Digital Watermarking

8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009. Proceedings

  • Anthony T. S. Ho
  • Yun Q. Shi
  • H. J. Kim
  • Mauro Barni
Conference proceedings IWDW 2009
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5703)

Table of contents

  1. Session V: Multimedia Watermarking and Security Protocols

    1. Ming Luo, Kai Wang, Adrian G. Bors, Guillaume Lavoué
      Pages 211-226
    2. Anu Pramila, Anja Keskinarkaus, Tapio Seppänen
      Pages 227-240
    3. Ahmad Mahmoudi Aznaveh, Azadeh Mansouri, Farah Torkamani-Azar
      Pages 241-251
    4. Geong Sen Poh, Keith M. Martin
      Pages 252-267
  2. Session VI: Image Forensics and Authentication

    1. Xinpeng Zhang, Shuozhong Wang, Guorui Feng
      Pages 268-278
    2. Kazuya Ohkita, Maki Yoshida, Itaru Kitamura, Toru Fujiwara
      Pages 279-293
    3. Guanshuo Xu, Shang Gao, Yun Qing Shi, RuiMin Hu, Wei Su
      Pages 294-307
    4. Wei Wang, Jing Dong, Tieniu Tan
      Pages 308-322
    5. Patchara Sutthiwan, Jingyu Ye, Yun Q. Shi
      Pages 323-335
  3. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 8th Interntaional Workshop, IWDW 2009, held in Guildford, Surrey, UK, August 24-26, 2009.

The 25 revised full papers, including 4 poster presentations, presented together with 3 invited papers were carefully reviewed and selected from 50 submissions. The papers are organized in topical sections on robust watermarking, video watermarking, steganography and steganalysis, multimedia watermarking and security protocols, as well as image forensics and authentication.

Keywords

3D H.264 authentication classification cryptography data hiding image forensics image watermarking information mpeg watermarking multimedia reversible watermarking security security protocols watermarking

Editors and affiliations

  • Anthony T. S. Ho
    • 1
  • Yun Q. Shi
    • 2
  • H. J. Kim
    • 3
  • Mauro Barni
    • 4
  1. 1.Faculty of Engineering and Physical Sciences, Department of ComputingUniversity of SurreyGuildford, SurreyUK
  2. 2.New Jersey Institute of TechnologyUniversity HeightsNewark, NJUSA
  3. 3.Multimedia Security LabKorea UniversitySeoulKorea
  4. 4.Department of Information EngineeringUniversity of SienaSienaItaly

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-03688-0
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-03687-3
  • Online ISBN 978-3-642-03688-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book