Digital Watermarking (Record no. 96015)

000 -LEADER
fixed length control field 06867nam a22006615i 4500
001 - CONTROL NUMBER
control field 978-3-540-48827-9
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730200354.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100301s2006 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783540488279
-- 978-3-540-48827-9
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/11922841
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA268
072 #7 - SUBJECT CATEGORY CODE
Subject category code GPJ
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code URY
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM083000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code GPJ
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code URY
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.824
Edition number 23
245 10 - TITLE STATEMENT
Title Digital Watermarking
Medium [electronic resource] :
Remainder of title 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings /
Statement of responsibility, etc. edited by Yun Qing Shi, Byeungwoo Jeon.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2006.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Berlin, Heidelberg :
Name of producer, publisher, distributor, manufacturer Springer Berlin Heidelberg :
-- Imprint: Springer,
Date of production, publication, distribution, manufacture, or copyright notice 2006.
300 ## - PHYSICAL DESCRIPTION
Extent XII, 476 p.
Other physical details online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
Encoding format PDF
Source rda
490 1# - SERIES STATEMENT
Series statement Security and Cryptology,
International Standard Serial Number 2946-1863 ;
Volume/sequential designation 4283
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Watermarking Is Not Cryptography -- Secure Quantization Index Modulation Watermark Detection -- Steganalysis in the Presence of Weak Cryptography and Encoding -- Category Attack for LSB Steganalysis of JPEG Images -- Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA) -- Multi Bit Plane Image Steganography -- Reversible Watermarking for Error Diffused Halftone Images Using Statistical Features -- Wavelet Domain Print-Scan and JPEG Resilient Data Hiding Method -- A New Multi-set Modulation Technique for Increasing Hiding Capacity of Binary Watermark for Print and Scan Processes -- A Novel Multibit Watermarking Scheme Combining Spread Spectrum and Quantization -- Wavelet Analysis Based Blind Watermarking for 3-D Surface Meshes -- Watermarking for 3D Keyframe Animation Based on Geometry and Interpolator -- A Robust Video Watermarking Scheme Via Temporal Segmentation and Middle Frequency Component Adaptive Modification -- Capacity Enhancement of Compressed Domain Watermarking Channel Using Duo-binary Coding -- Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition -- Intellectual Property Rights Management Using Combination Encryption in MPEG-4 -- Data Hiding in Film Grain -- Joint Screening Halftoning and Visual Cryptography for Image Protection -- Robust Audio Watermarking Based on Low-Order Zernike Moments -- Analysis of Optimal Search Interval for Estimation of Modified Quantization Step Size in Quantization-Based Audio Watermark Detection -- Universal JPEG Steganalysis in the Compressed Frequency Domain -- Attack on JPEG2000 Steganography Using LRCA -- A Low-Cost Attack on Branch-Based Software Watermarking Schemes -- Geometric InvariantDomain for Image Watermarking -- Desynchronization in Compression Process for Collusion Resilient Video Fingerprint -- Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets -- Analysis and Comparison of Typical Reversible Watermarking Methods -- A Reversible Watermarking Based on Histogram Shifting -- Towards Lower Bounds on Embedding Distortion in Information Hiding -- Improved Differential Energy Watermarking for Embedding Watermark -- A Colorization Based Animation Broadcast System with Traitor Tracing Capability -- Adaptive Video Watermarking Utilizing Video Characteristics in 3D-DCT Domain -- Scalable Protection and Access Control in Full Scalable Video Coding -- A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication -- Secure Watermark Embedding Through Partial Encryption -- A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform -- Error Resilient Image Authentication Using Feature Statistical and Spatial Properties.
520 ## - SUMMARY, ETC.
Summary, etc. Welcome to the proceedings of the Fifth International Workshop on Digital Watermarking (IWDW). Since the first IWDW held in Seoul, Korea in 2002, it has been a focal point for meeting in person and disseminating valuable scientific and technological developments in watermarking. IWDW 2006 was held on Jeju, the dream island in Korea. The main theme of the workshop was "Meet the Challenges in this Digital World!" As we all know, digital watermarking and its related technologies have emerged as the key ingredients of this digital world. We report on new developments and discuss how to best utilize the watermarking and its related new technologies to cope with many challenging issues in this digital world. This year, we accepted 34 papers out of 76 highly qualified submissions from 14 different countries. Each paper was reviewed by three reviewers. The acceptance ratio of 44% indicates IWDW's continuing commitment to ensuring the quality of the workshop. In addition, we had three invited lectures and one panel discussion that shed invaluable insights to the watermarking community on new developments and future directions. The technical program featured such topics as steganography and steganalysis, data forensics, digital right management, secure watermarking, and their applications. The 34 accepted papers, three invited lectures, and the panel discussion covered both theoretical and practical issues that all of us can benefit from. Furthermore, 13 of the 34 papers were arranged in a poster session in order to facilitate more efficient and interactive information exchange.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
9 (RLIN) 1973
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data encryption (Computer science).
9 (RLIN) 9168
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Operating systems (Computers).
9 (RLIN) 5329
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Electronic data processing
General subdivision Management.
9 (RLIN) 163050
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers and civilization.
9 (RLIN) 21733
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Multimedia systems.
9 (RLIN) 11575
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Algorithms.
9 (RLIN) 3390
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptology.
9 (RLIN) 31769
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Operating Systems.
9 (RLIN) 37074
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element IT Operations.
9 (RLIN) 31703
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers and Society.
9 (RLIN) 31668
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Multimedia Information Systems.
9 (RLIN) 31575
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Algorithms.
9 (RLIN) 3390
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Shi, Yun Qing.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 163051
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Jeon, Byeungwoo.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 163052
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
9 (RLIN) 163053
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783540488255
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783540832591
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Security and Cryptology,
International Standard Serial Number 2946-1863 ;
Volume/sequential designation 4283
9 (RLIN) 163054
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/11922841">https://doi.org/10.1007/11922841</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
912 ## -
-- ZDB-2-LNC
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-Lecture Notes in CS

No items available.