Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea, October 30 - November 1, 2004, Revised Selected PapersWe are happy to present to you the proceedings of the 3rd International Workshop on Digital Watermarking, IWDW 2004. Since its modern reappearance in the academic community in the early 1990s, great progress has been made in understanding both the capabilities and the weaknesses of digital watermarking. On the theoretical side, we all are now well aware of the fact that digital watermarking is best viewed as a form of communication using side information. In the case of digital watermarking the side information in question is the document to be watermarked. This insight has led to a better understanding of the limits of the capacity and robustness of digital watermarking algorithms. It has also led to new and improved watermarking algorithms, both in terms of capacity and imperceptibility. Similarly, the role of human perception, and models thereof, has been greatly enhanced in the study and design of digital watermarking algorithms and systems. On the practical side, applications of watermarking are not yet abundant. The original euphoria on the role of digital watermarking in copy protection and copyright protection has not resulted in widespread use in practical systems. With hindsight, a number of reasons can be given for this lack of practical applications. |
Lietotāju komentāri - Rakstīt atsauksmi
Ierastajās vietās neesam atraduši nevienu atsauksmi.
Saturs
Invited Lecture | 1 |
Informed Detection Revisited | 29 |
A CounterGeometric Distortions Data Hiding Scheme Using | 42 |
A Secure InternetBased Personal Identity Verification System Using | 55 |
Watermarking System for QoS Aware Content Adaptation | 77 |
Robust Estimation of Amplitude Modification for Scalar Costa Scheme | 101 |
Reversible Data Hiding Using Integer Wavelet Transform | 115 |
Authentication and Stego | 125 |
Security of WSS Techniques | 171 |
Cryptography | 183 |
Cryptanalysis of a Wavelet Based Watermarking Scheme | 192 |
A Generalized Method for Constructing and Proving | 204 |
Towards the Public but Noninvertible Watermarking | 218 |
A Generalization of an Anonymous BuyerSeller Watermarking | 232 |
Methods | 244 |
Watermarking Technique for Authentication of 3D Polygonal Meshes | 259 |
On Security Notions of Steganographic Systems | 137 |
A Multifeature Based Invertible Authentication Watermarking | 152 |
Steganographic Scheme Using a Block Cipher | 163 |
FidelityControlled Robustness Enhancement of Blind Watermarking | 271 |
A Video Watermarking Using the 3D Wavelet Transform | 294 |
Citi izdevumi - Skatīt visu
Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea ... Ingemar J. Cox,Ton Kalker,Heung-Kyu Lee Ierobežota priekšskatīšana - 2005 |
Digital Watermarking Ingemar Cox,Matthew Miller,Jeffrey Bloom,Mathew Miller Ierobežota priekšskatīšana - 2001 |
Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea ... Ingemar J. Cox,Ton Kalker,Heung-Kyu Lee Priekšskatījums nav pieejams - 2005 |
Bieži izmantoti vārdi un frāzes
according addition algorithm analysis applied attacks audio authentication binary bits blind block buyer capacity changed coding coefficients compression Computer considered Construction corresponding cover curve data hiding define denotes detection detector different distortion distribution domain embed embedding equation error estimated example existing experiments extracted Figure fingerprint follows frame frequency function given IEEE invertible mark mean mesh method Multimedia noise norms Note obtained operation optimal original parameter pattern perceptual performance pixels points possible present problem proposed protocol quantization random References region represented reversible robustness sample scaling searching secret selected sequence shown shows signal similar spatial spectrum spread step Table technique transcoding transform triangle vector vertex visual watermark detection watermarked image watermarking scheme wavelet wavelet transform