top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Digital Watermarking [[electronic resource] ] : 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings / / edited by Mauro Barni, Ingemar Cox, Ton Kalker, Hyoung Joong Kim
Digital Watermarking [[electronic resource] ] : 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings / / edited by Mauro Barni, Ingemar Cox, Ton Kalker, Hyoung Joong Kim
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XII, 492 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Operating systems (Computers)
Algorithms
Multimedia information systems
Computers and civilization
Management information systems
Computer science
Cryptology
Operating Systems
Algorithm Analysis and Problem Complexity
Multimedia Information Systems
Computers and Society
Management of Computing and Information Systems
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Session I: Steganography and Steganalysis -- A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography -- Information Transmission and Steganography -- On the Existence of Perfect Stegosystems -- Towards Multi-class Blind Steganalyzer for JPEG Images -- Session II: Fingerprinting -- An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption -- Collusion Secure Convolutional Spread Spectrum Fingerprinting -- Performance Study on Multimedia Fingerprinting Employing Traceability Codes -- Regular Simplex Fingerprints and Their Optimality Properties -- Session III: Watermarking I -- A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet Domain -- Robust Detection of Transform Domain Additive Watermarks -- Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis -- Session IV: Attacks -- A New Inter-frame Collusion Attack and a Countermeasure -- Effectiveness of ST-DM Watermarking Against Intra-video Collusion -- Oracle Attacks and Covert Channels -- Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images -- Session V: Special Session on Watermarking Security -- A Survey of Watermarking Security -- Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy -- Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information -- Practical Data-Hiding: Additive Attacks Performance Analysis -- The Return of the Sensitivity Attack -- Session VI: Watermarking of Unconventional Media -- Look Up Table(LUT) Method for Halftone Image Watermarking -- New Public-Key Authentication Watermarking for JBIG2 Resistant to Parity Attacks -- Software Watermarking as a Proof of Identity: A Study of Zero Knowledge Proof Based Software Watermarking -- Watermarking of 3D Irregular Meshes Based on Wavelet Multiresolution Analysis -- Session VII: Channel Coding and Watermarking -- Digital Watermarking Robustness and Fragility Characteristics: New Modelling and Coding Influence -- New Geometric Analysis of Spread-Spectrum Data Hiding with Repetition Coding, with Implications for Side-Informed Schemes -- Trellis-Coded Rational Dither Modulation for Digital Watermarking -- Session VIII: Theory -- Closed-Form Formulas for Private Watermarking Capacities of Laplacian Sources with the Magnitude-Error Distortion Measure and Under Additive Attacks -- Improved QIM Strategies for Gaussian Watermarking -- On the Achievable Rate of Side Informed Embedding Techniques with Steganographic Constraints -- Performance Lower Bounds for Existing and New Uncoded Digital Watermarking Modulation Techniques -- Session IX: Watermarking II -- Evaluation of Feature Extraction Techniques for Robust Watermarking -- Perceptual Video Watermarking in the 3D-DWT Domain Using a Multiplicative Approach -- Robustness Enhancement of Content-Based Watermarks Using Entropy Masking Effect -- Session X: Applications -- Secure Mutual Distrust Transaction Tracking Using Cryptographic Elements -- ViWiD : Visible Watermarking Based Defense Against Phishing.
Record Nr. UNISA-996465375903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Digital Watermarking [[electronic resource] ] : 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings / / edited by Mauro Barni, Ingemar Cox, Ton Kalker, Hyoung Joong Kim
Digital Watermarking [[electronic resource] ] : 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings / / edited by Mauro Barni, Ingemar Cox, Ton Kalker, Hyoung Joong Kim
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XII, 492 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Operating systems (Computers)
Algorithms
Multimedia information systems
Computers and civilization
Management information systems
Computer science
Cryptology
Operating Systems
Algorithm Analysis and Problem Complexity
Multimedia Information Systems
Computers and Society
Management of Computing and Information Systems
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Session I: Steganography and Steganalysis -- A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography -- Information Transmission and Steganography -- On the Existence of Perfect Stegosystems -- Towards Multi-class Blind Steganalyzer for JPEG Images -- Session II: Fingerprinting -- An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption -- Collusion Secure Convolutional Spread Spectrum Fingerprinting -- Performance Study on Multimedia Fingerprinting Employing Traceability Codes -- Regular Simplex Fingerprints and Their Optimality Properties -- Session III: Watermarking I -- A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet Domain -- Robust Detection of Transform Domain Additive Watermarks -- Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis -- Session IV: Attacks -- A New Inter-frame Collusion Attack and a Countermeasure -- Effectiveness of ST-DM Watermarking Against Intra-video Collusion -- Oracle Attacks and Covert Channels -- Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images -- Session V: Special Session on Watermarking Security -- A Survey of Watermarking Security -- Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy -- Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information -- Practical Data-Hiding: Additive Attacks Performance Analysis -- The Return of the Sensitivity Attack -- Session VI: Watermarking of Unconventional Media -- Look Up Table(LUT) Method for Halftone Image Watermarking -- New Public-Key Authentication Watermarking for JBIG2 Resistant to Parity Attacks -- Software Watermarking as a Proof of Identity: A Study of Zero Knowledge Proof Based Software Watermarking -- Watermarking of 3D Irregular Meshes Based on Wavelet Multiresolution Analysis -- Session VII: Channel Coding and Watermarking -- Digital Watermarking Robustness and Fragility Characteristics: New Modelling and Coding Influence -- New Geometric Analysis of Spread-Spectrum Data Hiding with Repetition Coding, with Implications for Side-Informed Schemes -- Trellis-Coded Rational Dither Modulation for Digital Watermarking -- Session VIII: Theory -- Closed-Form Formulas for Private Watermarking Capacities of Laplacian Sources with the Magnitude-Error Distortion Measure and Under Additive Attacks -- Improved QIM Strategies for Gaussian Watermarking -- On the Achievable Rate of Side Informed Embedding Techniques with Steganographic Constraints -- Performance Lower Bounds for Existing and New Uncoded Digital Watermarking Modulation Techniques -- Session IX: Watermarking II -- Evaluation of Feature Extraction Techniques for Robust Watermarking -- Perceptual Video Watermarking in the 3D-DWT Domain Using a Multiplicative Approach -- Robustness Enhancement of Content-Based Watermarks Using Entropy Masking Effect -- Session X: Applications -- Secure Mutual Distrust Transaction Tracking Using Cryptographic Elements -- ViWiD : Visible Watermarking Based Defense Against Phishing.
Record Nr. UNINA-9910484048803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Watermarking [[electronic resource] ] : First International Workshop, IWDW 2002, Seoul, Korea, November 21-22, 2002, Revised Papers / / edited by Fabien Petitcolas, Hyoung Joong Kim
Digital Watermarking [[electronic resource] ] : First International Workshop, IWDW 2002, Seoul, Korea, November 21-22, 2002, Revised Papers / / edited by Fabien Petitcolas, Hyoung Joong Kim
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (XII, 272 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computers and civilization
Multimedia information systems
Natural language processing (Computer science)
Optical data processing
Management information systems
Computer science
Cryptology
Computers and Society
Multimedia Information Systems
Natural Language Processing (NLP)
Image Processing and Computer Vision
Management of Computing and Information Systems
ISBN 3-540-36617-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Information-Hiding Games -- Informed Embedding for Multi-bit Watermarks -- Fundamentals I -- The Design and Application of DWT-Domain Optimum Decoders -- Enhanced Watermarking Scheme Based on Removal of Local Means -- New Algorithms -- A Multi-user Based Watermarking System with Two-Security-Level Keys -- A New Blind Watermarking Technique Based on Independent Component Analysis -- A New Collusion Attack and Its Performance Evaluation -- A Multistage VQ Based Watermarking Technique with Fake Watermarks -- Fundamentals II -- BER Formulation for the Blind Retrieval of MPEG Video Watermark -- Optimal Detection of Transform Domain Additive Watermark by Using Low Density Diversity -- Watermarking Unusual Content -- Implications for Image Watermarking of Recent Work in Image Analysis and Representation -- On Watermarking Numeric Sets -- Watermarking Techniques for Electronic Circuit Design -- Fragile Watermarking -- A SVD-Based Fragile Watermarking Scheme for Image Authentication -- A DWT-Based Fragile Watermarking Tolerant of JPEG Compression -- Robust Watermarking -- Robust Local Watermarking on Salient Image Areas -- Image Normalization Using Invariant Centroid for RST Invariant Digital Image Watermarking -- An Image Watermarking Algorithm Robust to Geometric Distortion -- Adaptive Watermarking -- Spatial Frequency Band Division in Human Visual System Based-Watermarking -- Two-Step Detection Algorithm in a HVS-Based Blind Watermarking of Still Images -- Content Adaptive Watermark Embedding in the Multiwavelet Transform Using a Stochastic Image Model.
Record Nr. UNINA-9910143889803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Watermarking [[electronic resource] ] : First International Workshop, IWDW 2002, Seoul, Korea, November 21-22, 2002, Revised Papers / / edited by Fabien Petitcolas, Hyoung Joong Kim
Digital Watermarking [[electronic resource] ] : First International Workshop, IWDW 2002, Seoul, Korea, November 21-22, 2002, Revised Papers / / edited by Fabien Petitcolas, Hyoung Joong Kim
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (XII, 272 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computers and civilization
Multimedia information systems
Natural language processing (Computer science)
Optical data processing
Management information systems
Computer science
Cryptology
Computers and Society
Multimedia Information Systems
Natural Language Processing (NLP)
Image Processing and Computer Vision
Management of Computing and Information Systems
ISBN 3-540-36617-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Information-Hiding Games -- Informed Embedding for Multi-bit Watermarks -- Fundamentals I -- The Design and Application of DWT-Domain Optimum Decoders -- Enhanced Watermarking Scheme Based on Removal of Local Means -- New Algorithms -- A Multi-user Based Watermarking System with Two-Security-Level Keys -- A New Blind Watermarking Technique Based on Independent Component Analysis -- A New Collusion Attack and Its Performance Evaluation -- A Multistage VQ Based Watermarking Technique with Fake Watermarks -- Fundamentals II -- BER Formulation for the Blind Retrieval of MPEG Video Watermark -- Optimal Detection of Transform Domain Additive Watermark by Using Low Density Diversity -- Watermarking Unusual Content -- Implications for Image Watermarking of Recent Work in Image Analysis and Representation -- On Watermarking Numeric Sets -- Watermarking Techniques for Electronic Circuit Design -- Fragile Watermarking -- A SVD-Based Fragile Watermarking Scheme for Image Authentication -- A DWT-Based Fragile Watermarking Tolerant of JPEG Compression -- Robust Watermarking -- Robust Local Watermarking on Salient Image Areas -- Image Normalization Using Invariant Centroid for RST Invariant Digital Image Watermarking -- An Image Watermarking Algorithm Robust to Geometric Distortion -- Adaptive Watermarking -- Spatial Frequency Band Division in Human Visual System Based-Watermarking -- Two-Step Detection Algorithm in a HVS-Based Blind Watermarking of Still Images -- Content Adaptive Watermark Embedding in the Multiwavelet Transform Using a Stochastic Image Model.
Record Nr. UNISA-996465769403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Digital-Forensics and Watermarking [[electronic resource] ] : 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Isao Echizen
Digital-Forensics and Watermarking [[electronic resource] ] : 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Isao Echizen
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XVI, 448 p. 224 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Algorithms
Computers and civilization
Coding theory
Information theory
Cryptology
Systems and Data Security
Algorithm Analysis and Problem Complexity
Computers and Society
Coding and Information Theory
ISBN 3-319-31960-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Digital Forensics -- Image Noise and Digital Image Forensics -- Camera Source Identification with Limited Labeled Training Set -- Detecting Video Forgery By Estimating Extrinsic Camera Parameters -- Discriminating between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy -- Multiple MP3 Compression Detection based on the Statistical Properties of Scale Factors -- Detection of Double compression for HEVC videos based on the Co-occurrence Matrix of DCT coefficients.-An Advanced Texture Analysis Method for Image Sharpening Detection -- Source Camera Model Identification Using Features from contaminated Sensor Noise -- Inter-frame Forgery Detection for Static-Background Video Based on MVP Consistency -- An Effective Detection Method Based On Physical Traits of Recaptured Images On LCD Screens -- Steganography and Steganalysis -- Video Steganalysis Based on Intra Prediction Mode Calibration -- Feature Selection for High Dimensional Steganalysis -- Synthetic speech detection and audio steganography in VoIP scenarios -- Digital Watermarking -- Fingerprinting for Broadcast Content Distribution System -- Image Watermarking Based on Reflectance Modification -- Digital Video Watermark Optimization for Detecting Replicated Two-Dimensional Barcodes -- An Authentication and Recovery Scheme for Digital Speech Signal based on DWT -- Enrichment of Visual Appearance of Aesthetic QR Code -- Nondestructive Readout of Copyright Information Embedded in Objects Fabricated with 3-D Printers -- Blind Watermarking Based on Adaptive Lattice Quantization Index Modulation -- Self-embedding Watermarking Scheme Based on MDS Codes -- Watermarking Method using Concatenated Code for Scaling and Rotation Attacks -- DCT-OFDM Based Watermarking Scheme Robust against Clipping, Rotation, and Scaling Attacks -- Robust Imperceptible Video Watermarking for MPEG Compression and DA-AD Conversion Using Visual Masking -- Detection of frequency-scale modification using robust audio watermarking based on amplitude modulation -- Audio Watermarking Using Different Wavelet Filters -- Reversible Data Hiding -- A Commutative Encryption and Reversible Watermarking for Fingerprint Image -- Distortion-Free Robust Reversible Watermarking By Modifying and Recording IWT Means of Image Blocks -- Reversible Data Hiding for Encrypted Audios by High Order Smoothness -- Completely Separable Reversible Data Hiding in Encrypted Images -- Optimal Histogram-pair and Prediction-error Based Reversible Data Hiding for Medical Images -- Visual Cryptography -- Authenticated Secret Sharing Scheme Based on GMEMD -- Robust Content-Based Image Hash Functions Using Nested Lattice Codes -- An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion -- A New Construction of Tagged Visual Cryptography Scheme.
Record Nr. UNINA-9910484517203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital-Forensics and Watermarking [[electronic resource] ] : 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Isao Echizen
Digital-Forensics and Watermarking [[electronic resource] ] : 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Isao Echizen
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XVI, 448 p. 224 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Algorithms
Computers and civilization
Coding theory
Information theory
Cryptology
Systems and Data Security
Algorithm Analysis and Problem Complexity
Computers and Society
Coding and Information Theory
ISBN 3-319-31960-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Digital Forensics -- Image Noise and Digital Image Forensics -- Camera Source Identification with Limited Labeled Training Set -- Detecting Video Forgery By Estimating Extrinsic Camera Parameters -- Discriminating between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy -- Multiple MP3 Compression Detection based on the Statistical Properties of Scale Factors -- Detection of Double compression for HEVC videos based on the Co-occurrence Matrix of DCT coefficients.-An Advanced Texture Analysis Method for Image Sharpening Detection -- Source Camera Model Identification Using Features from contaminated Sensor Noise -- Inter-frame Forgery Detection for Static-Background Video Based on MVP Consistency -- An Effective Detection Method Based On Physical Traits of Recaptured Images On LCD Screens -- Steganography and Steganalysis -- Video Steganalysis Based on Intra Prediction Mode Calibration -- Feature Selection for High Dimensional Steganalysis -- Synthetic speech detection and audio steganography in VoIP scenarios -- Digital Watermarking -- Fingerprinting for Broadcast Content Distribution System -- Image Watermarking Based on Reflectance Modification -- Digital Video Watermark Optimization for Detecting Replicated Two-Dimensional Barcodes -- An Authentication and Recovery Scheme for Digital Speech Signal based on DWT -- Enrichment of Visual Appearance of Aesthetic QR Code -- Nondestructive Readout of Copyright Information Embedded in Objects Fabricated with 3-D Printers -- Blind Watermarking Based on Adaptive Lattice Quantization Index Modulation -- Self-embedding Watermarking Scheme Based on MDS Codes -- Watermarking Method using Concatenated Code for Scaling and Rotation Attacks -- DCT-OFDM Based Watermarking Scheme Robust against Clipping, Rotation, and Scaling Attacks -- Robust Imperceptible Video Watermarking for MPEG Compression and DA-AD Conversion Using Visual Masking -- Detection of frequency-scale modification using robust audio watermarking based on amplitude modulation -- Audio Watermarking Using Different Wavelet Filters -- Reversible Data Hiding -- A Commutative Encryption and Reversible Watermarking for Fingerprint Image -- Distortion-Free Robust Reversible Watermarking By Modifying and Recording IWT Means of Image Blocks -- Reversible Data Hiding for Encrypted Audios by High Order Smoothness -- Completely Separable Reversible Data Hiding in Encrypted Images -- Optimal Histogram-pair and Prediction-error Based Reversible Data Hiding for Medical Images -- Visual Cryptography -- Authenticated Secret Sharing Scheme Based on GMEMD -- Robust Content-Based Image Hash Functions Using Nested Lattice Codes -- An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion -- A New Construction of Tagged Visual Cryptography Scheme.
Record Nr. UNISA-996466043203316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Digital-Forensics and Watermarking [[electronic resource] ] : 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Ching-Nung Yang
Digital-Forensics and Watermarking [[electronic resource] ] : 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Ching-Nung Yang
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XIII, 626 p. 278 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Biometrics (Biology)
Coding theory
Information theory
Cryptology
Systems and Data Security
Biometrics
Coding and Information Theory
ISBN 3-319-19321-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Forensics -- Watermarking -- Reversible data hiding -- Visual cryptography.- Steganography and steganalysis.
Record Nr. UNINA-9910483252903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital-Forensics and Watermarking [[electronic resource] ] : 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Ching-Nung Yang
Digital-Forensics and Watermarking [[electronic resource] ] : 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Ching-Nung Yang
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XIII, 626 p. 278 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Biometrics (Biology)
Coding theory
Information theory
Cryptology
Systems and Data Security
Biometrics
Coding and Information Theory
ISBN 3-319-19321-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Forensics -- Watermarking -- Reversible data hiding -- Visual cryptography.- Steganography and steganalysis.
Record Nr. UNISA-996198536403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Digital-Forensics and Watermarking [[electronic resource] ] : 11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers / / edited by Yun Q. Shi, Fernando Pérez-González, Hyoung Joong Kim
Digital-Forensics and Watermarking [[electronic resource] ] : 11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers / / edited by Yun Q. Shi, Fernando Pérez-González, Hyoung Joong Kim
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XX, 532 p. 245 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computers and civilization
Coding theory
Information theory
Optical data processing
Cryptology
Systems and Data Security
Computers and Society
Coding and Information Theory
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-642-40099-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Steganography and steganalysis -- Watermarking and copyright protection -- Forensics and anti-forensics -- Reversible data hiding; fingerprinting and authentication -- Visual cryptography.
Record Nr. UNISA-996466026203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Digital-Forensics and Watermarking [[electronic resource] ] : 11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers / / edited by Yun Q. Shi, Fernando Pérez-González, Hyoung Joong Kim
Digital-Forensics and Watermarking [[electronic resource] ] : 11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers / / edited by Yun Q. Shi, Fernando Pérez-González, Hyoung Joong Kim
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XX, 532 p. 245 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computers and civilization
Coding theory
Information theory
Optical data processing
Cryptology
Systems and Data Security
Computers and Society
Coding and Information Theory
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-642-40099-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Steganography and steganalysis -- Watermarking and copyright protection -- Forensics and anti-forensics -- Reversible data hiding; fingerprinting and authentication -- Visual cryptography.
Record Nr. UNINA-9910484746703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui