Digital Watermarking

9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers

  • Hyoung-Joong Kim
  • Yun Qing Shi
  • Mauro Barni
Conference proceedings IWDW 2010

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6526)

Table of contents

  1. Front Matter
  2. Yu Qian Zhao, Frank Y. Shih, Yun Q. Shi
    Pages 1-11
  3. Xudong Zhao, Jianhua Li, Shenghong Li, Shilin Wang
    Pages 12-22
  4. Liang Zhao, Avishek Adhikari, Di Xiao, Kouichi Sakurai
    Pages 45-59
  5. Jonathan Weir, WeiQi Yan
    Pages 60-74
  6. Xinting Gao, Bo Qiu, JingJing Shen, Tian-Tsong Ng, Yun Qing Shi
    Pages 90-104
  7. Hong Cao, Alex C. Kot
    Pages 105-119
  8. H. Y. Leung, L. M. Cheng
    Pages 148-158
  9. Fangjun Huang, Yun Qing Shi, Jiwu Huang
    Pages 189-201
  10. Vasily Sachnev, Hyoung-Joong Kim
    Pages 202-210
  11. Xuping Zheng, Aixin Zhang, Shenghong Li, Bo Jin, Junhua Tang
    Pages 211-223
  12. Hefei Ling, Hui Feng, Fuhao Zou, Weiqi Yan, Zhengding Lu
    Pages 224-238
  13. Esla Timothy Anzaku, Hosik Sohn, Yong Man Ro
    Pages 239-250
  14. Zhili Chen, Liusheng Huang, Peng Meng, Wei Yang, Haibo Miao
    Pages 251-265
  15. Qingxiao Guan, Jing Dong, Tieniu Tan
    Pages 266-279
  16. Zahra Kavehvash, Shahrokh Ghaemmaghami
    Pages 293-304
  17. Xuping Huang, Akira Nishimura, Isao Echizen
    Pages 305-316
  18. Back Matter

About these proceedings


This book constitutes the thoroughly refereed post-conference
proceedings of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held in Seoul, Korea, in October 2010.

The 26 revised full papers presented were carefully reviewed and
selected from 48 submissions. The papers are organized in topical
sections on forensics, visual cryptography, robust watermarking,
steganography, fingerprinting, and steganalysis.


chroma spaces collusion resistance compression history copyright protection demosaicing digital fingerprinting digital watermarking error corection code feature fusion image database image forensics information hiding multi-biometrics optimization pattern substitution security source identification tampering detection tampering detection three dimensional image

Editors and affiliations

  • Hyoung-Joong Kim
    • 1
  • Yun Qing Shi
    • 2
  • Mauro Barni
    • 3
  1. 1.Graduate School of Information Management and Security, CISTKorea UniversitySeoulKorea
  2. 2.New Jersey Institute of TechnologyNewarkUSA
  3. 3.Department of Information EngineeringUniversity of SienaSienaItaly

Bibliographic information

Industry Sectors
Finance, Business & Banking
IT & Software