Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea, October 30 - November 1, 2004, Revised Selected PapersIngemar J. Cox, Ton Kalker, Heung-Kyu Lee Springer, 2005. gada 9. febr. - 306 lappuses We are happy to present to you the proceedings of the 3rd International Workshop on Digital Watermarking, IWDW 2004. Since its modern reappearance in the academic community in the early 1990s, great progress has been made in understanding both the capabilities and the weaknesses of digital watermarking. On the theoretical side, we all are now well aware of the fact that digital watermarking is best viewed as a form of communication using side information. In the case of digital watermarking the side information in question is the document to be watermarked. This insight has led to a better understanding of the limits of the capacity and robustness of digital watermarking algorithms. It has also led to new and improved watermarking algorithms, both in terms of capacity and imperceptibility. Similarly, the role of human perception, and models thereof, has been greatly enhanced in the study and design of digital watermarking algorithms and systems. On the practical side, applications of watermarking are not yet abundant. The original euphoria on the role of digital watermarking in copy protection and copyright protection has not resulted in widespread use in practical systems. With hindsight, a number of reasons can be given for this lack of practical applications. |
No grāmatas satura
1.–5. rezultāts no 78.
. lappuse
... Scheme Using Double Channels in Color Images Gang Xue, Peizhong Lu, Jinlian ... Watermarking and Fingerprint Recognition Guorong Xuan, Junxiang Zheng ... Watermarking Based on Linear Prediction Synthesis Filter Xinshan Zhu, Yangsheng Wang ...
... Scheme Using Double Channels in Color Images Gang Xue, Peizhong Lu, Jinlian ... Watermarking and Fingerprint Recognition Guorong Xuan, Junxiang Zheng ... Watermarking Based on Linear Prediction Synthesis Filter Xinshan Zhu, Yangsheng Wang ...
. lappuse
... Watermarking for JPEG Images Deng-Pan Ye, Yao-Bin Mao, Yue-Wei Dai, Zhi-Quan Wang....................... Steganographic Scheme Using a Block Cipher Jeong Jae Yu, Chang-ho Jung, Seok-Koo Yoon, Sangjin Lee ..................... Watermarking ...
... Watermarking for JPEG Images Deng-Pan Ye, Yao-Bin Mao, Yue-Wei Dai, Zhi-Quan Wang....................... Steganographic Scheme Using a Block Cipher Jeong Jae Yu, Chang-ho Jung, Seok-Koo Yoon, Sangjin Lee ..................... Watermarking ...
. lappuse
... Watermarking Schemes Using Evolutionary Computational Techniques Chun-Hsiang Huang, Chih-Hao Shen, Ja-Ling Wu .................................... Robust Watermarking on Polygonal Meshes Using Distribution of Vertex Norms Jae-Won Cho ...
... Watermarking Schemes Using Evolutionary Computational Techniques Chun-Hsiang Huang, Chih-Hao Shen, Ja-Ling Wu .................................... Robust Watermarking on Polygonal Meshes Using Distribution of Vertex Norms Jae-Won Cho ...
11. lappuse
... watermarking for multimedia,” in IEEE Trans. on Image Processing, vol. 6. No. 12, pp. 1673-1687, Dec. 1997. 2. J. Huang and Y. Q. Shi, “An adaptive image watermarking scheme based on visual masking,” Electronics Letters, 34 (8), pp. 748 ...
... watermarking for multimedia,” in IEEE Trans. on Image Processing, vol. 6. No. 12, pp. 1673-1687, Dec. 1997. 2. J. Huang and Y. Q. Shi, “An adaptive image watermarking scheme based on visual masking,” Electronics Letters, 34 (8), pp. 748 ...
29. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
Saturs
1 | |
Informed Detection Revisited | 29 |
A CounterGeometric Distortions Data Hiding Scheme Using | 42 |
A Secure InternetBased Personal Identity Verification System Using | 55 |
Watermarking System for QoS Aware Content Adaptation | 77 |
Robust Estimation of Amplitude Modification for Scalar Costa Scheme | 101 |
Reversible Data Hiding Using Integer Wavelet Transform | 115 |
Authentication and Stego | 125 |
Security of WSS Techniques | 171 |
Flaws in Generic Watermarking Protocols Based | 184 |
A Generalized Method for Constructing and Proving | 204 |
Towards the Public but Noninvertible Watermarking | 218 |
A Generalization of an Anonymous BuyerSeller Watermarking | 232 |
Watermarking Technique for Authentication of 3D Polygonal Meshes | 259 |
FidelityControlled Robustness Enhancement of Blind Watermarking | 271 |
A Video Watermarking Using the 3D Wavelet Transform | 294 |
Citi izdevumi - Skatīt visu
Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea ... Ingemar J. Cox Ierobežota priekšskatīšana - 2005 |
Digital Watermarking Ingemar Cox,Matthew Miller,Jeffrey Bloom,Mathew Miller Ierobežota priekšskatīšana - 2001 |
Bieži izmantoti vārdi un frāzes
affine transformation algorithm applied attacks authentication B-spline binary images bit-plane block buyer capacity coding companding compression Computer control points Costa’s cover-object cryptography define denotes detector digital watermarking distribution domain embed embedded watermark embedding pattern encrypted equation estimated experimental results extracted fingerprint frequency geometric distortions histogram I.J. Cox IEEE Image Processing imperceptibility Information Hiding invertible IWDW JPEG LNCS marked image marking frequencies matrix mesh model method modified Multimedia multiresolution analysis noninvertibility obtained optimal original image paper perceptual performance pixels polygonal mesh Proc proposed protocol PSNR quantization step random reverse engineering reversible data hiding robustness scaling Section sequence Signal Processing spatial spread spectrum Springer-Verlag steganographic termark transcoding transcoding parameter triangle verify vertex norms video transcoding visual watermark bit watermark detection watermark embedding watermark signal watermarked image watermarking algorithm watermarking scheme watermarking technique wavelet coefficient vectors wavelet transform zero-knowledge ZKWP system