| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNIORUON00192503 |
|
|
Autore |
Asociacion Internacional de Hispanistas |
|
|
Titolo |
Encuentros y desencuentros de culturas: desde la edad media al siglo XVIII : Actas de la Asociacion Internacional de Hispanistas. Irvine : Universidad de California, 1992 / Asociacion Internacional de Hispanistas ; editor Juan Villegas |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Irvine, : The Regents of the University of California, c1994. 284 p. ; 23 cm Actas Irvine-92 ; 3 |
|
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Letteratura spagnola - Critica |
TEATRO SPAGNOLO - Sec. 12.-18 |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNINA9910484691103321 |
|
|
Titolo |
Digital Watermarking : 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007, Proceedings / / edited by Yun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2008.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XII, 484 p.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology, , 2946-1863 ; ; 5041 |
|
|
|
|
|
|
Classificazione |
|
DAT 050f |
DAT 465f |
SS 4800 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Cryptography |
Data encryption (Computer science) |
Computer programming |
Data structures (Computer science) |
Information theory |
Coding theory |
Computer graphics |
Image processing - Digital techniques |
Computer vision |
Cryptology |
|
|
|
|
|
|
|
|
|
|
|
|
Programming Techniques |
Data Structures and Information Theory |
Coding and Information Theory |
Computer Graphics |
Computer Imaging, Vision, Pattern Recognition and Graphics |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Invited Lecture -- Watermarking, a Mature Technology – Retrospect and Prospect -- The Marriage of Cryptography and Watermarking — Beneficial and Challenging for Secure Watermarking and Detection -- Detecting Photographic Composites of People -- Session I: Watermark Security -- (In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005 -- Attack Analysis for He & Wu’s Joint Watermarking/Fingerprinting Scheme -- Multiple Watermarking in Visual Cryptography -- Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding -- Session II: Steganalysis -- Fusion Based Blind Image Steganalysis by Boosting Feature Selection -- Steganalysis of Multi Bit Plane Image Steganography -- Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis -- Weaknesses of MB2 -- Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis -- Steganalysis Versus Splicing Detection -- Session III: Authentication -- Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning -- A General Data Hiding Framework and Multi-level Signature for Binary Images -- High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents -- Session IV: Reversible Data Hiding -- Reversible Quantization-Index Modulation Using Neighboring Correlation -- High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain -- Reversible Data Hiding Using Prediction Error Values Embedding -- An Improved Reversible Difference Expansion Watermarking Algorithm -- Optimum Histogram Pair Based Image Lossless Data Embedding -- Session V: Robust Watermarking -- Multiple Domain Watermarking for Print-Scanand JPEG Resilient Data Hiding -- GA-Based Robustness Evaluation Method for Digital Image Watermarking -- Dither Modulation in the Logarithmic Domain -- Session VI: Poster Session -- A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack -- Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption -- Design an Aperiodic Stochastic Resonance Signal Processor for Digital Watermarking -- Watermarking for Authentication of LZ-77 Compressed Documents -- Robust Audio Zero-Watermark Based on LWT and Chaotic Modulation -- A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone Images -- Session VII: Theory and Methods in Watermarking -- On the Complexity of Obtaining Optimal Watermarking Schemes -- A Theoretical Framework for Watermarking of Compressed Signals -- Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain |
|
|
|
|
|
|
|
|
|
|
|
Control Model -- Multiple Scrambling and Adaptive Synchronization for Audio Watermarking -- A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality -- A High Payload VQ Steganographic Method for Binary Images. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in December 2007. The 24 revised full papers together with 3 invited papers were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on watermark security; steganalysis; authentication; reversible data hiding; robust watermarking; poster session; theory and methods in watermarking. |
|
|
|
|
|
|
|
| |