000 | 05401nam a22006975i 4500 | ||
---|---|---|---|
001 | 978-3-642-03688-0 | ||
003 | DE-He213 | ||
005 | 20240730193029.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2009 gw | s |||| 0|eng d | ||
020 |
_a9783642036880 _9978-3-642-03688-0 |
||
024 | 7 |
_a10.1007/978-3-642-03688-0 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aDigital Watermarking _h[electronic resource] : _b8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings / _cedited by Anthony T. S. Ho, Yun Q. Shi, Hyoung-Joong Kim, Mauro Barni. |
250 | _a1st ed. 2009. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2009. |
|
300 |
_aXIII, 337 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v5703 |
|
505 | 0 | _aInvited Lectures (Abstracts) -- Data Hiding and the Statistics of Images -- The Changing Face of Cryptography -- Forensic Techniques for Image Source Classification: A Comparative Study -- Session I: Robust Watermarking -- Digital Watermarking Schemes Using Multi-resolution Curvelet and HVS Model -- Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques -- Robust AVS Audio Watermarking -- Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG Attacks -- Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks -- Session II: Video Watermarking -- A Robust Watermarking for MPEG-2 -- Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping -- Blind Digital Watermarking of Low Bit-Rate Advanced H.264/AVC Compressed Video -- Session III: Poster Session -- Fast Embedding Technique for Dirty Paper Trellis Watermarking -- A Homomorphic Method for Sharing Secret Images -- Dot-Size Variant Visual Cryptography -- High Capacity Data Hiding in Binary Document Images -- Session IV: Steganography and Steganalysis -- Hiding Information by Context-Based Synonym Substitution -- A Statistical and Iterative Method for Data Hiding in Palette-Based Images -- Estimating the Information Theoretic Optimal Stego Noise -- Multi-class Blind Steganalysis Based on Image Run-Length Analysis -- Session V: Multimedia Watermarking and Security Protocols -- Local Patch Blind Spectral Watermarking Method for 3D Graphics -- Reading Watermarks from Printed Binary Images with a Camera Phone -- A New Approach in Reversible Watermarking -- Classification Framework for Fair Content Tracing Protocols -- Session VI: Image Forensics and Authentication -- Fragile Watermarking Scheme with Extensive Content Restoration Capability -- Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking -- Camera-Model Identification Using Markovian Transition Probability Matrix -- A Survey of Passive Image Tampering Detection -- An Enhanced Statistical Approach to Identifying Photorealistic Images. | |
520 | _aThis book constitutes the refereed proceedings of the 8th Interntaional Workshop, IWDW 2009, held in Guildford, Surrey, UK, August 24-26, 2009. The 25 revised full papers, including 4 poster presentations, presented together with 3 invited papers were carefully reviewed and selected from 50 submissions. The papers are organized in topical sections on robust watermarking, video watermarking, steganography and steganalysis, multimedia watermarking and security protocols, as well as image forensics and authentication. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aData structures (Computer science). _98188 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aCoding theory. _94154 |
|
650 | 0 |
_aInformation storage and retrieval systems. _922213 |
|
650 | 0 |
_aComputer graphics. _94088 |
|
650 | 0 |
_aComputer vision. _9152206 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aData Structures and Information Theory. _931923 |
650 | 2 | 4 |
_aCoding and Information Theory. _9152207 |
650 | 2 | 4 |
_aInformation Storage and Retrieval. _923927 |
650 | 2 | 4 |
_aComputer Graphics. _94088 |
650 | 2 | 4 |
_aComputer Vision. _9152208 |
700 | 1 |
_aHo, Anthony T. S. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9152209 |
|
700 | 1 |
_aShi, Yun Q. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9152210 |
|
700 | 1 |
_aKim, Hyoung-Joong. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9152211 |
|
700 | 1 |
_aBarni, Mauro. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9152212 |
|
710 | 2 |
_aSpringerLink (Online service) _9152213 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642036873 |
776 | 0 | 8 |
_iPrinted edition: _z9783642036897 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v5703 _9152214 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-03688-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c94561 _d94561 |