Digital watermarking [electronic resource] : 5th international workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006 : proceedings / Yun Qing Shi, Byeungwoo Jeon (eds.)

Saved in:
Bibliographic Details
Corporate Author: IWDW (Conference) Cheju-do, Korea)
Other Authors: Shi, Yun Q., Jeon, Byeungwoo
Other title:IWDW 2006.
Format: Electronic Conference Proceeding eBook
Language:English
Published: Berlin ; New York : Springer, ©2006.
Series:Lecture notes in computer science ; 4283.
Subjects:

MARC

LEADER 00000cam a2200000ua 4500
001 b4199907
003 CoU
005 20160520093711.7
006 m o d
007 cr |||||||||||
008 061103s2006 gw a ob 101 0 eng d
010 |a 2006935426 
019 |a 226395170 
020 |a 3540488251 
020 |a 9783540488255 
035 |a (OCoLC)ocm75253639 
035 |a (OCoLC)75253639  |z (OCoLC)226395170 
040 |a OHX  |b eng  |c OHX  |d CUS  |d BAKER  |d YDXCP  |d IQU  |d DLC  |d C$Q  |d IXA  |d BTCTA  |d GW5XE  |d E7B  |d OCLCQ  |d OCLCF  |d OCLCO  |d OCLCQ  |d CGU  |d QE2  |d OL$  |d OCL  |d OCLCO 
049 |a GWRE 
050 0 0 |a QA76.9.A25  |b I89 2006 
111 2 |a IWDW (Conference)  |n (5th :  |d 2006 :  |c Cheju-do, Korea)  |0 http://id.loc.gov/authorities/names/nb2006025096. 
245 1 0 |a Digital watermarking  |h [electronic resource] :  |b 5th international workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006 : proceedings /  |c Yun Qing Shi, Byeungwoo Jeon (eds.) 
246 3 0 |a IWDW 2006. 
260 |a Berlin ;  |a New York :  |b Springer,  |c ©2006. 
300 |a xii, 474 pages :  |b illustrations ;  |c 24 cm. 
336 |a text  |b txt  |2 rdacontent. 
337 |a unmediated  |b n  |2 rdamedia. 
338 |a volume  |b nc  |2 rdacarrier. 
490 1 |a Lecture notes in computer science,  |x 0302-9743 ;  |v 4283. 
504 |a Includes bibliographical references and index. 
505 0 0 |t Watermarking is not cryptography /  |r Ingemar J. Cox, Gwenael Doerr and Teddy Furon --  |t Secure quantization index modulation watermark detection /  |r Ton Kalker and Mike Malkin --  |t Steganalysis in the presence of weak cryptography and encoding /  |r Andreas Westfeld --  |t Category attack for LSB steganalysis of JPEG images /  |r Kwangsoo Lee, Andreas Westfeld and Sangjin Lee --  |t Steganalysis using high-dimensional features derived from co-occurrence matrix and class-wise non-principal components analysis (CNPCA) /  |r Guorong Xuan, Yun Q. Shi, Cong Huang, Dongdong Fu, Xiuming Zhu, Peiqi Chai and Jianjiong Gao --  |t Multi bit plane image steganography /  |r Bui Cong Nguyen, Sang Moon Yoon and Heung-Kyu Lee --  |t Reversible watermarking for error diffused halftone images using statistical features /  |r Zhe-Ming Lu, Hao Luo and Jeng-Shyang Pan --  |t Wavelet domain print-scan and JPEG resilient data hiding method /  |r Anja Keskinarkaus, Anu Pramila, Tapio Seppanen and Jaakko Sauvola --  |t A new multi-set modulation technique for increasing hiding capacity of binary watermark for print and scan processes /  |r C. Culnane, H. Treharne and A.T.S. Ho --  |t A novel multibit watermarking scheme combining spread spectrum and quantization /  |r Xinshan Zhu, Zhi Tang and Liesen Yang --  |t Wavelet analysis based blind watermarking for 3-D surface meshes /  |r Min-Su Kim, Jae-Won Cho, Rimy Prost and Ho-Youl Jung --  |t Watermarking for 3D keyframe animation based on geometry and interpolator /  |r Suk-Hwan Lee, Ki-Ryong Kwon and Dong Kyue Kim --  |t A robust video watermarking scheme via temporal segmentation and middle frequency component adaptive modification /  |r Liesen Yang and Zongming Guo --  |t Capacity enhancement of compressed domain watermarking channel using duo-binary coding /  |r Ivan Damnjanovic and Ebroul Izquierdo --  |t Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition /  |r Dongdong Fu, Yun Q. Shi and Wei Su --  |t Intellectual property rights management using combination encryption in MPEG-4 /  |r Goo-Rak Kwon, Kwan-Hee Lee, Sang-Jae Nam and Sung-Jea Ko --  |t Data hiding in film grain /  |r Dekun Zou, Jun Tian, Jeffrey Bloom and Jiefu Zhai --  |t Joint screening halftoning and visual cryptography for image protection /  |r Chao-Yung Hsu, Chun-Shien Lu and Soo-Chang