Transactions on Data Hiding and Multimedia Security IV [[electronic resource] /] / edited by Yun Q. Shi |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (110 p.) |
Disciplina | 006.7 |
Collana | Transactions on Data Hiding and Multimedia Security |
Soggetto topico |
Data encryption (Computer science)
User interfaces (Computer systems) Computers and civilization Computer security Management information systems Computer science Multimedia information systems Cryptology User Interfaces and Human Computer Interaction Computers and Society Systems and Data Security Management of Computing and Information Systems Multimedia Information Systems |
ISBN |
1-282-29242-0
9786612292422 3-642-01757-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | How to Compare Image Watermarking Algorithms -- A Desynchronization Resilient Watermarking Scheme -- Robust Watermarking in Slides of Presentations by Blank Space Coloring: A New Approach -- A Novel Least Distortion Linear Gain Model for Halftone Image Watermarking Incorporating Perceptual Quality Metrics -- Optimum Histogram Pair Based Image Lossless Data Embedding. |
Record Nr. | UNINA-9910484538403321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Transactions on Data Hiding and Multimedia Security IX [[electronic resource] ] : Special Issue on Visual Cryptography / / edited by Yun Q. Shi, Feng Liu, Weiqi Yan |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (X, 131 p. 66 illus.) |
Disciplina | 005.82 |
Collana | Transactions on Data Hiding and Multimedia Security |
Soggetto topico |
Data encryption (Computer science)
Computer security Coding theory Information theory Optical data processing Cryptology Systems and Data Security Coding and Information Theory Image Processing and Computer Vision |
ISBN | 3-642-55046-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | ESSVCS: An Enriched Secret Sharing Visual Cryptography -- Extended Visual Cryptography Scheme for Multiple-Secrets Continuous-Tone Images -- Ideal Secure Multi-Secret Visual Cryptography Scheme with Ring Shares -- Password Protected Visual Cryptography via Cellular Automaton Rule 30 -- A Novel Perceptual Secret Sharing Scheme -- Visual Cryptography Based Watermarking -- Flexible Visual Cryptography Scheme and Its Application. |
Record Nr. | UNISA-996203268503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Transactions on Data Hiding and Multimedia Security IX [[electronic resource] ] : Special Issue on Visual Cryptography / / edited by Yun Q. Shi, Feng Liu, Weiqi Yan |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (X, 131 p. 66 illus.) |
Disciplina | 005.82 |
Collana | Transactions on Data Hiding and Multimedia Security |
Soggetto topico |
Data encryption (Computer science)
Computer security Coding theory Information theory Optical data processing Cryptology Systems and Data Security Coding and Information Theory Image Processing and Computer Vision |
ISBN | 3-642-55046-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | ESSVCS: An Enriched Secret Sharing Visual Cryptography -- Extended Visual Cryptography Scheme for Multiple-Secrets Continuous-Tone Images -- Ideal Secure Multi-Secret Visual Cryptography Scheme with Ring Shares -- Password Protected Visual Cryptography via Cellular Automaton Rule 30 -- A Novel Perceptual Secret Sharing Scheme -- Visual Cryptography Based Watermarking -- Flexible Visual Cryptography Scheme and Its Application. |
Record Nr. | UNINA-9910484485303321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Transactions on Data Hiding and Multimedia Security V [[electronic resource] /] / edited by Yun Q. Shi |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XI, 129 p. 66 illus.) |
Disciplina | 004 |
Collana | Transactions on Data Hiding and Multimedia Security |
Soggetto topico |
Computers and civilization
Pattern recognition Computer programming Computer security Computer communication systems Data encryption (Computer science) Computers and Society Pattern Recognition Programming Techniques Systems and Data Security Computer Communication Networks Cryptology |
ISBN |
1-280-38786-6
9786613565785 3-642-14298-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Forensic Image Analysis for Crime Prevention -- Partial Palmprint Matching Using Invariant Local Minutiae Descriptors -- Color Based Tracing in Real-Life Surveillance Data -- Regular Papers -- Collusion-Resistant Fingerprinting Systems: Review and Recent Results -- Phase-Only Correlation Based Matching in Scrambled Domain for Preventing Illegal Matching -- A Comprehensive Study of Visual Cryptography -- Secure Masks for Visual Cryptography. |
Record Nr. | UNISA-996466439303316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Transactions on Data Hiding and Multimedia Security V [[electronic resource] /] / edited by Yun Q. Shi |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XI, 129 p. 66 illus.) |
Disciplina | 004 |
Collana | Transactions on Data Hiding and Multimedia Security |
Soggetto topico |
Computers and civilization
Pattern recognition Computer programming Computer security Computer communication systems Data encryption (Computer science) Computers and Society Pattern Recognition Programming Techniques Systems and Data Security Computer Communication Networks Cryptology |
ISBN |
1-280-38786-6
