Listing 1 - 10 of 10 |
Sort by
|
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held in Seoul, Korea, in October 2010. The 26 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on forensics, visual cryptography, robust watermarking, steganography, fingerprinting, and steganalysis.
Engineering & Applied Sciences --- Computer Science --- Computer security --- Data protection --- Digital watermarking --- Watermarking, Digital --- Computer science. --- Data structures (Computer science). --- Data encryption (Computer science). --- Coding theory. --- Information storage and retrieval. --- Computer graphics. --- Image processing. --- Computer Science. --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Coding and Information Theory. --- Information Storage and Retrieval. --- Computer Graphics. --- Image Processing and Computer Vision. --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Automatic drafting --- Graphic data processing --- Graphics, Computer --- Computer art --- Graphic arts --- Electronic data processing --- Engineering graphics --- Image processing --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Informatics --- Science --- Digital techniques --- Image steganography --- Watermarks --- Data structures (Computer scienc. --- Information storage and retrieva. --- Computer vision. --- Cryptology. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Information retrieval. --- Data retrieval --- Data storage --- Discovery, Information --- Information discovery --- Information storage and retrieval --- Retrieval of information --- Documentation --- Information science --- Information storage and retrieval systems --- Machine vision --- Vision, Computer --- Artificial intelligence --- Pattern recognition systems --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Information theory. --- Optical data processing. --- Optical computing --- Visual data processing --- Bionics --- Integrated optics --- Photonics --- Computers --- Communication theory --- Communication --- Cybernetics --- Optical equipment
Choose an application
Welcome to the proceedings of the Fifth International Workshop on Digital Watermarking (IWDW). Since the first IWDW held in Seoul, Korea in 2002, it has been a focal point for meeting in person and disseminating valuable scientific and technological developments in watermarking. IWDW 2006 was held on Jeju, the dream island in Korea. The main theme of the workshop was “Meet the Challenges in this Digital World!” As we all know, digital watermarking and its related technologies have emerged as the key ingredients of this digital world. We report on new developments and discuss how to best utilize the watermarking and its related new technologies to cope with many challenging issues in this digital world. This year, we accepted 34 papers out of 76 highly qualified submissions from 14 different countries. Each paper was reviewed by three reviewers. The acceptance ratio of 44% indicates IWDW’s continuing commitment to ensuring the quality of the workshop. In addition, we had three invited lectures and one panel discussion that shed invaluable insights to the watermarking community on new developments and future directions. The technical program featured such topics as steganography and steganalysis, data forensics, digital right management, secure watermarking, and their applications. The 34 accepted papers, three invited lectures, and the panel discussion covered both theoretical and practical issues that all of us can benefit from. Furthermore, 13 of the 34 papers were arranged in a poster session in order to facilitate more efficient and interactive information exchange.
Computer security --- Data protection --- Digital watermarking --- Sécurité informatique --- Protection de l'information (Informatique) --- Filigranes numériques --- Congresses --- Congrès --- Systèmes informatiques --- Protection de l'information (informatique) --- Mesures de sûreté --- Computer Science --- Engineering & Applied Sciences --- Sécurité informatique --- Filigranes numériques --- Congrès --- EPUB-LIV-FT SPRINGER-B --- Watermarking, Digital --- Computer science. --- Operating systems (Computers). --- Data encryption (Computer science). --- Algorithms. --- Multimedia information systems. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Operating Systems. --- Management of Computing and Information Systems. --- Computers and Society. --- Multimedia Information Systems. --- Algorithm Analysis and Problem Complexity. --- Congresses. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Information storage and retrieval systems --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Informatics --- Science --- Communication systems --- Foundations --- Operating systems --- Image steganography --- Watermarks --- Information Systems. --- Multimedia systems. --- Computer software. --- Cryptology. --- Software, Computer --- Computer systems --- Filigranes numériques. --- Mesures de sûreté. --- Systèmes informatiques --- Filigranes numériques. --- Mesures de sûreté.
Choose an application
We are delighted to welcome the attendees of the Fourth International Wo- shop on Digital Watermarking (IWDW). Watermarking continues to generate strong academic interest. Commercialization of the technology is proceeding at a steadypace. We haveseen watermarkingadoptedfor DVD audio.Fingerpri- ing technology was successfully used to determine the source of pirated video material. Furthermore, a number of companies are using watermarking as an enabling technology for broadcast monitoring services. Watermarking of digital cinema contentis anticipated. Future applications may also come from areas- related to digital rights management. For example, the use of watermarking to enhance legacy broadcast and communication systems is now being considered. IWDW 2005 o?ers an opportunity to re?ect upon the state of the art in digital watermarking as well as discuss directions for future research and applications. This year we accepted 31 papers from 74 submissions. This 42% acceptance rate indicates our commitment to ensuring a very high quality conference. We thankthemembersoftheTechnicalProgramCommitteeformakingthispossible by their timely and insightful reviews. Thanks to their hard work this is the ?rst IWDW at which the ?nal proceedings are available to the participants at the time of the workshop as a Springer LNCS publication.
Data encryption (Computer science). --- Operating systems (Computers). --- Algorithms. --- Multimedia information systems. --- Computers and civilization. --- Management information systems. --- Computer science. --- Cryptology. --- Operating Systems. --- Algorithm Analysis and Problem Complexity. --- Multimedia Information Systems. --- Computers and Society. --- Management of Computing and Information Systems. --- Computer security --- Data protection --- Digital watermarking
Choose an application
We are delighted to welcome the attendees of the Fourth International Wo- shop on Digital Watermarking (IWDW). Watermarking continues to generate strong academic interest. Commercialization of the technology is proceeding at a steadypace. We haveseen watermarkingadoptedfor DVD audio.Fingerpri- ing technology was successfully used to determine the source of pirated video material. Furthermore, a number of companies are using watermarking as an enabling technology for broadcast monitoring services. Watermarking of digital cinema contentis anticipated. Future applications may also come from areas- related to digital rights management. For example, the use of watermarking to enhance legacy broadcast and communication systems is now being considered. IWDW 2005 o?ers an opportunity to re?ect upon the state of the art in digital watermarking as well as discuss directions for future research and applications. This year we accepted 31 papers from 74 submissions. This 42% acceptance rate indicates our commitment to ensuring a very high quality conference. We thankthemembersoftheTechnicalProgramCommitteeformakingthispossible by their timely and insightful reviews. Thanks to their hard work this is the ?rst IWDW at which the ?nal proceedings are available to the participants at the time of the workshop as a Springer LNCS publication.
Data encryption (Computer science). --- Operating systems (Computers). --- Algorithms. --- Multimedia information systems. --- Computers and civilization. --- Management information systems. --- Computer science. --- Cryptology. --- Operating Systems. --- Algorithm Analysis and Problem Complexity. --- Multimedia Information Systems. --- Computers and Society. --- Management of Computing and Information Systems. --- Computer security --- Data protection --- Digital watermarking
Choose an application
We are delighted to welcome the attendees of the Fourth International Wo- shop on Digital Watermarking (IWDW). Watermarking continues to generate strong academic interest. Commercialization of the technology is proceeding at a steadypace. We haveseen watermarkingadoptedfor DVD audio.Fingerpri- ing technology was successfully used to determine the source of pirated video material. Furthermore, a number of companies are using watermarking as an enabling technology for broadcast monitoring services. Watermarking of digital cinema contentis anticipated. Future applications may also come from areas- related to digital rights management. For example, the use of watermarking to enhance legacy broadcast and communication systems is now being considered. IWDW 2005 o?ers an opportunity to re?ect upon the state of the art in digital watermarking as well as discuss directions for future research and applications. This year we accepted 31 papers from 74 submissions. This 42% acceptance rate indicates our commitment to ensuring a very high quality conference. We thankthemembersoftheTechnicalProgramCommitteeformakingthispossible by their timely and insightful reviews. Thanks to their hard work this is the ?rst IWDW at which the ?nal proceedings are available to the participants at the time of the workshop as a Springer LNCS publication.
