|
|
|
|
LEADER |
00000cam a2200000ua 4500 |
001 |
b4199907 |
003 |
CoU |
005 |
20160520093711.7 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
061103s2006 gw a ob 101 0 eng d |
010 |
|
|
|a 2006935426
|
019 |
|
|
|a 226395170
|
020 |
|
|
|a 3540488251
|
020 |
|
|
|a 9783540488255
|
035 |
|
|
|a (OCoLC)ocm75253639
|
035 |
|
|
|a (OCoLC)75253639
|z (OCoLC)226395170
|
040 |
|
|
|a OHX
|b eng
|c OHX
|d CUS
|d BAKER
|d YDXCP
|d IQU
|d DLC
|d C$Q
|d IXA
|d BTCTA
|d GW5XE
|d E7B
|d OCLCQ
|d OCLCF
|d OCLCO
|d OCLCQ
|d CGU
|d QE2
|d OL$
|d OCL
|d OCLCO
|
049 |
|
|
|a GWRE
|
050 |
0 |
0 |
|a QA76.9.A25
|b I89 2006
|
111 |
2 |
|
|a IWDW (Conference)
|n (5th :
|d 2006 :
|c Cheju-do, Korea)
|0 http://id.loc.gov/authorities/names/nb2006025096.
|
245 |
1 |
0 |
|a Digital watermarking
|h [electronic resource] :
|b 5th international workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006 : proceedings /
|c Yun Qing Shi, Byeungwoo Jeon (eds.)
|
246 |
3 |
0 |
|a IWDW 2006.
|
260 |
|
|
|a Berlin ;
|a New York :
|b Springer,
|c ©2006.
|
300 |
|
|
|a xii, 474 pages :
|b illustrations ;
|c 24 cm.
|
336 |
|
|
|a text
|b txt
|2 rdacontent.
|
337 |
|
|
|a unmediated
|b n
|2 rdamedia.
|
338 |
|
|
|a volume
|b nc
|2 rdacarrier.
|
490 |
1 |
|
|a Lecture notes in computer science,
|x 0302-9743 ;
|v 4283.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
0 |
|t Watermarking is not cryptography /
|r Ingemar J. Cox, Gwenael Doerr and Teddy Furon --
|t Secure quantization index modulation watermark detection /
|r Ton Kalker and Mike Malkin --
|t Steganalysis in the presence of weak cryptography and encoding /
|r Andreas Westfeld --
|t Category attack for LSB steganalysis of JPEG images /
|r Kwangsoo Lee, Andreas Westfeld and Sangjin Lee --
|t Steganalysis using high-dimensional features derived from co-occurrence matrix and class-wise non-principal components analysis (CNPCA) /
|r Guorong Xuan, Yun Q. Shi, Cong Huang, Dongdong Fu, Xiuming Zhu, Peiqi Chai and Jianjiong Gao --
|t Multi bit plane image steganography /
|r Bui Cong Nguyen, Sang Moon Yoon and Heung-Kyu Lee --
|t Reversible watermarking for error diffused halftone images using statistical features /
|r Zhe-Ming Lu, Hao Luo and Jeng-Shyang Pan --
|t Wavelet domain print-scan and JPEG resilient data hiding method /
|r Anja Keskinarkaus, Anu Pramila, Tapio Seppanen and Jaakko Sauvola --
|t A new multi-set modulation technique for increasing hiding capacity of binary watermark for print and scan processes /
|r C. Culnane, H. Treharne and A.T.S. Ho --
|t A novel multibit watermarking scheme combining spread spectrum and quantization /
|r Xinshan Zhu, Zhi Tang and Liesen Yang --
|t Wavelet analysis based blind watermarking for 3-D surface meshes /
|r Min-Su Kim, Jae-Won Cho, Rimy Prost and Ho-Youl Jung --
|t Watermarking for 3D keyframe animation based on geometry and interpolator /
|r Suk-Hwan Lee, Ki-Ryong Kwon and Dong Kyue Kim --
|t A robust video watermarking scheme via temporal segmentation and middle frequency component adaptive modification /
|r Liesen Yang and Zongming Guo --
|t Capacity enhancement of compressed domain watermarking channel using duo-binary coding /
|r Ivan Damnjanovic and Ebroul Izquierdo --
|t Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition /
|r Dongdong Fu, Yun Q. Shi and Wei Su --
|t Intellectual property rights management using combination encryption in MPEG-4 /
|r Goo-Rak Kwon, Kwan-Hee Lee, Sang-Jae Nam and Sung-Jea Ko --
|t Data hiding in film grain /
|r Dekun Zou, Jun Tian, Jeffrey Bloom and Jiefu Zhai --
|t Joint screening halftoning and visual cryptography for image protection /
|r Chao-Yung Hsu, Chun-Shien Lu and Soo-Chang Pei --
|t Robust audio watermarking based on low-order Zernike moments /
|r Shijun Xiang, Jiwu Huang, Rui Yang, Chuntao Wang and Hongmei Liu --
|t Analysis of optimal search interval for estimation of modified quantization step size in quantization-based audio watermark detection /