9786613565785 3-642-14298-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Forensic Image Analysis for Crime Prevention -- Partial Palmprint Matching Using Invariant Local Minutiae Descriptors -- Color Based Tracing in Real-Life Surveillance Data -- Regular Papers -- Collusion-Resistant Fingerprinting Systems: Review and Recent Results -- Phase-Only Correlation Based Matching in Scrambled Domain for Preventing Illegal Matching -- A Comprehensive Study of Visual Cryptography -- Secure Masks for Visual Cryptography. |
Record Nr. | UNINA-9910483956203321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Transactions on Data Hiding and Multimedia Security VI [[electronic resource] /] / edited by Yun Q. Shi |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (XI, 110 p. 75 illus.) |
Disciplina | 006.7 |
Collana | Transactions on Data Hiding and Multimedia Security |
Soggetto topico |
Computer security
Computer communication systems Data encryption (Computer science) Algorithms Computers and civilization Pattern recognition Systems and Data Security Computer Communication Networks Cryptology Algorithm Analysis and Problem Complexity Computers and Society Pattern Recognition |
ISBN | 3-642-24556-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Markovian Rake Transform for Digital Image Tampering Detection -- Embedding Binary Watermarks In Dual-Tree Complex Wavelets Domain for Access Control of Digital Images -- Robust Watermarking of Compressed JPEG Images in Encrypted Domain -- A Progressive Quality Hiding Strategy Based on Equivalence Partitions of Hiding Units -- Histogram-Based Image Hashing for Searching Content-Preserving Copies. |
Record Nr. | UNISA-996466033803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Transactions on Data Hiding and Multimedia Security VIII [[electronic resource] /] / edited by Yun Q. Shi |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (IX, 103 p. 27 illus.) |
Disciplina | 005.8 |
Collana | Transactions on Data Hiding and Multimedia Security |
Soggetto topico |
Computer security
Biometrics (Biology) Data encryption (Computer science) Coding theory Information theory Pattern recognition Optical data processing Systems and Data Security Biometrics Cryptology Coding and Information Theory Pattern Recognition Image Processing and Computer Vision |
ISBN | 3-642-31971-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Exploiting Relative Entropy and Quality Analysis in Cumulative Partial Biometric Fusion -- Improving Reliability of Biometric Hash Generation through the Selection of Dynamic Handwriting Features. Feature-Based Forensic Camera Model Identification -- Watermark Embedding Using Audio Fingerprinting -- Plausibility Considerations on Steganalysis as a Security Mechanism – Discussions on the Example of Audio Steganalysis. Improving Reliability of Biometric Hash Generation through the Selection of Dynamic Handwriting Features. Feature-Based Forensic Camera Model Identification -- Watermark Embedding Using Audio Fingerprinting -- Plausibility Considerations on Steganalysis as a Security Mechanism – Discussions on the Example of Audio Steganalysis. |
Record Nr. | UNISA-996465748603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Transactions on Data Hiding and Multimedia Security X [[electronic resource] /] / edited by Yun Q. Shi |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (IX, 107 p. 43 illus.) |
Disciplina | 005.82 |
Collana | Transactions on Data Hiding and Multimedia Security |
Soggetto topico |
Data encryption (Computer science)
Computer security Coding theory Information theory Optical data processing Cryptology Systems and Data Security Coding and Information Theory Image Processing and Computer Vision |
ISBN | 3-662-46739-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Strengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter -- Wave Atom-Based Perceptual Image Hashing Against Content-Preserving and Content-Altering Attacks -- IR Hiding: Use of Specular Reflection for Short-Wavelength-Pass-Filter Detection to Prevent Re-recording of Screen Images -- A Reliable Covert Communication Scheme Based on VoIP Steganography -- Adaptive Steganography and Steganalysis with Fixed-Size Embedding -- Permutation Steganography in FAT File systems. |
Record Nr. | UNISA-996207292103316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Transactions on Data Hiding and Multimedia Security X [[electronic resource] /] / edited by Yun Q. Shi |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (IX, 107 p. 43 illus.) |
Disciplina | 005.82 |
Collana | Transactions on Data Hiding and Multimedia Security |
Soggetto topico |
Data encryption (Computer science)
Computer security Coding theory Information theory Optical data processing Cryptology Systems and Data Security Coding and Information Theory Image Processing and Computer Vision |
ISBN | 3-662-46739-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Strengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter -- Wave Atom-Based Perceptual Image Hashing Against Content-Preserving and Content-Altering Attacks -- IR Hiding: Use of Specular Reflection for Short-Wavelength-Pass-Filter Detection to Prevent Re-recording of Screen Images -- A Reliable Covert Communication Scheme Based on VoIP Steganography -- Adaptive Steganography and Steganalysis with Fixed-Size Embedding -- Permutation Steganography in FAT File systems. |
Record Nr. | UNINA-9910483075103321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|