top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Transactions on Data Hiding and Multimedia Security IV [[electronic resource] /] / edited by Yun Q. Shi
Transactions on Data Hiding and Multimedia Security IV [[electronic resource] /] / edited by Yun Q. Shi
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (110 p.)
Disciplina 006.7
Collana Transactions on Data Hiding and Multimedia Security
Soggetto topico Data encryption (Computer science)
User interfaces (Computer systems)
Computers and civilization
Computer security
Management information systems
Computer science
Multimedia information systems
Cryptology
User Interfaces and Human Computer Interaction
Computers and Society
Systems and Data Security
Management of Computing and Information Systems
Multimedia Information Systems
ISBN 1-282-29242-0
9786612292422
3-642-01757-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto How to Compare Image Watermarking Algorithms -- A Desynchronization Resilient Watermarking Scheme -- Robust Watermarking in Slides of Presentations by Blank Space Coloring: A New Approach -- A Novel Least Distortion Linear Gain Model for Halftone Image Watermarking Incorporating Perceptual Quality Metrics -- Optimum Histogram Pair Based Image Lossless Data Embedding.
Record Nr. UNINA-9910484538403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Transactions on Data Hiding and Multimedia Security IX [[electronic resource] ] : Special Issue on Visual Cryptography / / edited by Yun Q. Shi, Feng Liu, Weiqi Yan
Transactions on Data Hiding and Multimedia Security IX [[electronic resource] ] : Special Issue on Visual Cryptography / / edited by Yun Q. Shi, Feng Liu, Weiqi Yan
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (X, 131 p. 66 illus.)
Disciplina 005.82
Collana Transactions on Data Hiding and Multimedia Security
Soggetto topico Data encryption (Computer science)
Computer security
Coding theory
Information theory
Optical data processing
Cryptology
Systems and Data Security
Coding and Information Theory
Image Processing and Computer Vision
ISBN 3-642-55046-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ESSVCS: An Enriched Secret Sharing Visual Cryptography -- Extended Visual Cryptography Scheme for Multiple-Secrets Continuous-Tone Images -- Ideal Secure Multi-Secret Visual Cryptography Scheme with Ring Shares -- Password Protected Visual Cryptography via Cellular Automaton Rule 30 -- A Novel Perceptual Secret Sharing Scheme -- Visual Cryptography Based Watermarking -- Flexible Visual Cryptography Scheme and Its Application.
Record Nr. UNISA-996203268503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Transactions on Data Hiding and Multimedia Security IX [[electronic resource] ] : Special Issue on Visual Cryptography / / edited by Yun Q. Shi, Feng Liu, Weiqi Yan
Transactions on Data Hiding and Multimedia Security IX [[electronic resource] ] : Special Issue on Visual Cryptography / / edited by Yun Q. Shi, Feng Liu, Weiqi Yan
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (X, 131 p. 66 illus.)
Disciplina 005.82
Collana Transactions on Data Hiding and Multimedia Security
Soggetto topico Data encryption (Computer science)
Computer security
Coding theory
Information theory
Optical data processing
Cryptology
Systems and Data Security
Coding and Information Theory
Image Processing and Computer Vision
ISBN 3-642-55046-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ESSVCS: An Enriched Secret Sharing Visual Cryptography -- Extended Visual Cryptography Scheme for Multiple-Secrets Continuous-Tone Images -- Ideal Secure Multi-Secret Visual Cryptography Scheme with Ring Shares -- Password Protected Visual Cryptography via Cellular Automaton Rule 30 -- A Novel Perceptual Secret Sharing Scheme -- Visual Cryptography Based Watermarking -- Flexible Visual Cryptography Scheme and Its Application.
Record Nr. UNINA-9910484485303321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Transactions on Data Hiding and Multimedia Security V [[electronic resource] /] / edited by Yun Q. Shi
Transactions on Data Hiding and Multimedia Security V [[electronic resource] /] / edited by Yun Q. Shi
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XI, 129 p. 66 illus.)
Disciplina 004
Collana Transactions on Data Hiding and Multimedia Security
Soggetto topico Computers and civilization
Pattern recognition
Computer programming
Computer security
Computer communication systems
Data encryption (Computer science)
Computers and Society
Pattern Recognition
Programming Techniques
Systems and Data Security
Computer Communication Networks
Cryptology
ISBN 1-280-38786-6
9786613565785
3-642-14298-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Forensic Image Analysis for Crime Prevention -- Partial Palmprint Matching Using Invariant Local Minutiae Descriptors -- Color Based Tracing in Real-Life Surveillance Data -- Regular Papers -- Collusion-Resistant Fingerprinting Systems: Review and Recent Results -- Phase-Only Correlation Based Matching in Scrambled Domain for Preventing Illegal Matching -- A Comprehensive Study of Visual Cryptography -- Secure Masks for Visual Cryptography.
Record Nr. UNISA-996466439303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Transactions on Data Hiding and Multimedia Security V [[electronic resource] /] / edited by Yun Q. Shi
Transactions on Data Hiding and Multimedia Security V [[electronic resource] /] / edited by Yun Q. Shi
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XI, 129 p. 66 illus.)
