


default search action
3. IWDW 2004: Seoul, Korea
- Ingemar J. Cox, Ton Kalker, Heung-Kyu Lee:

Digital Watermarking, Third InternationalWorkshop, IWDW 2004, Seoul, SouthKorea, October 30 - November 1, 2004, Revised Selected Papers. Lecture Notes in Computer Science 3304, Springer 2005, ISBN 3-540-24839-0
Invited Lecture
- Yun Q. Shi:

Reversible Data Hiding. 1-12 - Hongmei Gou, Min Wu:

Fingerprinting Curves. 13-28 - Jeffrey A. Bloom, Matthew L. Miller:

Informed Detection Revisited. 29-41
Systems
- Gang Xue, Peizhong Lu, Jinlian Wang:

A Counter-Geometric Distortions Data Hiding Scheme Using Double Channels in Color Images. 42-54 - Guorong Xuan, Junxiang Zheng, Chengyun Yang, Yun Q. Shi, Dekun Zou, Liansheng Liu, Weichao Bai:

A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition. 55-65 - Xinshan Zhu, Yangsheng Wang:

Better Use of Human Visual Model in Watermarking Based on Linear Prediction Synthesis Filter. 66-76 - Tae Meon Bae, Seok Jun Kang, Yong Man Ro

:
Watermarking System for QoS Aware Content Adaptation. 77-88
Theory
- Glen E. Wheeler

, Reihaneh Safavi-Naini, Nicholas Paul Sheppard:
Weighted Segmented Digital Watermarking. 89-100 - Siho Kim, Keun-Sung Bae:

Robust Estimation of Amplitude Modification for Scalar Costa Scheme Based Audio Watermark Detection. 101-114 - Guorong Xuan, Chengyun Yang, Yizhan Zhen, Yun Q. Shi, Zhicheng Ni:

Reversible Data Hiding Using Integer Wavelet Transform and Companding Technique. 115-124
Authentication and Stego
- Hae Yong Kim

, Ricardo L. de Queiroz
:
Alteration-Locating Authentication Watermarking for Binary Images. 125-136 - Kisik Chang, Robert H. Deng

, Feng Bao, Sangjin Lee, HyungJun Kim:
On Security Notions of Steganographic Systems. 137-151 - Deng-Pan Ye, Yaobin Mao, Yuewei Dai, Zhiquan Wang:

A Multi-feature Based Invertible Authentication Watermarking for JPEG Images. 152-162 - Jeong Jae Yu, Changho Jung, Seok-Koo Yoon, Sangjin Lee:

Steganographic Scheme Using a Block Cipher. 163-170 - François Cayre, Caroline Fontaine, Teddy Furon:

Watermarking Attack: Security of WSS Techniques. 171-183
Cryptography
- Raphael Chung-Wei Phan, Huo-Chong Ling:

Flaws in Generic Watermarking Protocols Based on Zero-Knowledge Proofs. 184-191 - Tanmoy Kanti Das, Jianying Zhou, Subhamoy Maitra:

Cryptanalysis of a Wavelet Based Watermarking Scheme. 192-203 - Xianfeng Zhao

, Yingxia Dai, Dengguo Feng:
A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems. 204-217 - Xianfeng Zhao

, Yingxia Dai, Dengguo Feng:
Towards the Public but Noninvertible Watermarking. 218-231 - Jae-Gwi Choi, Ji-Hwan Park:

A Generalization of an Anonymous Buyer-Seller Watermarking Protocol and Its Application to Mobile Communications. 232-243
Methods
- David Megías, Jordi Herrera-Joancomartí

, Julià Minguillón:
Robust Frequency Domain Audio Watermarking: A Tuning Analysis. 244-258 - Wan Hyun Cho, Myung-Eun Lee, Hyun Lim, Soon-Young Park:

Watermarking Technique for Authentication of 3-D Polygonal Meshes. 259-270 - Chun-Hsiang Huang, Chih-Hao Shen, Ja-Ling Wu:

Fidelity-Controlled Robustness Enhancement of Blind Watermarking Schemes Using Evolutionary Computational Techniques. 271-282 - Jae-Won Cho, Min-Su Kim, Rémy Prost, Hyun-Yeol Chung, Ho-Youl Jung:

Robust Watermarking on Polygonal Meshes Using Distribution of Vertex Norms. 283-293 - Seung-Jin Kim, Suk Hwan Lee

, Tae-Su Kim, Ki-Ryong Kwon, Kuhn-Il Lee:
A Video Watermarking Using the 3-D Wavelet Transform and Two Perceptual Watermarks. 294-303

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














