This Book Constitutes The Thoroughly Refereed Post-conference Proceedings Of The 7th International Workshop On Digital Watermarking, Iwdw 2008, Held In Busan, Korea, In November 2008. The 36 Regular Papers Included In The Volume Were Carefully Reviewed And Selected From 62 Submissions. Areas Of Inte
[Lecture Notes in Computer Science] Digital Watermarking Volume 5450 || Evaluation and Improvement of Digital Watermarking Algorithm Based on Cryptographic Security Models
β Scribed by Kim, Hyoung-Joong; Katzenbeisser, Stefan; Ho, Anthony T. S.
- Book ID
- 118186621
- Publisher
- Springer Berlin Heidelberg
- Year
- 2009
- Tongue
- German
- Weight
- 345 KB
- Category
- Article
- ISBN
- 3642044387
No coin nor oath required. For personal study only.
β¦ Synopsis
This Book Constitutes The Thoroughly Refereed Post-conference Proceedings Of The 7th International Workshop On Digital Watermarking, Iwdw 2008, Held In Busan, Korea, In November 2008. The 36 Regular Papers Included In The Volume Were Carefully Reviewed And Selected From 62 Submissions. Areas Of Interest To The Conference Are Mathematical Modeling Of Embedding And Detection; Information Theoretic, Stochastic Aspects Of Data Hiding; Security Issues, Including Attacks And Counter-attacks; Combination Of Data Hiding And Cryptography; Optimum Watermark Detection And Reliable Recovery; Estimation Of Watermark Capacity; Channel Coding Techniques For Watermarking; Large-scale Experimental Tests And Benchmarking; New Statistical And Perceptual Models Of Content; Reversible Data Hiding; Data Hiding In Special Media; Data Hiding And Authentication; Steganography And Steganalysis; Data Forensics; Copyright Protection, Drm, And Forensic Watermarking; And Visual Cryptography.
π SIMILAR VOLUMES
The 5th International Conference on Information Security Practice and Expe- ence (ISPEC 2009) was held in Xiβan, China, April 13β15, 2009. The ISPEC conference series is an established forum that brings together - searchers and practitioners to provide a con?uence of new information security technol
The Refereed Post-proceedings Of The International Conference On Computational Intelligence And Security Are Presented In This Volume. The 116 Papers Were Submitted To Two Rounds Of Careful Review. Papers Cover Bio-inspired Computing, Evolutionary Computation, Learning Systems And Multi-agents, Cryp