Digital Watermarking (Record no. 179787)

MARC details
000 -LEADER
fixed length control field 07325nam a22006855i 4500
001 - CONTROL NUMBER
control field 978-3-540-24624-4
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240423125614.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 121227s2004 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783540246244
-- 978-3-540-24624-4
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/b95658
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA268
072 #7 - SUBJECT CATEGORY CODE
Subject category code GPJ
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code URY
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM083000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code GPJ
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code URY
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.824
Edition number 23
245 10 - TITLE STATEMENT
Title Digital Watermarking
Medium [electronic resource] :
Remainder of title Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers /
Statement of responsibility, etc edited by Ton Kalker, Yong M. Ro, Ingemar J. Cox.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2004.
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg :
-- Imprint: Springer,
-- 2004.
300 ## - PHYSICAL DESCRIPTION
Extent XII, 604 p.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
International Standard Serial Number 1611-3349 ;
Volume number/sequential designation 2939
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Invited Talks -- The Importance of Aliasing in Structured Quantization Index Modulation Data Hiding -- Watermark Embedding for Black-Box Channels -- Image Steganography and Steganalysis: Concepts and Practice -- On the Integration of Watermarks and Cryptography -- I: DRM I -- Content-Dependent Anti-disclosure Image Watermark -- Performance Measurement of Watermark Embedding Patterns -- II: Theory -- Image Fusion Based Visible Watermarking Using Dual-Tree Complex Wavelet Transform -- Optimal Data-Hiding Strategies for Games with BER Payoffs -- Robust Wavelet-Based Information Hiding through Low-Density Parity-Check (LDPC) Codes -- III: Non-St+Stego -- Natural Language Watermarking Using Semantic Substitution for Chinese Text -- Resilient Information Hiding for Abstract Semi-structures -- Model-Based Steganography -- IV: Systems -- Authentication of 3-D Polygonal Meshes -- Use of Motion Estimation to Improve Video Watermarking for MPEG Encoders -- A Robust Printed Image Watermarking Based on Iterative Halftoning Method -- A Feature-Watermarking Scheme for JPEG Image Authentication -- V: Estimation -- An Intelligent Watermark Detection Decoder Based on Independent Component Analysis -- Coefficient Selection Methods for Scalable Spread Spectrum Watermarking -- Performance Analysis of Order Statistical Patchwork -- Rotation-Tolerant Watermark Detection Using Circular Harmonic Function Correlation Filter -- VI: Perception+Audio -- On Perceptual Quality of Watermarked Images – An Experimental Approach -- Audio Watermarking Based on Music Content Analysis: Robust against Time Scale Modification -- Multi-bit Video Watermarking Based on 3D DFT Using Perceptual Models -- EM Estimation of Scale Factor for Quantization-Based Audio Watermarking -- VII: DRM II -- Semi-fragile Watermarking for Tamper Proofing andAuthentication of Still Images -- Secure Video Watermarking via Embedding Strength Modulation -- On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving -- Posters -- RST-Resistant Image Watermarking Using Invariant Centroid and Reordered Fourier-Mellin Transform -- Robust Audio Watermarking Using Both DWT and Masking Effect -- Normalization Domain Watermarking Method Based on Pattern Extraction -- Robust Watermarking with Adaptive Receiving -- A Robust Logo Multiresolution Watermarking Based on Independent Component Analysis Extraction -- Highly Reliable Stochastic Perceptual Watermarking Model Based on Multiwavelet Transform -- Metadata Hiding for Content Adaptation -- Echo Watermarking in Sub-band Domain -- Modification of Polar Echo Kernel for Performance Improvement of Audio Watermarking -- Increasing Robustness of an Improved Spread Spectrum Audio Watermarking Method Using Attack Characterization -- Enhancement Methods of Image Quality in Screen Mark Attack -- A Method to Improve the Stego-Image Quality for Palette-Based Image Steganography -- A Secure Steganographic Scheme against Statistical Analyses -- A Three-Dimensional Watermarking Algorithm Using the DCT Transform of Triangle Strips -- High Quality Perceptual Steganographic Techniques -- A Watermarking Scheme Applicable for Fingerprinting Protocol -- A New Digital Watermarking for Architectural Design Drawing Using LINEs and ARCs Based on Vertex -- Public Watermark Detection Using Multiple Proxies and Secret Sharing -- Towards Generic Detection Scheme in Zero Knowledge Protocol for Blind Watermark Detection -- Lossless Watermarking Considering the Human Visual System -- Data-Hiding Capacity Improvement for Text Watermarking Using Space Coding Method.
520 ## - SUMMARY, ETC.
Summary, etc We are happy to present to you the proceedings of the 2nd International Workshop on Digital Watermarking, IWDW 2003. Since its modern re-appearance in the academic community in the early 1990s, great progress has been made in understanding both the capabilities and the weaknesses of digital watermarking. On the theoretical side, we all are now well aware of the fact that digital waterma- ing is best viewed as a form of communication using side information. In the case of digital watermarking the side information in question is the document to be wat- marked. This insight has led to a better understanding of the limits of the capacity and robustness of digital watermarking algorithms. It has also led to new and improved watermarking algorithms, both in terms of capacity and imperceptibility. Similarly, the role of human perception, and models thereof, has been greatly enhanced in the study and design of digital watermarking algorithms and systems. On the practical side, applications of watermarking are not yet abundant. The original euphoria on the role of digital watermarking in copy protection and copyright prot- tion has not resulted in widespread usage in practical systems. With hindsight, a n- ber of reasons can be given for this lack of practical applications.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers and civilization.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Operating systems (Computers).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Algorithms.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Multimedia systems.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electronic data processing
General subdivision Management.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptology.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers and Society.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Operating Systems.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Algorithms.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Multimedia Information Systems.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element IT Operations.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kalker, Ton.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Ro, Yong M.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Cox, Ingemar J.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783540210610
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783662181386
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Lecture Notes in Computer Science,
-- 1611-3349 ;
Volume number/sequential designation 2939
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/b95658">https://doi.org/10.1007/b95658</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
912 ## -
-- ZDB-2-LNC
912 ## -
-- ZDB-2-BAE
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-CSE-Springer

No items available.

© 2024 IIIT-Delhi, library@iiitd.ac.in