|r Siho Kim and Keunsung Bae --
|t Universal JPEG steganalysis in the compressed frequency domain /
|r Johann Barbier, Eric Filial and Kichenakoumar Mayoura --
|t Attack on JPEG2000 steganography using LRCA /
|r Hwajong Oh, Kwangsoo Lee and Sangjin Lee --
|t A low-cost attack on branch-based software watermarking schemes /
|r Gaurav Gupta and Josef Pieprzyk --
|t Geometric invariant domain for image watermarking /
|r Chaw-Seng Woo, Jiang Du and Binh Pham --
|t Desynchronization in compression process for collusion resilient video fingerprint /
|r Zhongxuan Liu, Shiguo Lian, Ronggang Wang and Zhen Ren --
|t Lossless data hiding using histogram shifting method baaed on integer wavelets /
|r Guorong Xuan, Qiuming Yao, Chengyun Yang, Jianjiong Gao, Peiqi Chai, Yun Q. Shi and Zhicheng Ni --
|t Analysis and comparison of typical reversible watermarking methods /
|r Yongjian Hu, Byeungwoo Jeon, Zhiquan Lin and Hui Yang --
|t A reversible watermarking based on histogram shifting /
|r JinHa Hwang, Jong Weon Kim and Jong Uk Choi --
|t Towards lower bounds on embedding distortion in information hiding /
|r Younhee Kim, Zoran Duric and Dana Richards --
|t Improved differential energy watermarking for embedding watermark /
|r Goo-Rak Kwon, Seung-Won Jung, Sang-Jae Nam and Sung-Jea Ko --
|t A colorization based animation broadcast system with traitor tracing capability /
|r Chih-Chieh Liu, Yu-Feng Kuo, Chun-Hsiang Huang and Ja-Ling Wu --
|t Adaptive video watermarking utilizing video characteristics in 3D-DCT domain /
|r Hyun Park, Sung Hyun Lee and Young Shik Moon --
|t Scalable protection and access control in full scalable video coding /
|r Yong Geun Won, Tae Meon Bae and Yong Man Ro --
|t A wavelet-based fragile watermarking scheme for secure image authentication /
|r HongJie He, JiaShu Zhang and Heng-Ming Tai --
|t Secure watermark embedding through partial encryption /
|r Aweke Lemma, Stefan Katzenbeisser, Mehmet Celik and Michiel van der Veen --
|t A rotation-invariant secure image watermarking algorithm incorporating steerable pyramid transform /
|r Jiangqun Ni, Rongyue Zhang, Jiwu Huang, Chuntao Wang and Quanbo Li --
|t Error resilient image authentication using feature statistical and spatial properties /
|r Shuiming Ye, Qibin Sun and Ee-Chien Chang.
|
650 |
|
0 |
|a Computer security
|v Congresses.
|0 http://id.loc.gov/authorities/subjects/sh2008101458.
|
650 |
|
0 |
|a Data protection
|v Congresses.
|0 http://id.loc.gov/authorities/subjects/sh2008102034.
|
650 |
|
0 |
|a Digital watermarking
|v Congresses.
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484.
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958.
|
650 |
|
7 |
|a Digital watermarking.
|2 fast
|0 (OCoLC)fst00893746.
|
655 |
|
7 |
|a Conference papers and proceedings.
|2 fast
|0 (OCoLC)fst01423772.
|
700 |
1 |
|
|a Shi, Yun Q.
|0 http://id.loc.gov/authorities/names/n99830611
|1 http://isni.org/isni/0000000122148936.
|
700 |
1 |
|
|a Jeon, Byeungwoo.
|0 http://id.loc.gov/authorities/names/nb2006025102
|1 http://isni.org/isni/000000004305144X.
|
830 |
|
0 |
|a Lecture notes in computer science ;
|v 4283.
|0 http://id.loc.gov/authorities/names/n42015162.
|
907 |
|
|
|a .b41999071
|b 03-19-20
|c 04-09-07
|
998 |
|
|
|a eng
|b 04-11-07
|c -
|d m
|e -
|f eng
|g gw
|h 0
|i 2
|
907 |
|
|
|a .b41999071
|b 06-03-19
|c 04-09-07
|
944 |
|
|
|a MARS - RDA ENRICHED
|
907 |
|
|
|a .b41999071
|b 05-31-19
|c 04-09-07
|
907 |
|
|
|a .b41999071
|b 07-05-17
|c 04-09-07
|
948 |
|
|
|a bslw18/19 : may : ess
|
999 |
f |
f |
|i 9f0798cf-f4c7-5a48-9292-b01e2037923d
|s 729f4045-1d5e-5d5e-911a-565b9354687f
|
952 |
f |
f |
|p Can circulate
|a University of Colorado Boulder
|b Boulder Campus
|c Engineering Math & Physics
|d Closed Stacks - Engineering Math & Physics Library - Stacks
|e QA76.9.A25 I89 2006
|h Library of Congress classification
|i book
|m U183047190650
|n 1
|