top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information Hiding [[electronic resource] ] : 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers / / edited by Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow
Information Hiding [[electronic resource] ] : 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers / / edited by Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XI, 373 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
User interfaces (Computer systems)
Computers and civilization
Management information systems
Computer science
Application software
Computer security
Cryptology
User Interfaces and Human Computer Interaction
Computers and Society
Management of Computing and Information Systems
Information Systems Applications (incl. Internet)
Systems and Data Security
ISBN 3-540-88961-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Anonymity and Privacy -- A Display Technique for Preventing Electromagnetic Eavesdropping Using Color Mixture Characteristic of Human Eyes -- Hiding a Needle in a Haystack Using Negative Databases -- Information Leakage in Optimal Anonymized and Diversified Data -- Steganography I -- Perturbation Hiding and the Batch Steganography Problem -- Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes -- Forensics -- Detecting Re-projected Video -- Residual Information of Redacted Images Hidden in the Compression Artifacts -- Novel Technologies/Applications -- Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach -- Reversible Watermarking with Subliminal Channel -- Watermarking I -- Watermarking Security Incorporating Natural Scene Statistics -- Block-Chain Based Fragile Watermarking Scheme with Superior Localization -- Steganalysis -- Generic Adoption of Spatial Steganalysis to Transformed Domain -- Weighted Stego-Image Steganalysis for JPEG Covers -- Practical Insecurity for Effective Steganalysis -- Other hiding Domains I -- Authorship Proof for Textual Document -- Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words -- Steganography II -- A Data Mapping Method for Steganography and Its Application to Images -- Benchmarking for Steganography -- Other Hiding Domains II and Network Security -- Information Hiding through Variance of the Parametric Orientation Underlying a B-rep Face -- A Supraliminal Channel in a Videoconferencing Application -- C-Mix: A Lightweight Anonymous Routing Approach -- Strengthening QIM-Based Watermarking by Non-uniform Discrete Cosine Transform -- Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding -- On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes -- Iterative Detection Method for CDMA-Based Fingerprinting Scheme.
Record Nr. UNISA-996466252803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Hiding : 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers / / edited by Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow
Information Hiding : 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers / / edited by Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XI, 373 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
User interfaces (Computer systems)
Computers and civilization
Management information systems
Computer science
Application software
Computer security
Cryptology
User Interfaces and Human Computer Interaction
Computers and Society
Management of Computing and Information Systems
Information Systems Applications (incl. Internet)
Systems and Data Security
ISBN 3-540-88961-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Anonymity and Privacy -- A Display Technique for Preventing Electromagnetic Eavesdropping Using Color Mixture Characteristic of Human Eyes -- Hiding a Needle in a Haystack Using Negative Databases -- Information Leakage in Optimal Anonymized and Diversified Data -- Steganography I -- Perturbation Hiding and the Batch Steganography Problem -- Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes -- Forensics -- Detecting Re-projected Video -- Residual Information of Redacted Images Hidden in the Compression Artifacts -- Novel Technologies/Applications -- Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach -- Reversible Watermarking with Subliminal Channel -- Watermarking I -- Watermarking Security Incorporating Natural Scene Statistics -- Block-Chain Based Fragile Watermarking Scheme with Superior Localization -- Steganalysis -- Generic Adoption of Spatial Steganalysis to Transformed Domain -- Weighted Stego-Image Steganalysis for JPEG Covers -- Practical Insecurity for Effective Steganalysis -- Other hiding Domains I -- Authorship Proof for Textual Document -- Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words -- Steganography II -- A Data Mapping Method for Steganography and Its Application to Images -- Benchmarking for Steganography -- Other Hiding Domains II and Network Security -- Information Hiding through Variance of the Parametric Orientation Underlying a B-rep Face -- A Supraliminal Channel in a Videoconferencing Application -- C-Mix: A Lightweight Anonymous Routing Approach -- Strengthening QIM-Based Watermarking by Non-uniform Discrete Cosine Transform -- Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding -- On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes -- Iterative Detection Method for CDMA-Based Fingerprinting Scheme.
Record Nr. UNINA-9910484032403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the 2010 ACM International Workshop on mmWave Communications : From Circuits to Networks
Proceedings of the 2010 ACM International Workshop on mmWave Communications : From Circuits to Networks
Autore Madhow Upamanyu
Pubbl/distr/stampa [Place of publication not identified], : ACM, 2010
Descrizione fisica 1 online resource (70 pages)
Collana ACM Conferences
Soggetto topico Electrical & Computer Engineering
Engineering & Applied Sciences
Telecommunications
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Proceedings of the 2010 Association for Computing Machinery International Workshop on mmWave Communications : From Circuits to Networks
Record Nr. UNINA-9910376002103321
Madhow Upamanyu  
[Place of publication not identified], : ACM, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui