© 2009

Digital Watermarking

7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008. Selected Papers

  • Hyoung-Joong Kim
  • Stefan Katzenbeisser
  • Anthony T. S. Ho
Conference proceedings IWDW 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5450)

Table of contents

  1. Front Matter
  2. Jian Li, Hongmei Liu, Jiwu Huang, Yongping Zhang
    Pages 1-15
  3. Sam Behseta, Charles Lam, Joseph E. Sutton, Robert L. Webb
    Pages 31-44
  4. Xinghao Jiang, Tanfeng Sun, Jianhua Li, Ye Yun
    Pages 45-51
  5. Mehdi Fallahpour, David Megías
    Pages 52-60
  6. Jing Dong, Wei Wang, Tieniu Tan, Yun Q. Shi
    Pages 76-87
  7. Leida Li, Baolong Guo, Jeng-Shyang Pan, Liu Yang
    Pages 88-102
  8. Yongping Zhang, Xiangui Kang, Philipp Zhang
    Pages 103-112
  9. Maliheh Shirvanian, Farah Torkamani Azar
    Pages 113-123
  10. Rui Yang, Xiangui Kang, Jiwu Huang
    Pages 124-138
  11. Kaituo Li, Dan Zhang, De-ren Chen
    Pages 170-183
  12. Yifeng Sun, Fenlin Liu, Bin Liu, Ping Wang
    Pages 184-198
  13. Arijit Sur, Piyush Goel, Jayanta Mukhopadhyay
    Pages 199-208
  14. Vasiliy Sachnev, Hyoung Joong Kim, Rongyue Zhang, Yong Soo Choi
    Pages 209-217
  15. Ting Li, Yao Zhao, Rongrong Ni, Lifang Yu
    Pages 218-228

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Digital Watermarking, IWDW 2008, held in Busan, Korea, in November 2008.

The 36 regular papers included in the volume were carefully reviewed and selected from 62 submissions. Areas of interest to the conference are mathematical modeling of embedding and detection; information theoretic, stochastic aspects of data hiding; security issues, including attacks and counter-attacks; combination of data hiding and cryptography; optimum watermark detection and reliable recovery; estimation of watermark capacity; channel coding techniques for watermarking; large-scale experimental tests and benchmarking; new statistical and perceptual models of content; reversible data hiding; data hiding in special media; data hiding and authentication; steganography and steganalysis; data forensics; copyright protection, DRM, and forensic watermarking; and visual cryptography.


DRM authentication cryptography digital rights management encryption fingerprinting information movie fingerprinting security steganalysis steganography

Editors and affiliations

  • Hyoung-Joong Kim
    • 1
  • Stefan Katzenbeisser
    • 2
  • Anthony T. S. Ho
    • 3
  1. 1.Graduate School of Information Management & Security, CISTKorea UniversitySeoulKorea
  2. 2.Security Engineering GroupTechnische Universität DarmstadtDarmstadtGermany
  3. 3.Faculty of Engineering and Physical Sciences, Department of ComputingUniversity of SurreyGuildfordUK

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking