


Остановите войну!
for scientists:


default search action
4. IWDW 2005: Siena, Italy
- Mauro Barni, Ingemar J. Cox, Ton Kalker, Hyoung Joong Kim:
Digital Watermarking, 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings. Lecture Notes in Computer Science 3710, Springer 2005, ISBN 3-540-28768-X
Steganography and Steganalysis
- Junhui He, Jiwu Huang, Guoping Qiu:
A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography. 1-14 - Ingemar J. Cox
, Ton Kalker, Georg Pakura, Mathias Scheel:
Information Transmission and Steganography. 15-29 - Valery I. Korzhik, Guillermo Morales-Luna, Moon Ho Lee:
On the Existence of Perfect Stegosystems. 30-38 - Tomás Pevný
, Jessica J. Fridrich:
Towards Multi-class Blind Steganalyzer for JPEG Images. 39-53
Fingerprinting
- Seunglim Yong, Sang-Ho Lee:
An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption. 54-66 - Yan Zhu, Dengguo Feng, Wei Zou:
Collusion Secure Convolutional Spread Spectrum Fingerprinting. 67-83 - Shan He, Min Wu:
Performance Study on Multimedia Fingerprinting Employing Traceability Codes. 84-96 - Negar Kiyavash, Pierre Moulin:
Regular Simplex Fingerprints and Their Optimality Properties. 97-109
Watermarking I
- Jiangqun Ni, Rongyue Zhang, Jiwu Huang, Chuntao Wang:
A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet Domain. 110-123 - Xingliang Huang, Bo Zhang:
Robust Detection of Transform Domain Additive Watermarks. 124-138 - Xiangui Kang, Yun Q. Shi, Jiwu Huang, Wenjun Zeng:
Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis. 139-146
Attacks
- P. Vinod, Prabin Kumar Bora:
A New Inter-frame Collusion Attack and a Countermeasure. 147-157 - Roberto Caldelli
, Alessandro Piva
, Mauro Barni, Andrea Carboni:
Effectiveness of ST-DM Watermarking Against Intra-video Collusion. 158-170 - Ilaria Venturini:
Oracle Attacks and Covert Channels. 171-185 - Patrick Bas, Jarmo Hurri:
Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images. 186-200
Special Session on Watermarking Security
- Teddy Furon:
A Survey of Watermarking Security. 201-215 - Gwenaël J. Doërr, Jean-Luc Dugelay:
Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy. 216-230 - Miguel Soriano
, Marcel Fernandez, Josep Cotrina Navau:
Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information. 231-243 - José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Fernando Pérez-González, Thierry Pun:
Practical Data-Hiding: Additive Attacks Performance Analysis. 244-259 - Pedro Comesaña
, Luis Pérez-Freire, Fernando Pérez-González:
The Return of the Sensitivity Attack. 260-274
Watermarking of Unconventional Media
- In-Gook Chun:
Look Up Table(LUT) Method for Halftone Image Watermarking. 275-285 - Sergio Vicente Denser Pamboukian, Hae Yong Kim
:
New Public-Key Authentication Watermarking for JBIG2 Resistant to Parity Attacks. 286-298 - Balaji Venkatachalam:
Software Watermarking as a Proof of Identity: A Study of Zero Knowledge Proof Based Software Watermarking. 299-312 - Min-Su Kim, Sébastien Valette, Ho-Youl Jung, Rémy Prost:
Watermarking of 3D Irregular Meshes Based on Wavelet Multiresolution Analysis. 313-324
Channel Coding and Watermarking
- Marcos de Castro Pacitti, Weiler Alves Finamore:
Digital Watermarking Robustness and Fragility Characteristics: New Modelling and Coding Influence. 325-335 - Félix Balado:
New Geometric Analysis of Spread-Spectrum Data Hiding with Repetition Coding, with Implications for Side-Informed Schemes. 336-350 - Andrea Abrardo, Mauro Barni, Fernando Pérez-González
, Carlos Mosquera
:
Trellis-Coded Rational Dither Modulation for Digital Watermarking. 351-360
Theory
- Wei Sun, En-Hui Yang:
Closed-Form Formulas for Private Watermarking Capacities of Laplacian Sources with the Magnitude-Error Distortion Measure and Under Additive Attacks. 361-371 - Pierre Moulin, Ying Wang:
Improved QIM Strategies for Gaussian Watermarking. 372-386 - Mark T. Hogan, Félix Balado, Neil J. Hurley
, Guenole C. M. Silvestre:
On the Achievable Rate of Side Informed Embedding Techniques with Steganographic Constraints. 387-402 - Marcos de Castro Pacitti, Weiler Alves Finamore:
Performance Lower Bounds for Existing and New Uncoded Digital Watermarking Modulation Techniques. 403-417
Watermarking II
- Hae-Yeoun Lee, In Koo Kang, Heung-Kyu Lee, Young-Ho Suh:
Evaluation of Feature Extraction Techniques for Robust Watermarking. 418-431 - Patrizio Campisi, Alessandro Neri
:
Perceptual Video Watermarking in the 3D-DWT Domain Using a Multiplicative Approach. 432-443 - Amir Houman Sadr, Shahrokh Ghaemmaghami:
Robustness Enhancement of Content-Based Watermarks Using Entropy Masking Effect. 444-458
Applications
- Angela S. L. Wong, Matthew Sorell, Robert Clarke:
Secure Mutual Distrust Transaction Tracking Using Cryptographic Elements. 459-469 - Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, Cristina Nita-Rotaru:
ViWiD : Visible Watermarking Based Defense Against Phishing. 470-483

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.