Digital Watermarking

Third International Workshop, IWDW 2004, Seoul, South Korea, October 30 - November 1, 2004, Revised Selected Papers

  • Ingemar J. Cox
  • Ton Kalker
  • Heung-Kyu Lee
Conference proceedings IWDW 2004

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3304)

Table of contents

  1. Front Matter
  2. Invited Lecture

    1. Yun Q. Shi
      Pages 1-12
    2. Hongmei Gou, Min Wu
      Pages 13-28
    3. Jeffrey A. Bloom, Matt L. Miller
      Pages 29-41
  3. Session I: Systems

    1. Guorong Xuan, Junxiang Zheng, Chengyun Yang, Yun Q. Shi, Dekun Zou, Liu Liansheng et al.
      Pages 55-65
    2. Tae Meon Bae, Seok Jun Kang, Yong Man Ro
      Pages 77-88
  4. Session II: Theory

    1. Glen E. Wheeler, Reihaneh Safavi-Naini, Nicholas Paul Sheppard
      Pages 89-100
    2. Guorong Xuan, Chengyun Yang, Yizhan Zhen, Yun Q. Shi, Zhicheng Ni
      Pages 115-124
  5. Session III: Authentication and Stego

    1. Hae Yong Kim, Ricardo Lopes de Queiroz
      Pages 125-136
    2. Kisik Chang, Robert H. Deng, Bao Feng, Sangjin Lee, Hyungjun Kim
      Pages 137-151
    3. Ye Deng-Pan, Mao Yao-Bin, Dai Yue-Wei, Wang Zhi-Quan
      Pages 152-162
    4. Jeong Jae Yu, Chang-ho Jung, Seok-Koo Yoon, Sangjin Lee
      Pages 163-170
    5. François Cayre, Caroline Fontaine, Teddy Furon
      Pages 171-183
  6. Session IV: Cryptography

    1. Raphael C. -W. Phan, Huo-Chong Ling
      Pages 184-191
    2. Tanmoy Kanti Das, Jianying Zhou, Subhamoy Maitra
      Pages 192-203
    3. Xianfeng Zhao, Yingxia Dai, Dengguo Feng
      Pages 218-231
  7. Session V: Methods

    1. David Megías, Jordi Herrera-Joancomartí, Julià Minguillón
      Pages 244-258
    2. Wan-Hyun Cho, Myung-Eun Lee, Hyun Lim, Soon-Young Park
      Pages 259-270
    3. Jae-Won Cho, Min-Su Kim, R. Prost, Hyun-Yeol Chung, Ho-Youl Jung
      Pages 283-293
    4. Seung-Jin Kim, Suk-Hwan Lee, Tae-Su Kim, Ki-Ryong Kwon, Kuhn-Il Lee
      Pages 294-303
  8. Back Matter

About these proceedings


We are happy to present to you the proceedings of the 3rd International Workshop on Digital Watermarking, IWDW 2004. Since its modern reappearance in the academic community in the early 1990s, great progress has been made in understanding both the capabilities and the weaknesses of digital watermarking. On the theoretical side, we all are now well aware of the fact that digital watermarking is best viewed as a form of communication using side information. In the case of digital watermarking the side information in question is the document to be watermarked. This insight has led to a better understanding of the limits of the capacity and robustness of digital watermarking algorithms. It has also led to new and improved watermarking algorithms, both in terms of capacity and imperceptibility. Similarly, the role of human perception, and models thereof, has been greatly enhanced in the study and design of digital watermarking algorithms and systems. On the practical side, applications of watermarking are not yet abundant. The original euphoria on the role of digital watermarking in copy protection and copyright protection has not resulted in widespread use in practical systems. With hindsight, a number of reasons can be given for this lack of practical applications.


Internet QoS communication copy protection copyright protection cryptology digital rights protection digital watermarking digital watermarking algorithms digital watermarking attacks digital watermarking systems identity information hiding intelectual property protection security

Editors and affiliations

  • Ingemar J. Cox
    • 1
  • Ton Kalker
    • 2
  • Heung-Kyu Lee
    • 3
  1. 1.University College London,UK
  2. 2.Hewlett-Packard LaboratoriesPalo AltoUSA
  3. 3.Department of EECSKorea Advanced Institute of Science and Technology, Guseong-dong, Yuseong-gu,DaejeonRepublic of Korea

Bibliographic information

Industry Sectors
Finance, Business & Banking
IT & Software