LEADER 04178nam 22007455 450 001 996207292103316 005 20200704034101.0 010 $a3-662-46739-9 024 7 $a10.1007/978-3-662-46739-8 035 $a(CKB)3710000000404184 035 $a(SSID)ssj0001501774 035 $a(PQKBManifestationID)11830318 035 $a(PQKBTitleCode)TC0001501774 035 $a(PQKBWorkID)11446578 035 $a(PQKB)10684039 035 $a(DE-He213)978-3-662-46739-8 035 $a(MiAaPQ)EBC6303774 035 $a(MiAaPQ)EBC5592210 035 $a(Au-PeEL)EBL5592210 035 $a(OCoLC)907769465 035 $a(PPN)18548896X 035 $a(EXLCZ)993710000000404184 100 $a20150416d2015 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTransactions on Data Hiding and Multimedia Security X$b[electronic resource] /$fedited by Yun Q. Shi 205 $a1st ed. 2015. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2015. 215 $a1 online resource (IX, 107 p. 43 illus.) 225 1 $aTransactions on Data Hiding and Multimedia Security,$x1864-3043 ;$v8948 300 $aIncludes index. 311 $a3-662-46738-0 327 $aStrengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter -- Wave Atom-Based Perceptual Image Hashing Against Content-Preserving and Content-Altering Attacks -- IR Hiding: Use of Specular Reflection for Short-Wavelength-Pass-Filter Detection to Prevent Re-recording of Screen Images -- A Reliable Covert Communication Scheme Based on VoIP Steganography -- Adaptive Steganography and Steganalysis with Fixed-Size Embedding -- Permutation Steganography in FAT File systems. 330 $aSince the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. The six papers included in this issue deal with watermarking security, perceptual image hashing, infrared hiding, steganography and steganalysis. 410 0$aTransactions on Data Hiding and Multimedia Security,$x1864-3043 ;$v8948 606 $aData encryption (Computer science) 606 $aComputer security 606 $aCoding theory 606 $aInformation theory 606 $aOptical data processing 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aImage Processing and Computer Vision$3https://scigraph.springernature.com/ontologies/product-market-codes/I22021 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aOptical data processing. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aCoding and Information Theory. 615 24$aImage Processing and Computer Vision. 676 $a005.82 702 $aShi$b Yun Q$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996207292103316 996 $aTransactions on Data Hiding and Multimedia Security X$92830021 997 $aUNISA