English
Number Of Pages: 604
Published: 24th February 2004
Publisher: Springer-Verlag Berlin and Heidelberg Gmbh & Co. Kg
Country of Publication: DE
Dimensions (cm): 23.39 x 15.6  x 3.18
Weight (kg): 0.86