Logo - springer
Slogan - springer

Computer Science - Security and Cryptology | Digital Watermarking - 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10,

Digital Watermarking

5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings

Shi, Yun Qing, Jeon, Byeungwoo (Eds.)

2006, XII, 474 p. Also available online.

Available Formats:

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.


(net) price for USA

ISBN 978-3-540-48827-9

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase

learn more about Springer eBooks

add to marked items


Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.


(net) price for USA

ISBN 978-3-540-48825-5

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days

add to marked items

This book constitutes the refereed proceedings of the 5th International Workshop on Digital Watermarking Secure Data Management, IWDW 2006, held in Jeju Island, Korea in November 2006.

The 34 revised full papers presented together with 3 invited lectures were carefully reviewed and selected from 76 submissions. The papers cover both theoretical and practical issues in digital watermarking and they feature such topics as steganography and steganalysis, data forensics, digital right management, secure watermarking, and their applications.

Content Level » Research

Keywords » copy protection - copyright protection - cryptography - data forensics - digital rights management - digital rights protection - digital watermarking - digital watermarking algorithms - digital watermarking attacks - digital watermarking systems - f - fingerprinting

Related subjects » General Issues - Information Systems and Applications - Security and Cryptology - Software Engineering - Theoretical Computer Science

Table of contents 

Watermarking Is Not Cryptography.- Secure Quantization Index Modulation Watermark Detection.- Steganalysis in the Presence of Weak Cryptography and Encoding.- Category Attack for LSB Steganalysis of JPEG Images.- Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA).- Multi Bit Plane Image Steganography.- Reversible Watermarking for Error Diffused Halftone Images Using Statistical Features.- Wavelet Domain Print-Scan and JPEG Resilient Data Hiding Method.- A New Multi-set Modulation Technique for Increasing Hiding Capacity of Binary Watermark for Print and Scan Processes.- A Novel Multibit Watermarking Scheme Combining Spread Spectrum and Quantization.- Wavelet Analysis Based Blind Watermarking for 3-D Surface Meshes.- Watermarking for 3D Keyframe Animation Based on Geometry and Interpolator.- A Robust Video Watermarking Scheme Via Temporal Segmentation and Middle Frequency Component Adaptive Modification.- Capacity Enhancement of Compressed Domain Watermarking Channel Using Duo-binary Coding.- Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition.- Intellectual Property Rights Management Using Combination Encryption in MPEG-4.- Data Hiding in Film Grain.- Joint Screening Halftoning and Visual Cryptography for Image Protection.- Robust Audio Watermarking Based on Low-Order Zernike Moments.- Analysis of Optimal Search Interval for Estimation of Modified Quantization Step Size in Quantization-Based Audio Watermark Detection.- Universal JPEG Steganalysis in the Compressed Frequency Domain.- Attack on JPEG2000 Steganography Using LRCA.- A Low-Cost Attack on Branch-Based Software Watermarking Schemes.- Geometric Invariant Domain for Image Watermarking.- Desynchronization in Compression Process for Collusion Resilient Video Fingerprint.- Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets.- Analysis and Comparison of Typical Reversible Watermarking Methods.- A Reversible Watermarking Based on Histogram Shifting.- Towards Lower Bounds on Embedding Distortion in Information Hiding.- Improved Differential Energy Watermarking for Embedding Watermark.- A Colorization Based Animation Broadcast System with Traitor Tracing Capability.- Adaptive Video Watermarking Utilizing Video Characteristics in 3D-DCT Domain.- Scalable Protection and Access Control in Full Scalable Video Coding.- A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication.- Secure Watermark Embedding Through Partial Encryption.- A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform.- Error Resilient Image Authentication Using Feature Statistical and Spatial Properties.

Popular Content within this publication 



Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Data Encryption.