Data encryption (Computer science). --- Operating systems (Computers). --- Algorithms. --- Multimedia information systems. --- Computers and civilization. --- Management information systems. --- Computer science. --- Cryptology. --- Operating Systems. --- Algorithm Analysis and Problem Complexity. --- Multimedia Information Systems. --- Computers and Society. --- Management of Computing and Information Systems. --- Computer security --- Data protection --- Digital watermarking
Choose an application
We are happy to present to you the proceedings of the 3rd International Workshop on Digital Watermarking, IWDW 2004. Since its modern reappearance in the academic community in the early 1990s, great progress has been made in understanding both the capabilities and the weaknesses of digital watermarking. On the theoretical side, we all are now well aware of the fact that digital watermarking is best viewed as a form of communication using side information. In the case of digital watermarking the side information in question is the document to be watermarked. This insight has led to a better understanding of the limits of the capacity and robustness of digital watermarking algorithms. It has also led to new and improved watermarking algorithms, both in terms of capacity and imperceptibility. Similarly, the role of human perception, and models thereof, has been greatly enhanced in the study and design of digital watermarking algorithms and systems. On the practical side, applications of watermarking are not yet abundant. The original euphoria on the role of digital watermarking in copy protection and copyright protection has not resulted in widespread use in practical systems. With hindsight, a number of reasons can be given for this lack of practical applications.
Computer security --- Data protection --- Digital watermarking --- Sécurité informatique --- Protection de l'information (Informatique) --- Filigranes numériques --- Congresses. --- Congrès --- Computer Science --- Engineering & Applied Sciences --- Watermarking, Digital --- Computer science. --- Operating systems (Computers). --- Data encryption (Computer science). --- Algorithms. --- Multimedia information systems. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Operating Systems. --- Management of Computing and Information Systems. --- Computers and Society. --- Multimedia Information Systems. --- Algorithm Analysis and Problem Complexity. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Information storage and retrieval systems --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Informatics --- Science --- Communication systems --- Foundations --- Operating systems --- Image steganography --- Watermarks --- Information Systems. --- Multimedia systems. --- Computer software. --- Cryptology. --- Software, Computer --- Computer systems --- Cryptography. --- Electronic data processing --- IT Operations. --- Management. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)
Choose an application
This book constitutes the refereed proceedings of the 8th Interntaional Workshop, IWDW 2009, held in Guildford, Surrey, UK, August 24-26, 2009. The 25 revised full papers, including 4 poster presentations, presented together with 3 invited papers were carefully reviewed and selected from 50 submissions. The papers are organized in topical sections on robust watermarking, video watermarking, steganography and steganalysis, multimedia watermarking and security protocols, as well as image forensics and authentication.
Computer security --- Data protection --- Digital watermarking --- Computer Science --- Engineering & Applied Sciences --- Watermarking, Digital --- Computer science. --- Data structures (Computer science). --- Data encryption (Computer science). --- Coding theory. --- Information storage and retrieval. --- Computer graphics. --- Image processing. --- Computer Science. --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Coding and Information Theory. --- Information Storage and Retrieval. --- Computer Graphics. --- Image Processing and Computer Vision. --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Automatic drafting --- Graphic data processing --- Graphics, Computer --- Computer art --- Graphic arts --- Electronic data processing --- Engineering graphics --- Image processing --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Informatics --- Science --- Digital techniques --- Image steganography --- Watermarks --- Data structures (Computer scienc. --- Information storage and retrieva. --- Computer vision. --- Cryptology. --- Data Structures and Information Theory. --- Machine vision --- Vision, Computer --- Artificial intelligence --- Pattern recognition systems --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Information theory. --- Optical data processing. --- Optical computing --- Visual data processing --- Bionics --- Integrated optics --- Photonics --- Computers --- Communication theory --- Communication --- Cybernetics --- Optical equipment
Choose an application
We are happy to present to you the proceedings of the 2nd International Workshop on Digital Watermarking, IWDW 2003. Since its modern re-appearance in the academic community in the early 1990s, great progress has been made in understanding both the capabilities and the weaknesses of digital watermarking. On the theoretical side, we all are now well aware of the fact that digital waterma- ing is best viewed as a form of communication using side information. In the case of digital watermarking the side information in question is the document to be wat- marked. This insight has led to a better understanding of the limits of the capacity and robustness of digital watermarking algorithms. It has also led to new and improved watermarking algorithms, both in terms of capacity and imperceptibility. Similarly, the role of human perception, and models thereof, has been greatly enhanced in the study and design of digital watermarking algorithms and systems. On the practical side, applications of watermarking are not yet abundant. The original euphoria on the role of digital watermarking in copy protection and copyright prot- tion has not resulted in widespread usage in practical systems. With hindsight, a n- ber of reasons can be given for this lack of practical applications.
