The SCEAS System
Navigation Menu

Conferences in DBLP

International Workshop on Digital Watermarking (iwdw)
2006 (conf/iwdw/2006)

  1. Ingemar J. Cox, Gwenaël J. Doërr, Teddy Furon
    Watermarking Is Not Cryptography. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:1-15 [Conf]
  2. Ton Kalker, Michael Malkin
    Secure Quantization Index Modulation Watermark Detection. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:16-18 [Conf]
  3. Andreas Westfeld
    Steganalysis in the Presence of Weak Cryptography and Encoding. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:19-34 [Conf]
  4. Kwangsoo Lee, Andreas Westfeld, Sangjin Lee
    Category Attack for LSB Steganalysis of JPEG Images. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:35-48 [Conf]
  5. Guorong Xuan, Yun Q. Shi, Cong Huang, Dongdong Fu, Xiuming Zhu, Peiqi Chai, Jianjiong Gao
    Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA). [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:49-60 [Conf]
  6. Bui Cong Nguyen, Sang Moon Yoon, Heung-Kyu Lee
    Multi Bit Plane Image Steganography. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:61-70 [Conf]
  7. Zhe-Ming Lu, Hao Luo, Jeng-Shyang Pan
    Reversible Watermarking for Error Diffused Halftone Images Using Statistical Features. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:71-81 [Conf]
  8. Anja Keskinarkaus, Anu Pramila, Tapio Seppänen, Jaakko J. Sauvola
    Wavelet Domain Print-Scan and JPEG Resilient Data Hiding Method. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:82-95 [Conf]
  9. C. Culnane, H. Treharne, Anthony T. S. Ho
    A New Multi-set Modulation Technique for Increasing Hiding Capacity of Binary Watermark for Print and Scan Processes. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:96-110 [Conf]
  10. Xinshan Zhu, Zhi Tang, Liesen Yang
    A Novel Multibit Watermarking Scheme Combining Spread Spectrum and Quantization. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:111-122 [Conf]
  11. Min-Su Kim, Jae-Won Cho, Rémy Prost, Ho-Youl Jung
    Wavelet Analysis Based Blind Watermarking for 3-D Surface Meshes. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:123-137 [Conf]
  12. Suk Hwan Lee, Ki-Ryong Kwon, Dong Kyue Kim
    Watermarking for 3D Keyframe Animation Based on Geometry and Interpolator. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:138-149 [Conf]
  13. Liesen Yang, Zongming Guo
    A Robust Video Watermarking Scheme Via Temporal Segmentation and Middle Frequency Component Adaptive Modification. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:150-161 [Conf]
  14. Ivan Damnjanovic, Ebroul Izquierdo
    Capacity Enhancement of Compressed Domain Watermarking Channel Using Duo-binary Coding. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:162-176 [Conf]
  15. Dongdong Fu, Yun Q. Shi, Wei Su
    Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:177-187 [Conf]
  16. Goo-Rak Kwon, Kwan-Hee Lee, Sang-Jae Nam, Sung-Jea Ko
    Intellectual Property Rights Management Using Combination Encryption in MPEG-4. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:188-196 [Conf]
  17. Dekun Zou, Jun Tian, Jeffrey Bloom, Jiefu Zhai
    Data Hiding in Film Grain. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:197-211 [Conf]
  18. Chao-Yong Hsu, Chun-Shien Lu, Soo-Chang Pei
    Joint Screening Halftoning and Visual Cryptography for Image Protection. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:212-225 [Conf]
  19. Shijun Xiang, Jiwu Huang, Rui Yang, Chuntao Wang, Hongmei Liu
    Robust Audio Watermarking Based on Low-Order Zernike Moments. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:226-240 [Conf]
  20. Siho Kim, Keun-Sung Bae
    Analysis of Optimal Search Interval for Estimation of Modified Quantization Step Size in Quantization-Based Audio Watermark Detection. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:241-252 [Conf]
  21. Johann Barbier, Eric Filiol, Kichenakoumar Mayoura
    Universal JPEG Steganalysis in the Compressed Frequency Domain. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:253-267 [Conf]
  22. Hwajong Oh, Kwangsoo Lee, Sangjin Lee
    Attack on JPEG2000 Steganography Using LRCA. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:268-281 [Conf]
  23. Gaurav Gupta, Josef Pieprzyk
    A Low-Cost Attack on Branch-Based Software Watermarking Schemes. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:282-293 [Conf]
  24. Chaw-Seng Woo, Jiang Du, Binh Pham
    Geometric Invariant Domain for Image Watermarking. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:294-307 [Conf]
  25. Zhongxuan Liu, Shiguo Lian, Ronggang Wang, Zhen Ren
    Desynchronization in Compression Process for Collusion Resilient Video Fingerprint. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:308-322 [Conf]
  26. Guorong Xuan, Qiuming Yao, Chengyun Yang, Jianjiong Gao, Peiqi Chai, Yun Q. Shi, Zhicheng Ni
    Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:323-332 [Conf]
  27. Yongjian Hu, Byeungwoo Jeon, Zhiquan Lin, Hui Yang
    Analysis and Comparison of Typical Reversible Watermarking Methods. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:333-347 [Conf]
  28. JinHa Hwang, Jong-Weon Kim, Jong-Uk Choi
    A Reversible Watermarking Based on Histogram Shifting. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:348-361 [Conf]
  29. Younhee Kim, Zoran Duric, Dana Richards
    Towards Lower Bounds on Embedding Distortion in Information Hiding. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:362-376 [Conf]
  30. Goo-Rak Kwon, Seung-Won Jung, Sang-Jae Nam, Sung-Jea Ko
    Improved Differential Energy Watermarking for Embedding Watermark. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:377-386 [Conf]
  31. Chih-Chieh Liu, Yu-Feng Kuo, Chun-Hsiang Huang, Ja-Ling Wu
    A Colorization Based Animation Broadcast System with Traitor Tracing Capability. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:387-396 [Conf]
  32. Hyun Park, Sung Hyun Lee, Young Shik Moon
    Adaptive Video Watermarking Utilizing Video Characteristics in 3D-DCT Domain. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:397-406 [Conf]
  33. Yong Geun Won, Tae Meon Bae, Yong Man Ro
    Scalable Protection and Access Control in Full Scalable Video Coding. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:407-421 [Conf]
  34. Hong-jie He, Jiashu Zhang, Heng-Ming Tai
    A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:422-432 [Conf]
  35. Aweke N. Lemma, Stefan Katzenbeisser, Mehmet Utku Celik, Michiel van der Veen
    Secure Watermark Embedding Through Partial Encryption. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:433-445 [Conf]
  36. Jiangqun Ni, Rongyue Zhang, Jiwu Huang, Chuntao Wang, Quanbo Li
    A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:446-460 [Conf]
  37. Shuiming Ye, Qibin Sun, Ee-Chien Chang
    Error Resilient Image Authentication Using Feature Statistical and Spatial Properties. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:461-472 [Conf]
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002