000 05758nam a22006735i 4500
001 978-3-540-31805-7
003 DE-He213
005 20240730182200.0
007 cr nn 008mamaa
008 100715s2005 gw | s |||| 0|eng d
020 _a9783540318057
_9978-3-540-31805-7
024 7 _a10.1007/b106346
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aDigital Watermarking
_h[electronic resource] :
_bThird International Workshop, IWDW 2004, Seoul, Korea, October 30 - November 1, 2004, Revised Selected Papers /
_cedited by Ingemar J. Cox, Ton Kalker, Heung-Kyu Lee.
250 _a1st ed. 2005.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2005.
300 _aIX, 306 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v3304
505 0 _aInvited Lecture -- Reversible Data Hiding -- Fingerprinting Curves -- Informed Detection Revisited -- Session I: Systems -- A Counter-Geometric Distortions Data Hiding Scheme Using Double Channels in Color Images -- A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition -- Better Use of Human Visual Model in Watermarking Based on Linear Prediction Synthesis Filter -- Watermarking System for QoS Aware Content Adaptation -- Session II: Theory -- Weighted Segmented Digital Watermarking -- Robust Estimation of Amplitude Modification for Scalar Costa Scheme Based Audio Watermark Detection -- Reversible Data Hiding Using Integer Wavelet Transform and Companding Technique -- Session III: Authentication and Stego -- Alteration-Locating Authentication Watermarking for Binary Images -- On Security Notions of Steganographic Systems -- A Multi-feature Based Invertible Authentication Watermarking for JPEG Images -- Steganographic Scheme Using a Block Cipher -- Watermarking Attack: Security of WSS Techniques -- Session IV: Cryptography -- Flaws in Generic Watermarking Protocols Based on Zero-Knowledge Proofs -- Cryptanalysis of a Wavelet Based Watermarking Scheme -- A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems -- Towards the Public but Noninvertible Watermarking -- A Generalization of an Anonymous Buyer-Seller Watermarking Protocol and Its Application to Mobile Communications -- Session V: Methods -- Robust Frequency Domain Audio Watermarking: A Tuning Analysis -- Watermarking Technique for Authentication of 3-D Polygonal Meshes -- Fidelity-Controlled Robustness Enhancement of Blind Watermarking Schemes Using Evolutionary Computational Techniques -- Robust Watermarking on Polygonal Meshes Using Distributionof Vertex Norms -- A Video Watermarking Using the 3-D Wavelet Transform and Two Perceptual Watermarks.
520 _aWe are happy to present to you the proceedings of the 3rd International Workshop on Digital Watermarking, IWDW 2004. Since its modern reappearance in the academic community in the early 1990s, great progress has been made in understanding both the capabilities and the weaknesses of digital watermarking. On the theoretical side, we all are now well aware of the fact that digital watermarking is best viewed as a form of communication using side information. In the case of digital watermarking the side information in question is the document to be watermarked. This insight has led to a better understanding of the limits of the capacity and robustness of digital watermarking algorithms. It has also led to new and improved watermarking algorithms, both in terms of capacity and imperceptibility. Similarly, the role of human perception, and models thereof, has been greatly enhanced in the study and design of digital watermarking algorithms and systems. On the practical side, applications of watermarking are not yet abundant. The original euphoria on the role of digital watermarking in copy protection and copyright protection has not resulted in widespread use in practical systems. With hindsight, a number of reasons can be given for this lack of practical applications.
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aOperating systems (Computers).
_95329
650 0 _aElectronic data processing
_xManagement.
_9127435
650 0 _aComputers and civilization.
_921733
650 0 _aMultimedia systems.
_911575
650 0 _aAlgorithms.
_93390
650 1 4 _aCryptology.
_931769
650 2 4 _aOperating Systems.
_937074
650 2 4 _aIT Operations.
_931703
650 2 4 _aComputers and Society.
_931668
650 2 4 _aMultimedia Information Systems.
_931575
650 2 4 _aAlgorithms.
_93390
700 1 _aCox, Ingemar J.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9127436
700 1 _aKalker, Ton.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9127437
700 1 _aLee, Heung-Kyu.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9127438
710 2 _aSpringerLink (Online service)
_9127439
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540248392
776 0 8 _iPrinted edition:
_z9783540807810
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v3304
_9127440
856 4 0 _uhttps://doi.org/10.1007/b106346
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c91256
_d91256