


default search action
8. IWDW 2009: Guildford, UK
- Anthony T. S. Ho, Yun Q. Shi, H. J. Kim, Mauro Barni:

Digital Watermarking, 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009. Proceedings. Lecture Notes in Computer Science 5703, Springer 2009, ISBN 978-3-642-03687-3
Invited Lectures (Abstracts)
- Ingemar J. Cox:

Data Hiding and the Statistics of Images. 1 - Fred Piper:

The Changing Face of Cryptography. 2 - Edward J. Delp:

Forensic Techniques for Image Source Classification: A Comparative Study. 3
Robust Watermarking
- H. Y. Leung, Lee-Ming Cheng

, L. L. Cheng:
Digital Watermarking Schemes Using Multi-resolution Curvelet and HVS Model. 4-13 - Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara

:
Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques. 14-28 - Yong Wang, Jiwu Huang:

Robust AVS Audio Watermarking. 29-38 - Dieter Bardyn, Ann Dooms

, Tim Dams
, Peter Schelkens
:
Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG Attacks. 39-53 - Andrea Abrardo, Mauro Barni, Cesare Maria Carretti:

Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks. 54-68
Video Watermarking
- Huang Li, Jian Li, Hongmei Liu:

A Robust Watermarking for MPEG-2. 69-80 - Chong Chen, Jiangqun Ni, Jiwu Huang:

Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping. 81-95 - Dawen Xu

, Rangding Wang, Jicheng Wang:
Blind Digital Watermarking of Low Bit-Rate Advanced H.264/AVC Compressed Video. 96-109
Poster Session
- Marc Chaumont

:
Fast Embedding Technique for Dirty Paper Trellis Watermarking. 110-120 - Naveed Islam

, William Puech
, Robert Brouzet:
A Homomorphic Method for Sharing Secret Images. 121-135 - Jonathan Weir, Wei Qi Yan:

Dot-Size Variant Visual Cryptography. 136-148 - Niladri B. Puhan, Anthony Tung Shuen Ho

, Farook Sattar
:
High Capacity Data Hiding in Binary Document Images. 149-161
Steganography and Steganalysis
- Xueling Zheng, Liusheng Huang, Zhili Chen, Zhenshan Yu, Wei Yang:

Hiding Information by Context-Based Synonym Substitution. 162-169 - Semin Kim

, Wesley De Neve
, Yong Man Ro
:
A Statistical and Iterative Method for Data Hiding in Palette-Based Images. 170-183 - Andrew D. Ker:

Estimating the Information Theoretic Optimal Stego Noise. 184-198 - Jing Dong, Wei Wang

, Tieniu Tan:
Multi-class Blind Steganalysis Based on Image Run-Length Analysis. 199-210
Multimedia Watermarking and Security Protocols
- Ming Luo, Kai Wang, Adrian G. Bors

, Guillaume Lavoué:
Local Patch Blind Spectral Watermarking Method for 3D Graphics. 211-226 - Anu Pramila, Anja Keskinarkaus, Tapio Seppänen:

Reading Watermarks from Printed Binary Images with a Camera Phone. 227-240 - Geong Sen Poh, Keith M. Martin:

Classification Framework for Fair Content Tracing Protocols. 252-267
Image Forensics and Authentication
- Xinpeng Zhang, Shuozhong Wang, Guorui Feng:

Fragile Watermarking Scheme with Extensive Content Restoration Capability. 268-278 - Kazuya Ohkita, Maki Yoshida, Itaru Kitamura, Toru Fujiwara:

Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking. 279-293 - Guanshuo Xu, Shang Gao, Yun-Qing Shi, Ruimin Hu, Wei Su:

Camera-Model Identification Using Markovian Transition Probability Matrix. 294-307 - Wei Wang

, Jing Dong, Tieniu Tan:
A Survey of Passive Image Tampering Detection. 308-322 - Patchara Sutthiwan, Jingyu Ye

, Yun Q. Shi:
An Enhanced Statistical Approach to Identifying Photorealistic Images. 323-335

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