Disciplina 004
Collana Transactions on Data Hiding and Multimedia Security
Soggetto topico Computers and civilization
Pattern recognition
Computer programming
Computer security
Computer communication systems
Data encryption (Computer science)
Computers and Society
Pattern Recognition
Programming Techniques
Systems and Data Security
Computer Communication Networks
Cryptology
ISBN 1-280-38786-6
9786613565785
3-642-14298-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Forensic Image Analysis for Crime Prevention -- Partial Palmprint Matching Using Invariant Local Minutiae Descriptors -- Color Based Tracing in Real-Life Surveillance Data -- Regular Papers -- Collusion-Resistant Fingerprinting Systems: Review and Recent Results -- Phase-Only Correlation Based Matching in Scrambled Domain for Preventing Illegal Matching -- A Comprehensive Study of Visual Cryptography -- Secure Masks for Visual Cryptography.
Record Nr. UNINA-9910483956203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Transactions on Data Hiding and Multimedia Security VI [[electronic resource] /] / edited by Yun Q. Shi
Transactions on Data Hiding and Multimedia Security VI [[electronic resource] /] / edited by Yun Q. Shi
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XI, 110 p. 75 illus.)
Disciplina 006.7
Collana Transactions on Data Hiding and Multimedia Security
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Algorithms
Computers and civilization
Pattern recognition
Systems and Data Security
Computer Communication Networks
Cryptology
Algorithm Analysis and Problem Complexity
Computers and Society
Pattern Recognition
ISBN 3-642-24556-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Markovian Rake Transform for Digital Image Tampering Detection -- Embedding Binary Watermarks In Dual-Tree Complex Wavelets Domain for Access Control of Digital Images -- Robust Watermarking of Compressed JPEG Images in Encrypted Domain -- A Progressive Quality Hiding Strategy Based on Equivalence Partitions of Hiding Units -- Histogram-Based Image Hashing for Searching Content-Preserving Copies.
Record Nr. UNISA-996466033803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Transactions on Data Hiding and Multimedia Security VIII [[electronic resource] /] / edited by Yun Q. Shi
Transactions on Data Hiding and Multimedia Security VIII [[electronic resource] /] / edited by Yun Q. Shi
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (IX, 103 p. 27 illus.)
Disciplina 005.8
Collana Transactions on Data Hiding and Multimedia Security
Soggetto topico Computer security
Biometrics (Biology)
Data encryption (Computer science)
Coding theory
Information theory
Pattern recognition
Optical data processing
Systems and Data Security
Biometrics
Cryptology
Coding and Information Theory
Pattern Recognition
Image Processing and Computer Vision
ISBN 3-642-31971-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Exploiting Relative Entropy and Quality Analysis in Cumulative Partial Biometric Fusion -- Improving Reliability of Biometric Hash Generation through the Selection of Dynamic Handwriting Features. Feature-Based Forensic Camera Model Identification -- Watermark Embedding Using Audio Fingerprinting -- Plausibility Considerations on Steganalysis as a Security Mechanism – Discussions on the Example of Audio Steganalysis. Improving Reliability of Biometric Hash Generation through the Selection of Dynamic Handwriting Features. Feature-Based Forensic Camera Model Identification -- Watermark Embedding Using Audio Fingerprinting -- Plausibility Considerations on Steganalysis as a Security Mechanism – Discussions on the Example of Audio Steganalysis.
Record Nr. UNISA-996465748603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Transactions on Data Hiding and Multimedia Security X [[electronic resource] /] / edited by Yun Q. Shi
Transactions on Data Hiding and Multimedia Security X [[electronic resource] /] / edited by Yun Q. Shi
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (IX, 107 p. 43 illus.)
Disciplina 005.82
Collana Transactions on Data Hiding and Multimedia Security
Soggetto topico Data encryption (Computer science)
Computer security
Coding theory
Information theory
Optical data processing
Cryptology
Systems and Data Security
Coding and Information Theory
Image Processing and Computer Vision
ISBN 3-662-46739-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Strengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter -- Wave Atom-Based Perceptual Image Hashing Against Content-Preserving and Content-Altering Attacks -- IR Hiding: Use of Specular Reflection for Short-Wavelength-Pass-Filter Detection to Prevent Re-recording of Screen Images -- A Reliable Covert Communication Scheme Based on VoIP Steganography -- Adaptive Steganography and Steganalysis with Fixed-Size Embedding -- Permutation Steganography in FAT File systems.
Record Nr. UNISA-996207292103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Transactions on Data Hiding and Multimedia Security X [[electronic resource] /] / edited by Yun Q. Shi
Transactions on Data Hiding and Multimedia Security X [[electronic resource] /] / edited by Yun Q. Shi
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (IX, 107 p. 43 illus.)
Disciplina 005.82
Collana Transactions on Data Hiding and Multimedia Security
Soggetto topico Data encryption (Computer science)
Computer security
Coding theory
Information theory
Optical data processing
Cryptology
Systems and Data Security
Coding and Information Theory
Image Processing and Computer Vision
ISBN 3-662-46739-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Strengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter -- Wave Atom-Based Perceptual Image Hashing Against Content-Preserving and Content-Altering Attacks -- IR Hiding: Use of Specular Reflection for Short-Wavelength-Pass-Filter Detection to Prevent Re-recording of Screen Images -- A Reliable Covert Communication Scheme Based on VoIP Steganography -- Adaptive Steganography and Steganalysis with Fixed-Size Embedding -- Permutation Steganography in FAT File systems.
Record Nr. UNINA-9910483075103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui