:facetid:toc:\"db/conf/iwdw/iwdw2003.bht\"OK:facetid:toc:db/conf/iwdw/iwdw2003.bhtTon KalkerIngemar J. CoxYong Man RoDigital Watermarking, Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised PapersIWDWLecture Notes in Computer Science2939Springer2004Editorshipconf/iwdw/200310.1007/B95658https://doi.org/10.1007/b95658https://dblp.org/rec/conf/iwdw/2003URL#6095559Bassem Abdel-AzizJean-Yves ChouinardOn Perceptual Quality of Watermarked Images - An Experimental Approach.IWDW277-2882003Conference and Workshop Papersclosedconf/iwdw/Abdel-AzizC0310.1007/978-3-540-24624-4_21https://doi.org/10.1007/978-3-540-24624-4_21https://dblp.org/rec/conf/iwdw/Abdel-AzizC03URL#6191379André AdelsbachStefan Katzenbeisser 0001Ahmad-Reza SadeghiOn the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving.IWDW355-3692003Conference and Workshop Papersclosedconf/iwdw/AdelsbachKS0310.1007/978-3-540-24624-4_27https://doi.org/10.1007/978-3-540-24624-4_27https://dblp.org/rec/conf/iwdw/AdelsbachKS03URL#6191380Mohammad AwrangjebMohan S. KankanhalliLossless Watermarking Considering the Human Visual System.IWDW581-5922003Conference and Workshop Papersclosedconf/iwdw/AwrangjebK0310.1007/978-3-540-24624-4_47https://doi.org/10.1007/978-3-540-24624-4_47https://dblp.org/rec/conf/iwdw/AwrangjebK03URL#6191381Rajarathnam ChandramouliMehdi KharraziNasir D. MemonImage Steganography and Steganalysis: Concepts and Practice.IWDW35-492003Conference and Workshop Papersclosedconf/iwdw/ChandramouliKM0310.1007/978-3-540-24624-4_3https://doi.org/10.1007/978-3-540-24624-4_3https://dblp.org/rec/conf/iwdw/ChandramouliKM03URL#6191382Kisik ChangChangho JungSangjin Lee 0002Wooil YangHigh Quality Perceptual Steganographic Techniques.IWDW518-5312003Conference and Workshop Papersclosedconf/iwdw/ChangJLY0310.1007/978-3-540-24624-4_42https://doi.org/10.1007/978-3-540-24624-4_42https://dblp.org/rec/conf/iwdw/ChangJLY03URL#6191383Yuei-Lin ChiangLu-Ping ChangWen-Tai HsiehWen-Chih ChenNatural Language Watermarking Using Semantic Substitution for Chinese Text.IWDW129-1402003Conference and Workshop Papersclosedconf/iwdw/ChiangCHC0310.1007/978-3-540-24624-4_10https://doi.org/10.1007/978-3-540-24624-4_10https://dblp.org/rec/conf/iwdw/ChiangCHC03URL#6191384Jae-Won ChoHa-Joong ParkYoung HuhHyun-Yeol ChungHo-Youl JungEcho Watermarking in Sub-band Domain.IWDW447-4552003Conference and Workshop Papersclosedconf/iwdw/ChoPHCJ0310.1007/978-3-540-24624-4_35https://doi.org/10.1007/978-3-540-24624-4_35https://dblp.org/rec/conf/iwdw/ChoPHCJ03URL#6191385Hyon-Gon ChooWhoi-Yul KimData-Hiding Capacity Improvement for Text Watermarking Using Space Coding Method.IWDW593-5992003Conference and Workshop Papersclosedconf/iwdw/ChooK0310.1007/978-3-540-24624-4_48https://doi.org/10.1007/978-3-540-24624-4_48https://dblp.org/rec/conf/iwdw/ChooK03URL#6191386In-Gook ChunSangho HaA Robust Printed Image Watermarking Based on Iterative Halftoning Method.IWDW200-2112003Conference and Workshop Papersclosedconf/iwdw/ChunH0310.1007/978-3-540-24624-4_15https://doi.org/10.1007/978-3-540-24624-4_15https://dblp.org/rec/conf/iwdw/ChunH03URL#6191387Pedro ComesañaFernando Pérez-GonzálezFélix BaladoOptimal Data-Hiding Strategies for Games with BER Payoffs.IWDW101-1162003Conference and Workshop Papersclosedconf/iwdw/ComesanaPB0310.1007/978-3-540-24624-4_8https://doi.org/10.1007/978-3-540-24624-4_8https://dblp.org/rec/conf/iwdw/ComesanaPB03URL#6191388Nedeljko CvejicTapio SeppänenIncreasing Robustness of an Improved Spread Spectrum Audio Watermarking Method Using Attack Characterization.IWDW467-4732003Conference and Workshop Papersclosedconf/iwdw/CvejicS0310.1007/978-3-540-24624-4_37https://doi.org/10.1007/978-3-540-24624-4_37https://dblp.org/rec/conf/iwdw/CvejicS03URL#6191389Gwenaël J. DoërrJean-Luc DugelaySecure Video Watermarking via Embedding Strength Modulation.IWDW340-3542003Conference and Workshop Papersclosedconf/iwdw/DoerrD0310.1007/978-3-540-24624-4_26https://doi.org/10.1007/978-3-540-24624-4_26https://dblp.org/rec/conf/iwdw/DoerrD03URL#6191390Isao EchizenHiroshi YoshiuraYasuhiro FujiiSatoru TezukaUse of Motion Estimation to Improve Video Watermarking for MPEG Encoders.IWDW184-1992003Conference and Workshop Papersclosedconf/iwdw/EchizenYFT0310.1007/978-3-540-24624-4_14https://doi.org/10.1007/978-3-540-24624-4_14https://dblp.org/rec/conf/iwdw/EchizenYFT03URL#6191391Sang-Jin HanIn Su ChangRae-Hong ParkSemi-fragile Watermarking for Tamper Proofing and Authentication of Still Images.IWDW328-3392003Conference and Workshop Papersclosedconf/iwdw/HanCP0310.1007/978-3-540-24624-4_25https://doi.org/10.1007/978-3-540-24624-4_25https://dblp.org/rec/conf/iwdw/HanCP03URL#6191392Thai Duy HienZensho NakaoYen-Wei Chen 0001A Robust Logo Multiresolution Watermarking Based on Independent Component Analysis Extraction.IWDW408-4222003Conference and Workshop Papersclosedconf/iwdw/HienNC0310.1007/978-3-540-24624-4_32https://doi.org/10.1007/978-3-540-24624-4_32https://dblp.org/rec/conf/iwdw/HienNC03URL#6191393Yongjian HuJiwu HuangSam KwongYiu-Keung ChanImage Fusion Based Visible Watermarking Using Dual-Tree Complex Wavelet Transform.IWDW86-1002003Conference and Workshop Papersclosedconf/iwdw/HuHKC0310.1007/978-3-540-24624-4_7https://doi.org/10.1007/978-3-540-24624-4_7https://dblp.org/rec/conf/iwdw/HuHKC03URL#6191394Won Young HwangHwan Il KangSeung-Soo HanKab Il KimHwan Soo KangRobust Audio Watermarking Using Both DWT and Masking Effect.IWDW382-3892003Conference and Workshop Papersclosedconf/iwdw/HwangKHKK0310.1007/978-3-540-24624-4_29https://doi.org/10.1007/978-3-540-24624-4_29https://dblp.org/rec/conf/iwdw/HwangKHKK03URL#6191395Bong-Ju JangKwang-Seok MoonYoung HuhKi-Ryong KwonA New Digital Watermarking for Architectural Design Drawing Using LINEs and ARCs Based on Vertex.IWDW544-5572003Conference and Workshop Papersclosedconf/iwdw/JangMHK0310.1007/978-3-540-24624-4_44https://doi.org/10.1007/978-3-540-24624-4_44https://dblp.org/rec/conf/iwdw/JangMHK03URL#6191396Jeonghee JeonSang-Kwang LeeYo-Sung HoA Three-Dimensional Watermarking Algorithm Using the DCT Transform of Triangle Strips.IWDW508-5172003Conference and Workshop Papersclosedconf/iwdw/JeonLH0310.1007/978-3-540-24624-4_41https://doi.org/10.1007/978-3-540-24624-4_41https://dblp.org/rec/conf/iwdw/JeonLH03URL#6191397Yong Ju JungHo Kyung KangYong Man RoMetadata Hiding for Content Adaptation.IWDW435-4462003Conference and Workshop Papersclosedconf/iwdw/JungKR0310.1007/978-3-540-24624-4_34https://doi.org/10.1007/978-3-540-24624-4_34https://dblp.org/rec/conf/iwdw/JungKR03URL#6191398Xiangui KangJiwu HuangYun Q. Shi 0001Jianxiang ZhuRobust Watermarking with Adaptive Receiving.IWDW396-4072003Conference and Workshop Papersclosedconf/iwdw/KangHSZ0310.1007/978-3-540-24624-4_31https://doi.org/10.1007/978-3-540-24624-4_31https://dblp.org/rec/conf/iwdw/KangHSZ03URL#6191399Stefan Katzenbeisser 0001On the Integration of Watermarks and Cryptography.IWDW50-602003Conference and Workshop Papersclosedconf/iwdw/Katzenbeisser0310.1007/978-3-540-24624-4_4https://doi.org/10.1007/978-3-540-24624-4_4https://dblp.org/rec/conf/iwdw/Katzenbeisser03URL#6191400Bum-Soo KimJae-Gark ChoiKil-Houm ParkRST-Resistant Image Watermarking Using Invariant Centroid and Reordered Fourier-Mellin Transform.IWDW370-3812003Conference and Workshop Papersclosedconf/iwdw/KimCP0310.1007/978-3-540-24624-4_28https://doi.org/10.1007/978-3-540-24624-4_28https://dblp.org/rec/conf/iwdw/KimCP03URL#6191401Hyungshin KimB. V. K. Vijaya KumarRotation-Tolerant Watermark Detection Using Circular Harmonic Function Correlation Filter.IWDW263-2762003Conference and Workshop Papersclosedconf/iwdw/KimK0310.1007/978-3-540-24624-4_20https://doi.org/10.1007/978-3-540-24624-4_20https://dblp.org/rec/conf/iwdw/KimK03URL#6191402Siho KimHong-Seok KwonKeun-Sung BaeModification of Polar Echo Kernel for Performance Improvement of Audio Watermarking.IWDW456-4662003Conference and Workshop Papersclosedconf/iwdw/KimKB0310.1007/978-3-540-24624-4_36https://doi.org/10.1007/978-3-540-24624-4_36https://dblp.org/rec/conf/iwdw/KimKB03URL#6191403Ki Hyun KimYong Man RoEnhancement Methods of Image Quality in Screen Mark Attack.IWDW474-4822003Conference and Workshop Papersclosedconf/iwdw/KimR0310.1007/978-3-540-24624-4_38https://doi.org/10.1007/978-3-540-24624-4_38https://dblp.org/rec/conf/iwdw/KimR03URL#6191404Hyojeong KukYong Cheol KimPerformance Analysis of Order Statistical Patchwork.IWDW247-2622003Conference and Workshop Papersclosedconf/iwdw/KukK0310.1007/978-3-540-24624-4_19https://doi.org/10.1007/978-3-540-24624-4_19https://dblp.org/rec/conf/iwdw/KukK03URL#6191405Minoru KuribayashiHatsukazu TanakaA Watermarking Scheme Applicable for Fingerprinting Protocol.IWDW532-5432003Conference and Workshop Papersclosedconf/iwdw/KuribayashiT0310.1007/978-3-540-24624-4_43https://doi.org/10.1007/978-3-540-24624-4_43https://dblp.org/rec/conf/iwdw/KuribayashiT03URL#6191406Ki-Ryong KwonJi-Hwan ParkEung-Joo LeeAhmed H. TewfikHighly Reliable Stochastic Perceptual Watermarking Model Based on Multiwavelet Transform.IWDW423-4342003Conference and Workshop Papersclosedconf/iwdw/KwonPLT0310.1007/978-3-540-24624-4_33https://doi.org/10.1007/978-3-540-24624-4_33https://dblp.org/rec/conf/iwdw/KwonPLT03URL#6191407Si-Woong LeeJae-Gark ChoiHyun Soo KangJin Woo HongHyoung Joong KimNormalization Domain Watermarking Method Based on Pattern Extraction.IWDW390-3952003Conference and Workshop Papersclosedconf/iwdw/LeeCKHK0310.1007/978-3-540-24624-4_30https://doi.org/10.1007/978-3-540-24624-4_30https://dblp.org/rec/conf/iwdw/LeeCKHK03URL#6191408Young-Yoon LeeHan-Seung JungSang Uk LeeMulti-bit Video Watermarking Based on 3D DFT Using Perceptual Models.IWDW301-3152003Conference and Workshop Papersclosedconf/iwdw/LeeJL0310.1007/978-3-540-24624-4_23https://doi.org/10.1007/978-3-540-24624-4_23https://dblp.org/rec/conf/iwdw/LeeJL03URL#6191409Kiryung LeeDong Sik KimTaejeong KimKyung-Ae MoonEM Estimation of Scale Factor for Quantization-Based Audio Watermarking.IWDW316-3272003Conference and Workshop Papersclosedconf/iwdw/LeeKKM0310.1007/978-3-540-24624-4_24https://doi.org/10.1007/978-3-540-24624-4_24https://dblp.org/rec/conf/iwdw/LeeKKM03URL#6191410Wei Li 0012Xiangyang XueAudio Watermarking Based on Music Content Analysis: Robust against Time Scale Modification.IWDW289-3002003Conference and Workshop Papersclosedconf/iwdw/LiA0310.1007/978-3-540-24624-4_22https://doi.org/10.1007/978-3-540-24624-4_22https://dblp.org/rec/conf/iwdw/LiA03URL#6191411Qiming LiEe-Chien ChangPublic Watermark Detection Using Multiple Proxies and Secret Sharing.IWDW558-5692003Conference and Workshop Papersclosedconf/iwdw/LiC0310.1007/978-3-540-24624-4_45https://doi.org/10.1007/978-3-540-24624-4_45https://dblp.org/rec/conf/iwdw/LiC03URL#6191412Zhang LiSam KwongMarian ChoyWei-wei XiaoJi ZhenJi-hong ZhangAn Intelligent Watermark Detection Decoder Based on Independent Component Analysis.IWDW223-2342003Conference and Workshop Papersclosedconf/iwdw/LiKCXZZ0310.1007/978-3-540-24624-4_17https://doi.org/10.1007/978-3-540-24624-4_17https://dblp.org/rec/conf/iwdw/LiKCXZZ03URL#6191413Hsueh-Yi Sean LinHong-Yuan Mark LiaoChun-Shien LuJa-Chen LinAuthentication of 3-D Polygonal Meshes.IWDW168-1832003Conference and Workshop Papersclosedconf/iwdw/LinLLL0310.1007/978-3-540-24624-4_13https://doi.org/10.1007/978-3-540-24624-4_13https://dblp.org/rec/conf/iwdw/LinLLL03URL#6191414Chun-Shien LuChao-Yong HsuContent-Dependent Anti-disclosure Image Watermark.IWDW61-762003Conference and Workshop Papersclosedconf/iwdw/LuH0310.1007/978-3-540-24624-4_5https://doi.org/10.1007/978-3-540-24624-4_5https://dblp.org/rec/conf/iwdw/LuH03URL#6191415Fernando Pérez-GonzálezThe Importance of Aliasing in Structured Quantization Index Modulation Data Hiding.IWDW1-172003Conference and Workshop Papersclosedconf/iwdw/Perez-Gonzalez0310.1007/978-3-540-24624-4_1https://doi.org/10.1007/978-3-540-24624-4_1https://dblp.org/rec/conf/iwdw/Perez-Gonzalez03URL#6191416Angela PiperReihaneh Safavi-NainiAlfred MertinsCoefficient Selection Methods for Scalable Spread Spectrum Watermarking.IWDW235-2462003Conference and Workshop Papersclosedconf/iwdw/PiperSM0310.1007/978-3-540-24624-4_18https://doi.org/10.1007/978-3-540-24624-4_18https://dblp.org/rec/conf/iwdw/PiperSM03URL#6191417Phil SalleeModel-Based Steganography.IWDW154-1672003Conference and Workshop Papersclosedconf/iwdw/Sallee0310.1007/978-3-540-24624-4_12https://doi.org/10.1007/978-3-540-24624-4_12https://dblp.org/rec/conf/iwdw/Sallee03URL#6191418Robert ScealyReihaneh Safavi-NainiNicholas Paul SheppardPerformance Measurement of Watermark Embedding Patterns.IWDW77-852003Conference and Workshop Papersclosedconf/iwdw/ScealySS0310.1007/978-3-540-24624-4_6https://doi.org/10.1007/978-3-540-24624-4_6https://dblp.org/rec/conf/iwdw/ScealySS03URL#6191419Radu SionMikhail J. AtallahSunil PrabhakarResilient Information Hiding for Abstract Semi-structures.IWDW141-1532003Conference and Workshop Papersclosedconf/iwdw/SionAP0310.1007/978-3-540-24624-4_11https://doi.org/10.1007/978-3-540-24624-4_11https://dblp.org/rec/conf/iwdw/SionAP03URL#6191420Patrick Hang Hui ThenWang Yin ChaiTowards Generic Detection Scheme in Zero Knowledge Protocol for Blind Watermark Detection.IWDW570-5802003Conference and Workshop Papersclosedconf/iwdw/ThenW0310.1007/978-3-540-24624-4_46https://doi.org/10.1007/978-3-540-24624-4_46https://dblp.org/rec/conf/iwdw/ThenW03URL#6191421Jinshen WangYuewei DaiStefan ThiemertZhiquan WangA Feature-Watermarking Scheme for JPEG Image Authentication.IWDW212-2222003Conference and Workshop Papersclosedconf/iwdw/WangDTW0310.1007/978-3-540-24624-4_16https://doi.org/10.1007/978-3-540-24624-4_16https://dblp.org/rec/conf/iwdw/WangDTW03URL#6191422Mei-Yi WuYu-Kun HoJia-Hong LeeA Method to Improve the Stego-Image Quality for Palette-Based Image Steganography.IWDW483-4962003Conference and Workshop Papersclosedconf/iwdw/WuHL0310.1007/978-3-540-24624-4_39https://doi.org/10.1007/978-3-540-24624-4_39https://dblp.org/rec/conf/iwdw/WuHL03URL#6191423Yu YiMoon Ho LeeJi Hyun KimGi Yean HwangRobust Wavelet-Based Information Hiding through Low-Density Parity-Check (LDPC) Codes.IWDW117-1282003Conference and Workshop Papersclosedconf/iwdw/YiLKH0310.1007/978-3-540-24624-4_9https://doi.org/10.1007/978-3-540-24624-4_9https://dblp.org/rec/conf/iwdw/YiLKH03URL#6191424Jeong Jae YuJae Won HanKwang Su LeeSeung Cheol OSangjin Lee 0002Il Hwan ParkA Secure Steganographic Scheme against Statistical Analyses.IWDW497-5072003Conference and Workshop Papersclosedconf/iwdw/YuHLOLP0310.1007/978-3-540-24624-4_40https://doi.org/10.1007/978-3-540-24624-4_40https://dblp.org/rec/conf/iwdw/YuHLOLP03URL#6191425