LEADER 04968nam 22008775 450 001 9910484538403321 005 20200629125056.0 010 $a1-282-29242-0 010 $a9786612292422 010 $a3-642-01757-6 024 7 $a10.1007/978-3-642-01757-5 035 $a(CKB)1000000000761273 035 $a(EBL)451032 035 $a(OCoLC)437345722 035 $a(SSID)ssj0000311860 035 $a(PQKBManifestationID)11265898 035 $a(PQKBTitleCode)TC0000311860 035 $a(PQKBWorkID)10329381 035 $a(PQKB)11351691 035 $a(DE-He213)978-3-642-01757-5 035 $a(MiAaPQ)EBC451032 035 $a(MiAaPQ)EBC6283817 035 $a(PPN)136310176 035 $a(EXLCZ)991000000000761273 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aTransactions on Data Hiding and Multimedia Security IV /$fedited by Yun Q. Shi 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (110 p.) 225 1 $aTransactions on Data Hiding and Multimedia Security,$x1864-3043 ;$v5510 300 $aDescription based upon print version of record. 311 $a3-642-01756-8 320 $aIncludes bibliographical references and index. 327 $aHow to Compare Image Watermarking Algorithms -- A Desynchronization Resilient Watermarking Scheme -- Robust Watermarking in Slides of Presentations by Blank Space Coloring: A New Approach -- A Novel Least Distortion Linear Gain Model for Halftone Image Watermarking Incorporating Perceptual Quality Metrics -- Optimum Histogram Pair Based Image Lossless Data Embedding. 330 $aSince the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This fourth issue contains five contributions in the area of digital watermarking. The first three papers deal with robust watermarking. The fourth paper introduces a new least distortion linear gain model for halftone image watermarking and the fifth contribution presents an optimal histogram pair based image reversible data hiding scheme. 410 0$aTransactions on Data Hiding and Multimedia Security,$x1864-3043 ;$v5510 606 $aData encryption (Computer science) 606 $aUser interfaces (Computer systems) 606 $aComputers and civilization 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aMultimedia information systems 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aUser Interfaces and Human Computer Interaction$3https://scigraph.springernature.com/ontologies/product-market-codes/I18067 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aMultimedia Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I18059 615 0$aData encryption (Computer science). 615 0$aUser interfaces (Computer systems). 615 0$aComputers and civilization. 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aMultimedia information systems. 615 14$aCryptology. 615 24$aUser Interfaces and Human Computer Interaction. 615 24$aComputers and Society. 615 24$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 615 24$aMultimedia Information Systems. 676 $a006.7 702 $aShi$b Yun Q$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484538403321 996 $aTransactions on data hiding and multimedia security IV$91121466 997 $aUNINA