01136cam0-2200373---450-99000465378040332120100930090159.088-7689-035-1000465378FED01000465378(Aleph)000465378FED0100046537819990604d1989----km-y0itay50------baitaITaf------001yy<<L'>>insediamento neolitico di Serra d'Alto nel MateranoFelice Gino Lo PortoRomaBretschneider1989145 p., 36 c. di tav.ill.33 cmMonumenti antichiSerie monografica3Monumenti antichi53MateraZona archeologicaSerra d'AltoZona archeologica937.7930.14Lo Porto,Felice Gino171616ITUNINARICAUNIMARCBK990004653780403321930.14 LOP 1BIBL.7247FLFBCCONT. 57 A (3)bibl. 7247FLFBCFLFBCInsediamento neolitico di Serra d'Alto nel Materano553501UNINA01563nam 2200409 a 450 991070138180332120120109112509.0(CKB)5470000002417247(OCoLC)771927155(EXLCZ)99547000000241724720120109d2011 ua 0engurbn|||||||||txtrdacontentcrdamediacrrdacarrierScientific cooperation[electronic resource] balloon flights : agreement between the United States of America and Australia; effected by exchange of notes at Canberra, February 16, 2006[Washington, D.C.] :U.S. Dept. of State,[2011?]1 online resource (11] pages)Treaties and other international acts series ;06-216Title from title screen (viewed on Jan. 9, 2012).Scientific cooperation Balloon ascensionsLaw and legislationUnited StatesBalloon ascensionsLaw and legislationAustraliaResearchLaw and legislationUnited StatesResearchLaw and legislationAustraliaBalloon ascensionsLaw and legislationBalloon ascensionsLaw and legislationResearchLaw and legislationResearchLaw and legislationUnited States.Department of State.GPOGPOBOOK9910701381803321Scientific cooperation3438017UNINA04922nam 22009495 450 991048469420332120251226193548.03-642-04431-X10.1007/978-3-642-04431-1(CKB)1000000000784731(SSID)ssj0000318250(PQKBManifestationID)11265152(PQKBTitleCode)TC0000318250(PQKBWorkID)10307538(PQKB)10016055(DE-He213)978-3-642-04431-1(MiAaPQ)EBC3064508(PPN)139955704(EXLCZ)99100000000078473120100301d2009 u| 0engurnn|008mamaatxtccrInformation Hiding 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers /edited by Stefan Katzenbeisser, Ahmad-Reza Sadeghi1st ed. 2009.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2009.1 online resource (X, 277 p.) Security and Cryptology,2946-1863 ;5806Bibliographic Level Mode of Issuance: Monograph3-642-04430-1 Includes bibliographical references and index.Steganography -- Supraliminal Audio Steganography: Audio Files Tricking Audiophiles -- An Epistemological Approach to Steganography -- Fisher Information Determines Capacity of ?-Secure Steganography -- Fast BCH Syndrome Coding for Steganography -- Steganalysis -- Embedding Ratio Estimating for Each Bit Plane of Image -- Estimating Steganographic Fisher Information in Real Images -- Watermarking -- Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS-2 -- A Phase Modulation Audio Watermarking Technique -- Forensic Tracking Watermarking against In-theater Piracy -- Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization -- Perception-Based Audio Authentication Watermarking in the Time-Frequency Domain -- Fingerprinting -- An Improvement of Short 2-Secure Fingerprint Codes Strongly Avoiding False-Positive -- Estimating the Minimal Length of Tardos Code -- Hiding in Unusual Content, Novel Applications -- Roughness-Adaptive 3D Watermarking of Polygonal Meshes -- Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions -- SVD-Based Ghost Circuitry Detection -- Forensics -- Microphone Classification Using Fourier Coefficients -- Detect Digital Image Splicing with Visual Cues -- Feature-Based Camera Model Identification Works in Practice.This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009. The 19 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography, steganalysis, watermarking, fingerprinting, hiding in unusual content, novel applications and forensics.Security and Cryptology,2946-1863 ;5806CryptographyData encryption (Computer science)Information retrievalComputer architectureComputersLaw and legislationInformation technologyLaw and legislationData structures (Computer science)Information theoryCoding theoryData protectionCryptologyData Storage RepresentationLegal Aspects of ComputingData Structures and Information TheoryCoding and Information TheoryData and Information SecurityCryptography.Data encryption (Computer science).Information retrieval.Computer architecture.ComputersLaw and legislation.Information technologyLaw and legislation.Data structures (Computer science).Information theory.Coding theory.Data protection.Cryptology.Data Storage Representation.Legal Aspects of Computing.Data Structures and Information Theory.Coding and Information Theory.Data and Information Security.005.8DAT 450fstubDAT 465fstubSS 4800rvkKatzenbeisser Stefan1704861Sadeghi Ahmad-Reza878402IH 2009MiAaPQMiAaPQMiAaPQBOOK9910484694203321Information hiding4200514UNINA