Computer science. --- Operating systems (Computers). --- Data encryption (Computer science). --- Computer software. --- Multimedia systems. --- Information Systems. --- Computer Science. --- Computers and Society. --- Operating Systems. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Multimedia Information Systems. --- Management of Computing and Information Systems. --- Computer security --- Data protection --- Digital watermarking --- Engineering & Applied Sciences --- Computer Science --- Watermarking, Digital --- Algorithms. --- Multimedia information systems. --- Computers and civilization. --- Management information systems. --- Image steganography --- Watermarks --- Cryptology. --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Information storage and retrieval systems --- Software, Computer --- Computer systems --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Operating systems --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Algorism --- Algebra --- Arithmetic --- Civilization and computers --- Civilization --- Communication systems --- Foundations
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Digital Watermarking, IWDW 2008, held in Busan, Korea, in November 2008. The 36 regular papers included in the volume were carefully reviewed and selected from 62 submissions. Areas of interest to the conference are mathematical modeling of embedding and detection; information theoretic, stochastic aspects of data hiding; security issues, including attacks and counter-attacks; combination of data hiding and cryptography; optimum watermark detection and reliable recovery; estimation of watermark capacity; channel coding techniques for watermarking; large-scale experimental tests and benchmarking; new statistical and perceptual models of content; reversible data hiding; data hiding in special media; data hiding and authentication; steganography and steganalysis; data forensics; copyright protection, DRM, and forensic watermarking; and visual cryptography.
Computer security --- Data protection --- Digital watermarking --- Computer Science --- Engineering & Applied Sciences --- Watermarking, Digital --- Computer science. --- Data structures (Computer science). --- Data encryption (Computer science). --- Coding theory. --- Computer science --- Computer graphics. --- Image processing. --- Computer Science. --- Data Encryption. --- Image Processing and Computer Vision. --- Computer Graphics. --- Data Structures, Cryptology and Information Theory. --- Coding and Information Theory. --- Discrete Mathematics in Computer Science. --- Mathematics. --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Automatic drafting --- Graphic data processing --- Graphics, Computer --- Computer art --- Graphic arts --- Electronic data processing --- Engineering graphics --- Image processing --- Computer mathematics --- Discrete mathematics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Informatics --- Science --- Digital techniques --- Mathematics --- Image steganography --- Watermarks --- Computer vision. --- Data structures (Computer scienc. --- Computational complexity. --- Cryptology. --- Data Structures and Information Theory. --- Complexity, Computational --- Machine vision --- Vision, Computer --- Artificial intelligence --- Pattern recognition systems --- Optical data processing. --- Information theory. --- Computer science—Mathematics. --- Communication theory --- Communication --- Cybernetics --- Optical computing --- Visual data processing --- Bionics --- Integrated optics --- Photonics --- Computers --- Optical equipment
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on Digital-forensics and Watermarking (IWDW 2011) held in Atlantic City, NJ, USA, during October 23-26, 2011. The 37 revised full papers presented were carefully selected from 59 submissions. Conference papers are organized in 6 technical sessions, covering the topics of steganography and steganalysis, watermarking, visual cryptography, forensics, anti-forensics, fingerprinting, privacy and security.
Data encryption (Computer science) --- Engineering & Applied Sciences --- Computer Science --- Data protection --- Computer science. --- Data structures (Computer science). --- Data encryption (Computer science). --- Information storage and retrieval. --- Computer graphics. --- Image processing. --- Computer Science. --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Information Storage and Retrieval. --- Computer Graphics. --- Image Processing and Computer Vision. --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Automatic drafting --- Graphic data processing --- Graphics, Computer --- Computer art --- Graphic arts --- Electronic data processing --- Engineering graphics --- Image processing --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Informatics --- Science --- Digital techniques --- Data structures (Computer scienc. --- Information storage and retrieva. --- Computer vision. --- Cryptology. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Information retrieval. --- Machine vision --- Vision, Computer --- Artificial intelligence --- Pattern recognition systems --- Data retrieval --- Data storage --- Discovery, Information --- Information discovery --- Information storage and retrieval --- Retrieval of information --- Documentation --- Information science --- Information storage and retrieval systems --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Optical data processing. --- Optical computing --- Visual data processing --- Bionics --- Integrated optics --- Photonics --- Computers --- Optical equipment
Listing 1 - 10 of 10 |
Sort by
|