Pei --  |t Robust audio watermarking based on low-order Zernike moments /  |r Shijun Xiang, Jiwu Huang, Rui Yang, Chuntao Wang and Hongmei Liu --  |t Analysis of optimal search interval for estimation of modified quantization step size in quantization-based audio watermark detection /  |r Siho Kim and Keunsung Bae --  |t Universal JPEG steganalysis in the compressed frequency domain /  |r Johann Barbier, Eric Filial and Kichenakoumar Mayoura --  |t Attack on JPEG2000 steganography using LRCA /  |r Hwajong Oh, Kwangsoo Lee and Sangjin Lee --  |t A low-cost attack on branch-based software watermarking schemes /  |r Gaurav Gupta and Josef Pieprzyk --  |t Geometric invariant domain for image watermarking /  |r Chaw-Seng Woo, Jiang Du and Binh Pham --  |t Desynchronization in compression process for collusion resilient video fingerprint /  |r Zhongxuan Liu, Shiguo Lian, Ronggang Wang and Zhen Ren --  |t Lossless data hiding using histogram shifting method baaed on integer wavelets /  |r Guorong Xuan, Qiuming Yao, Chengyun Yang, Jianjiong Gao, Peiqi Chai, Yun Q. Shi and Zhicheng Ni --  |t Analysis and comparison of typical reversible watermarking methods /  |r Yongjian Hu, Byeungwoo Jeon, Zhiquan Lin and Hui Yang --  |t A reversible watermarking based on histogram shifting /  |r JinHa Hwang, Jong Weon Kim and Jong Uk Choi --  |t Towards lower bounds on embedding distortion in information hiding /  |r Younhee Kim, Zoran Duric and Dana Richards --  |t Improved differential energy watermarking for embedding watermark /  |r Goo-Rak Kwon, Seung-Won Jung, Sang-Jae Nam and Sung-Jea Ko --  |t A colorization based animation broadcast system with traitor tracing capability /  |r Chih-Chieh Liu, Yu-Feng Kuo, Chun-Hsiang Huang and Ja-Ling Wu --  |t Adaptive video watermarking utilizing video characteristics in 3D-DCT domain /  |r Hyun Park, Sung Hyun Lee and Young Shik Moon --  |t Scalable protection and access control in full scalable video coding /  |r Yong Geun Won, Tae Meon Bae and Yong Man Ro --  |t A wavelet-based fragile watermarking scheme for secure image authentication /  |r HongJie He, JiaShu Zhang and Heng-Ming Tai --  |t Secure watermark embedding through partial encryption /  |r Aweke Lemma, Stefan Katzenbeisser, Mehmet Celik and Michiel van der Veen --  |t A rotation-invariant secure image watermarking algorithm incorporating steerable pyramid transform /  |r Jiangqun Ni, Rongyue Zhang, Jiwu Huang, Chuntao Wang and Quanbo Li --  |t Error resilient image authentication using feature statistical and spatial properties /  |r Shuiming Ye, Qibin Sun and Ee-Chien Chang. 
650 0 |a Computer security  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101458. 
650 0 |a Data protection  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008102034. 
650 0 |a Digital watermarking  |v Congresses. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484. 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958. 
650 7 |a Digital watermarking.  |2 fast  |0 (OCoLC)fst00893746. 
655 7 |a Conference papers and proceedings.  |2 fast  |0 (OCoLC)fst01423772. 
700 1 |a Shi, Yun Q.  |0 http://id.loc.gov/authorities/names/n99830611  |1 http://isni.org/isni/0000000122148936. 
700 1 |a Jeon, Byeungwoo.  |0 http://id.loc.gov/authorities/names/nb2006025102  |1 http://isni.org/isni/000000004305144X. 
830 0 |a Lecture notes in computer science ;  |v 4283.  |0 http://id.loc.gov/authorities/names/n42015162. 
907 |a .b41999071  |b 03-19-20  |c 04-09-07 
998 |a eng  |b 04-11-07  |c -  |d m   |e -  |f eng  |g gw   |h 0  |i 2 
907 |a .b41999071  |b 06-03-19  |c 04-09-07 
944 |a MARS - RDA ENRICHED 
907 |a .b41999071  |b 05-31-19  |c 04-09-07 
907 |a .b41999071  |b 07-05-17  |c 04-09-07 
948 |a bslw18/19 : may : ess 
999 f f |i 9f0798cf-f4c7-5a48-9292-b01e2037923d  |s 729f4045-1d5e-5d5e-911a-565b9354687f 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Boulder Campus  |c Engineering Math & Physics  |d Closed Stacks - Engineering Math & Physics Library - Stacks  |e QA76.9.A25 I89 2006  |h Library of Congress classification  |i book  |m U183047190650  |n 1