Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

Digital Watermarking

7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008, Selected Papers
Sofort lieferbar | Lieferzeit: Sofort lieferbar I
ISBN-13:
9783642044380
Veröffentl:
2009
Seiten:
472
Autor:
Hyoung-Joong Kim
Serie:
5450, Lecture Notes in Computer Science Security and Cryptology
eBook Typ:
PDF
eBook Format:
EPUB
Kopierschutz:
1 - PDF Watermark
Sprache:
Englisch
Beschreibung:

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Digital Watermarking, IWDW 2008, held in Busan, Korea, in November 2008.
A Robust Watermarking Scheme for H.264.- Detection of Double MPEG Compression Based on First Digit Statistics.- A Time Series Intra-Video Collusion Attack on Frame-by-Frame Video Watermarking.- A Novel Real-Time MPEG-2 Video Watermarking Scheme in Copyright Protection.- Reversible Data Hiding Based On H.264/AVC Intra Prediction.- Scalability Evaluation of Blind Spread-Spectrum Image Watermarking.- Run-Length and Edge Statistics Based Approach for Image Splicing Detection.- Scale-Space Feature Based Image Watermarking in Contourlet Domain.- A Practical Print-and-Scan Resilient Watermarking for High Resolution Images.- Adaptive SVD-Based Digital Image Watermarking.- Robust Audio Watermarking Based on Log-Polar Frequency Index.- Adaptive Threshold Based Robust Watermark Detection Method.- A Digital Forgery Image Detection Algorithm Based on Wavelet Homomorphic Filtering.- Blind Detection of Digital Forgery Image Based on the Local Entropy of the Gradient.- Exposure Time Change Attack on Image Watermarking Systems.- Steganalysis Based on Difference Image.- A Novel Steganographic Algorithm Resisting Targeted Steganalytic Attacks on LSB Matching.- A Novel Approach for JPEG Steganography.- A High Capacity Steganographic Algorithm in Color Images.- A Novel Method for Block Size Forensics Based on Morphological Operations.- Non-malleable Schemes Resisting Adaptive Adversaries.- An Algorithm for Modeling Print and Scan Operations Used for Watermarking.- Space Time Block Coding for Spread Spectrum Watermarking Systems.- Formal Analysis of Two Buyer-Seller Watermarking Protocols.- Detection of Hidden Information in Webpage Based on Higher-Order Statistics.- Secret Sharing Based Video Watermark Algorithm for Multiuser.- GSM Based Security Analysis for Add-SS Watermarking.- Video Watermarking Based on Spatio-temporal JND Profile.- On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography.- Balanced Multiwavelets Based Digital Image Watermarking.- A Generalised Model for Distortion Performance Analysis of Wavelet Based Watermarking.- Multiple Watermarking with Side Information.- Content Sharing Based on Personal Information in Virtually Secured Space.- Evaluation and Improvement of Digital Watermarking Algorithm Based on Cryptographic Security Models.- A Color Image Watermarking Scheme in the Associated Domain of DWT and DCT Domains Based on Multi-channel Watermarking Framework.- An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption.- First Digit Law and Its Application to Digital Forensics.- Digital Camera Identification from Images - Estimating False Acceptance Probability.- Design of Collusion-Resistant Fingerprinting Systems: Review and New Results.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.

Google Plus
Powered by Inooga