Digital Watermarking

4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005. Proceedings

  • Mauro Barni
  • Ingemar Cox
  • Ton Kalker
  • Hyoung-Joong Kim

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3710)

Table of contents

  1. Front Matter
  2. Session I: Steganography and Steganalysis

    1. Ingemar J. Cox, Ton Kalker, Georg Pakura, Mathias Scheel
      Pages 15-29
    2. Valery Korzhik, Guillermo Morales-Luna, Moon Ho Lee
      Pages 30-38
    3. Tomáš Pevný, Jessica Fridrich
      Pages 39-53
  3. Session II: Fingerprinting

  4. Session III: Watermarking I

    1. Jiangqun Ni, Rongyue Zhang, Jiwu Huang, Chuntao Wang
      Pages 110-123
    2. Xingliang Huang, Bo Zhang
      Pages 124-138
    3. Xiangui Kang, Yun Q. Shi, Jiwu Huang, Wenjun Zeng
      Pages 139-146
  5. Session IV: Attacks

    1. P. Vinod, P. K. Bora
      Pages 147-157
    2. Roberto Caldelli, Alessandro Piva, Mauro Barni, Andrea Carboni
      Pages 158-170
    3. Ilaria Venturini
      Pages 171-185
  6. Session V: Special Session on Watermarking Security

    1. Teddy Furon
      Pages 201-215
    2. Gwenaël Doërr, Jean-Luc Dugelay
      Pages 216-230
    3. Miguel Soriano, Marcel Fernandez, Josep Cotrina
      Pages 231-243
    4. J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, F. Pérez-González, T. Pun
      Pages 244-259

About these proceedings

Introduction

We are delighted to welcome the attendees of the Fourth International Wo- shop on Digital Watermarking (IWDW). Watermarking continues to generate strong academic interest. Commercialization of the technology is proceeding at a steadypace. We haveseen watermarkingadoptedfor DVD audio.Fingerpri- ing technology was successfully used to determine the source of pirated video material. Furthermore, a number of companies are using watermarking as an enabling technology for broadcast monitoring services. Watermarking of digital cinema contentis anticipated. Future applications may also come from areas- related to digital rights management. For example, the use of watermarking to enhance legacy broadcast and communication systems is now being considered. IWDW 2005 o?ers an opportunity to re?ect upon the state of the art in digital watermarking as well as discuss directions for future research and applications. This year we accepted 31 papers from 74 submissions. This 42% acceptance rate indicates our commitment to ensuring a very high quality conference. We thankthemembersoftheTechnicalProgramCommitteeformakingthispossible by their timely and insightful reviews. Thanks to their hard work this is the ?rst IWDW at which the ?nal proceedings are available to the participants at the time of the workshop as a Springer LNCS publication.

Keywords

3D Oracle Performance Resolution Trellis-Code algorithm algorithms copy protection copyright protection digital rights management digital rights protection digital watermarking digital watermarking algorithms fragile watermarkin security

Editors and affiliations

  • Mauro Barni
    • 1
  • Ingemar Cox
    • 2
  • Ton Kalker
    • 3
  • Hyoung-Joong Kim
    • 4
  1. 1.Dipartimento di Ingegneria dell’InformazioneUniversità degli Studi di SienaItaly
  2. 2.University College LondonTorrington PlaceUK
  3. 3.Hewlett-Packard LaboratoriesPalo AltoUSA
  4. 4.Multimedia Security LabKorea UniversitySeoulKorea

Bibliographic information

  • DOI https://doi.org/10.1007/11551492
  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-28768-1
  • Online ISBN 978-3-540-32052-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book