TEST - Catálogo BURRF
   

Digital Watermarking : 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005. Proceedings / edited by Mauro Barni, Ingemar Cox, Ton Kalker, Hyoung-Joong Kim.

Por: Colaborador(es): Tipo de material: TextoTextoSeries Lecture Notes in Computer Science ; 3710Editor: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005Descripción: xii, 485 páginas Also available online. recurso en líneaTipo de contenido:
  • texto
Tipo de medio:
  • computadora
Tipo de portador:
  • recurso en línea
ISBN:
  • 9783540320524
Formatos físicos adicionales: Edición impresa:: Sin títuloClasificación LoC:
  • QA76.9.A25
Recursos en línea:
Contenidos:
Session I: Steganography and Steganalysis -- A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography -- Information Transmission and Steganography -- On the Existence of Perfect Stegosystems -- Towards Multi-class Blind Steganalyzer for JPEG Images -- Session II: Fingerprinting -- An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption -- Collusion Secure Convolutional Spread Spectrum Fingerprinting -- Performance Study on Multimedia Fingerprinting Employing Traceability Codes -- Regular Simplex Fingerprints and Their Optimality Properties -- Session III: Watermarking I -- A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet Domain -- Robust Detection of Transform Domain Additive Watermarks -- Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis -- Session IV: Attacks -- A New Inter-frame Collusion Attack and a Countermeasure -- Effectiveness of ST-DM Watermarking Against Intra-video Collusion -- Oracle Attacks and Covert Channels -- Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images -- Session V: Special Session on Watermarking Security -- A Survey of Watermarking Security -- Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy -- Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information -- Practical Data-Hiding: Additive Attacks Performance Analysis -- The Return of the Sensitivity Attack -- Session VI: Watermarking of Unconventional Media -- Look Up Table(LUT) Method for Halftone Image Watermarking -- New Public-Key Authentication Watermarking for JBIG2 Resistant to Parity Attacks -- Software Watermarking as a Proof of Identity: A Study of Zero Knowledge Proof Based Software Watermarking -- Watermarking of 3D Irregular Meshes Based on Wavelet Multiresolution Analysis -- Session VII: Channel Coding and Watermarking -- Digital Watermarking Robustness and Fragility Characteristics: New Modelling and Coding Influence -- New Geometric Analysis of Spread-Spectrum Data Hiding with Repetition Coding, with Implications for Side-Informed Schemes -- Trellis-Coded Rational Dither Modulation for Digital Watermarking -- Session VIII: Theory -- Closed-Form Formulas for Private Watermarking Capacities of Laplacian Sources with the Magnitude-Error Distortion Measure and Under Additive Attacks -- Improved QIM Strategies for Gaussian Watermarking -- On the Achievable Rate of Side Informed Embedding Techniques with Steganographic Constraints -- Performance Lower Bounds for Existing and New Uncoded Digital Watermarking Modulation Techniques -- Session IX: Watermarking II -- Evaluation of Feature Extraction Techniques for Robust Watermarking -- Perceptual Video Watermarking in the 3D-DWT Domain Using a Multiplicative Approach -- Robustness Enhancement of Content-Based Watermarks Using Entropy Masking Effect -- Session X: Applications -- Secure Mutual Distrust Transaction Tracking Using Cryptographic Elements -- ViWiD : Visible Watermarking Based Defense Against Phishing.
Resumen: This book constitutes the refereed proceedings of the 4th International Workshop on Digital Watermarking Secure Data Management, IWDW 2005, held in Siena, Italy in September 2005. The 31 revised full papers presented were carefully reviewed and selected from 74 submissions. The papers are organized in topical sections on steganography and steganalysis, fingerprinting, watermarking, attacks, watermarking security, watermarking of unconventional media, channel coding and watermarking, theory, and applications.
Valoración
    Valoración media: 0.0 (0 votos)
No hay ítems correspondientes a este registro

Springer eBooks

Session I: Steganography and Steganalysis -- A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography -- Information Transmission and Steganography -- On the Existence of Perfect Stegosystems -- Towards Multi-class Blind Steganalyzer for JPEG Images -- Session II: Fingerprinting -- An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption -- Collusion Secure Convolutional Spread Spectrum Fingerprinting -- Performance Study on Multimedia Fingerprinting Employing Traceability Codes -- Regular Simplex Fingerprints and Their Optimality Properties -- Session III: Watermarking I -- A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet Domain -- Robust Detection of Transform Domain Additive Watermarks -- Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis -- Session IV: Attacks -- A New Inter-frame Collusion Attack and a Countermeasure -- Effectiveness of ST-DM Watermarking Against Intra-video Collusion -- Oracle Attacks and Covert Channels -- Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images -- Session V: Special Session on Watermarking Security -- A Survey of Watermarking Security -- Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy -- Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information -- Practical Data-Hiding: Additive Attacks Performance Analysis -- The Return of the Sensitivity Attack -- Session VI: Watermarking of Unconventional Media -- Look Up Table(LUT) Method for Halftone Image Watermarking -- New Public-Key Authentication Watermarking for JBIG2 Resistant to Parity Attacks -- Software Watermarking as a Proof of Identity: A Study of Zero Knowledge Proof Based Software Watermarking -- Watermarking of 3D Irregular Meshes Based on Wavelet Multiresolution Analysis -- Session VII: Channel Coding and Watermarking -- Digital Watermarking Robustness and Fragility Characteristics: New Modelling and Coding Influence -- New Geometric Analysis of Spread-Spectrum Data Hiding with Repetition Coding, with Implications for Side-Informed Schemes -- Trellis-Coded Rational Dither Modulation for Digital Watermarking -- Session VIII: Theory -- Closed-Form Formulas for Private Watermarking Capacities of Laplacian Sources with the Magnitude-Error Distortion Measure and Under Additive Attacks -- Improved QIM Strategies for Gaussian Watermarking -- On the Achievable Rate of Side Informed Embedding Techniques with Steganographic Constraints -- Performance Lower Bounds for Existing and New Uncoded Digital Watermarking Modulation Techniques -- Session IX: Watermarking II -- Evaluation of Feature Extraction Techniques for Robust Watermarking -- Perceptual Video Watermarking in the 3D-DWT Domain Using a Multiplicative Approach -- Robustness Enhancement of Content-Based Watermarks Using Entropy Masking Effect -- Session X: Applications -- Secure Mutual Distrust Transaction Tracking Using Cryptographic Elements -- ViWiD : Visible Watermarking Based Defense Against Phishing.

This book constitutes the refereed proceedings of the 4th International Workshop on Digital Watermarking Secure Data Management, IWDW 2005, held in Siena, Italy in September 2005. The 31 revised full papers presented were carefully reviewed and selected from 74 submissions. The papers are organized in topical sections on steganography and steganalysis, fingerprinting, watermarking, attacks, watermarking security, watermarking of unconventional media, channel coding and watermarking, theory, and applications.

Para consulta fuera de la UANL se requiere clave de acceso remoto.

Universidad Autónoma de Nuevo León
Secretaría de Extensión y Cultura - Dirección de Bibliotecas @
Soportado en Koha