Advertisement

Digital Watermarking

6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 Proceedings

  • Yun Q. Shi
  • Hyoung-Joong Kim
  • Stefan Katzenbeisser
Conference proceedings IWDW 2007

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5041)

Table of contents

  1. Front Matter
  2. Invited Lecture

  3. Session I: Watermark Security

  4. Session II: Steganalysis

    1. Jing Dong, Xiaochuan Chen, Lei Guo, Tieniu Tan
      Pages 87-98
    2. Johann Barbier, Kichenakoumar Mayoura
      Pages 99-111
    3. Christian Ullerich, Andreas Westfeld
      Pages 127-142
    4. Bin Li, Fangjun Huang, Shunquan Tan, Jiwu Huang, Yun Q. Shi
      Pages 143-157
    5. Yun Q. Shi, Chunhua Chen, Guorong Xuan, Wei Su
      Pages 158-172
  5. Session III: Authentication

  6. Session IV: Reversible Data Hiding

    1. Yongjian Hu, Heung-Kyu Lee, Jianwei Li, Kaiying Chen
      Pages 244-253
    2. Sachnev Vasiliy, Hyoung-Joong Kim, Shijun Xiang, Jeho Nam
      Pages 254-263
    3. Guorong Xuan, Yun Q. Shi, Peiqi Chai, Xia Cui, Zhicheng Ni, Xuefeng Tong
      Pages 264-278
  7. Session V: Robust Watermarking

    1. Anu Pramila, Anja Keskinarkaus, Tapio Seppänen
      Pages 279-293
    2. G. Boato, V. Conotter, F. G. B. De Natale
      Pages 294-307
    3. Pedro Comesaña, Fernando Pérez-González
      Pages 308-322
  8. Session VI: Poster Session

    1. Kyung-Su Kim, Dong-Hyuck Im, Young-Ho Suh, Heung-Kyu Lee
      Pages 323-334
    2. Zhongxuan Liu, Shiguo Lian, Josselin Gautier, Ronggang Wang, Zhen Ren, Haila Wang
      Pages 335-349
    3. Shuifa Sun, Bangjun Lei, Sheng Zheng, Sam Kwong, Xuejun Zhou
      Pages 350-364
    4. Yanfang Du, Jing Zhang, Yuting Su
      Pages 365-372
    5. Linna Tang, Jiangqun Ni, Chuntao Wang, Rongyue Zhang
      Pages 382-394
  9. Session VII: Theory and Methods in Watermarking

    1. Séverine Baudry, Philippe Nguyen
      Pages 410-422
    2. Jason Dowling, Birgit M. Planitz, Anthony J. Maeder, Jiang Du, Binh Pham, Colin Boyd et al.
      Pages 454-466
    3. Chin-Chen Chang, Chih-Yang Lin, Yu-Zheng Wang
      Pages 467-481
  10. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in December 2007.

The 24 revised full papers together with 3 invited papers were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on watermark security; steganalysis; authentication; reversible data hiding; robust watermarking; poster session; theory and methods in watermarking.

Keywords

JPEG access control algorithms audio watermarking calculus complexity cryptography encryption fingerprinting halftone images scrambling security signal processor steganography

Editors and affiliations

  • Yun Q. Shi
    • 1
  • Hyoung-Joong Kim
    • 2
  • Stefan Katzenbeisser
    • 3
  1. 1.New Jersey Institute of TechnologyUniversity HeightsNewarkUSA
  2. 2.Multimedia Security Lab, Science CampusKorea UniversitySeoulKorea
  3. 3.Philips Research EuropeInformation and System SecurityEindhovenThe Netherlands

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-92238-4
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-92237-7
  • Online ISBN 978-3-540-92238-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site