default search action
8. IWDW 2009: Guildford, UK
- Anthony T. S. Ho, Yun Q. Shi, H. J. Kim, Mauro Barni:
Digital Watermarking, 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009. Proceedings. Lecture Notes in Computer Science 5703, Springer 2009, ISBN 978-3-642-03687-3
Invited Lectures (Abstracts)
- Ingemar J. Cox:
Data Hiding and the Statistics of Images. 1 - Fred Piper:
The Changing Face of Cryptography. 2 - Edward J. Delp:
Forensic Techniques for Image Source Classification: A Comparative Study. 3
Robust Watermarking
- H. Y. Leung, Lee-Ming Cheng, L. L. Cheng:
Digital Watermarking Schemes Using Multi-resolution Curvelet and HVS Model. 4-13 - Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara:
Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques. 14-28 - Yong Wang, Jiwu Huang:
Robust AVS Audio Watermarking. 29-38 - Dieter Bardyn, Ann Dooms, Tim Dams, Peter Schelkens:
Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG Attacks. 39-53 - Andrea Abrardo, Mauro Barni, Cesare Maria Carretti:
Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks. 54-68
Video Watermarking
- Huang Li, Jian Li, Hongmei Liu:
A Robust Watermarking for MPEG-2. 69-80 - Chong Chen, Jiangqun Ni, Jiwu Huang:
Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping. 81-95 - Dawen Xu, Rangding Wang, Jicheng Wang:
Blind Digital Watermarking of Low Bit-Rate Advanced H.264/AVC Compressed Video. 96-109
Poster Session
- Marc Chaumont:
Fast Embedding Technique for Dirty Paper Trellis Watermarking. 110-120 - Naveed Islam, William Puech, Robert Brouzet:
A Homomorphic Method for Sharing Secret Images. 121-135 - Jonathan Weir, Wei Qi Yan:
Dot-Size Variant Visual Cryptography. 136-148 - Niladri B. Puhan, Anthony Tung Shuen Ho, Farook Sattar:
High Capacity Data Hiding in Binary Document Images. 149-161
Steganography and Steganalysis
- Xueling Zheng, Liusheng Huang, Zhili Chen, Zhenshan Yu, Wei Yang:
Hiding Information by Context-Based Synonym Substitution. 162-169 - Semin Kim, Wesley De Neve, Yong Man Ro:
A Statistical and Iterative Method for Data Hiding in Palette-Based Images. 170-183 - Andrew D. Ker:
Estimating the Information Theoretic Optimal Stego Noise. 184-198 - Jing Dong, Wei Wang, Tieniu Tan:
Multi-class Blind Steganalysis Based on Image Run-Length Analysis. 199-210
Multimedia Watermarking and Security Protocols
- Ming Luo, Kai Wang, Adrian G. Bors, Guillaume Lavoué:
Local Patch Blind Spectral Watermarking Method for 3D Graphics. 211-226 - Anu Pramila, Anja Keskinarkaus, Tapio Seppänen:
Reading Watermarks from Printed Binary Images with a Camera Phone. 227-240 - Geong Sen Poh, Keith M. Martin:
Classification Framework for Fair Content Tracing Protocols. 252-267
Image Forensics and Authentication
- Xinpeng Zhang, Shuozhong Wang, Guorui Feng:
Fragile Watermarking Scheme with Extensive Content Restoration Capability. 268-278 - Kazuya Ohkita, Maki Yoshida, Itaru Kitamura, Toru Fujiwara:
Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking. 279-293 - Guanshuo Xu, Shang Gao, Yun-Qing Shi, Ruimin Hu, Wei Su:
Camera-Model Identification Using Markovian Transition Probability Matrix. 294-307 - Wei Wang, Jing Dong, Tieniu Tan:
A Survey of Passive Image Tampering Detection. 308-322 - Patchara Sutthiwan, Jingyu Ye, Yun Q. Shi:
An Enhanced Statistical Approach to Identifying Photorealistic Images. 323-335
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.