


default search action
6. IWDW 2007: Guangzhou, China
- Yun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser:

Digital Watermarking, 6th International Workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007, Proceedings. Lecture Notes in Computer Science 5041, Springer 2008, ISBN 978-3-540-92237-7
Invited Lecture
- Bede Liu:

Watermarking, a Mature Technology - Retrospect and Prospect. 1 - Ahmad-Reza Sadeghi:

The Marriage of Cryptography and Watermarking - Beneficial and Challenging for Secure Watermarking and Detection. 2-18 - Micah K. Johnson, Hany Farid:

Detecting Photographic Composites of People. 19-33
Watermark Security
- Raphael Chung-Wei Phan

, Bok-Min Goi
:
(In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005. 34-44 - Hans Georg Schaathun:

Attack Analysis for He & Wu's Joint Watermarking/Fingerprinting Scheme. 45-59 - Hao Luo, Zhe-Ming Lu, Jeng-Shyang Pan:

Multiple Watermarking in Visual Cryptography. 60-70 - Yeongyun Kim, Sung Ho Jin, Yong Man Ro

:
Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding. 71-86
Steganalysis
- Jing Dong, Xiaochuan Chen, Lei Guo, Tieniu Tan:

Fusion Based Blind Image Steganalysis by Boosting Feature Selection. 87-98 - Johann Barbier, Kichenakoumar Mayoura:

Steganalysis of Multi Bit Plane Image Steganography. 99-111 - Shunquan Tan, Jiwu Huang, Yun Q. Shi:

Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis. 112-126 - Christian Ullerich, Andreas Westfeld:

Weaknesses of MB2. 127-142 - Bin Li, Fangjun Huang, Shunquan Tan, Jiwu Huang, Yun Q. Shi:

Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis. 143-157 - Yun Q. Shi, Chunhua Chen, Guorong Xuan, Wei Su:

Steganalysis Versus Splicing Detection. 158-172
Authentication
- Chris Culnane

, Helen Treharne
, Anthony T. S. Ho
:
Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning. 173-187 - Huijuan Yang

, Alex ChiChung Kot:
A General Data Hiding Framework and Multi-level Signature for Binary Images. 188-202 - Walter Geisselhardt, Taswar Iqbal:

High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents. 203-221
Reversible Data Hiding
- Chin-Chen Chang, Wen-Chuan Wu:

Reversible Quantization-Index Modulation Using Neighboring Correlation. 222-232 - Zhe-Ming Lu, Zhen Li:

High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain. 233-243 - Yongjian Hu, Heung-Kyu Lee, Jianwei Li, Kaiying Chen:

Reversible Data Hiding Using Prediction Error Values Embedding. 244-253 - Vasiliy Sachnev, Hyoung-Joong Kim, Shijun Xiang, Jeho Nam:

An Improved Reversible Difference Expansion Watermarking Algorithm. 254-263 - Guorong Xuan, Yun Q. Shi, Peiqi Chai, Xia Cui, Zhicheng Ni, Xuefeng Tong:

Optimum Histogram Pair Based Image Lossless Data Embedding. 264-278
Robust Watermarking
- Anu Pramila, Anja Keskinarkaus, Tapio Seppänen:

Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding. 279-293 - Giulia Boato, Valentina Conotter, Francesco G. B. De Natale:

GA-Based Robustness Evaluation Method for Digital Image Watermarking. 294-307 - Pedro Comesaña

, Fernando Pérez-González
:
Dither Modulation in the Logarithmic Domain. 308-322
Poster Session
- Kyung-Su Kim, Dong-Hyuck Im, Young-Ho Suh, Heung-Kyu Lee:

A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack. 323-334 - Zhongxuan Liu, Shiguo Lian, Josselin Gautier, Ronggang Wang, Zhen Ren, Haila Wang:

Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption. 335-349 - Shuifa Sun, Bang Jun Lei, Sheng Zheng, Sam Kwong

, Xuejun Zhou:
Design an Aperiodic Stochastic Resonance Signal Processor for Digital Watermarking. 350-364 - Yanfang Du, Jing Zhang, Yuting Su:

Watermarking for Authentication of LZ-77 Compressed Documents. 365-372 - Rangding Wang, Wenji Hu:

Robust Audio Zero-Watermark Based on LWT and Chaotic Modulation. 373-381 - Linna Tang, Jiangqun Ni, Chuntao Wang, Rongyue Zhang:

A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone Images. 382-394
Theory and Methods in Watermarking
- Julien Lafaye:

On the Complexity of Obtaining Optimal Watermarking Schemes. 395-409 - Séverine Baudry, Philippe Nguyen:

A Theoretical Framework for Watermarking of Compressed Signals. 410-422 - Weina Jiang, Anthony T. S. Ho

, Helen Treharne
:
Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model. 423-439 - Yiqing Lin, Waleed H. Abdulla

:
Multiple Scrambling and Adaptive Synchronization for Audio Watermarking. 440-453 - Jason Dowling

, Birgit M. Planitz, Anthony J. Maeder
, Jiang Du, Binh Pham, Colin Boyd, Shaokang Chen, Andrew P. Bradley
, Stuart Crozier
:
A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality. 454-466 - Chin-Chen Chang, Chih-Yang Lin, Yu-Zheng Wang:

A High Payload VQ Steganographic Method for Binary Images. 467-481

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














