top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Digital-Forensics and Watermarking [[electronic resource] ] : 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Isao Echizen
Digital-Forensics and Watermarking [[electronic resource] ] : 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Isao Echizen
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XVI, 448 p. 224 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Algorithms
Computers and civilization
Coding theory
Information theory
Cryptology
Systems and Data Security
Algorithm Analysis and Problem Complexity
Computers and Society
Coding and Information Theory
ISBN 3-319-31960-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Digital Forensics -- Image Noise and Digital Image Forensics -- Camera Source Identification with Limited Labeled Training Set -- Detecting Video Forgery By Estimating Extrinsic Camera Parameters -- Discriminating between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy -- Multiple MP3 Compression Detection based on the Statistical Properties of Scale Factors -- Detection of Double compression for HEVC videos based on the Co-occurrence Matrix of DCT coefficients.-An Advanced Texture Analysis Method for Image Sharpening Detection -- Source Camera Model Identification Using Features from contaminated Sensor Noise -- Inter-frame Forgery Detection for Static-Background Video Based on MVP Consistency -- An Effective Detection Method Based On Physical Traits of Recaptured Images On LCD Screens -- Steganography and Steganalysis -- Video Steganalysis Based on Intra Prediction Mode Calibration -- Feature Selection for High Dimensional Steganalysis -- Synthetic speech detection and audio steganography in VoIP scenarios -- Digital Watermarking -- Fingerprinting for Broadcast Content Distribution System -- Image Watermarking Based on Reflectance Modification -- Digital Video Watermark Optimization for Detecting Replicated Two-Dimensional Barcodes -- An Authentication and Recovery Scheme for Digital Speech Signal based on DWT -- Enrichment of Visual Appearance of Aesthetic QR Code -- Nondestructive Readout of Copyright Information Embedded in Objects Fabricated with 3-D Printers -- Blind Watermarking Based on Adaptive Lattice Quantization Index Modulation -- Self-embedding Watermarking Scheme Based on MDS Codes -- Watermarking Method using Concatenated Code for Scaling and Rotation Attacks -- DCT-OFDM Based Watermarking Scheme Robust against Clipping, Rotation, and Scaling Attacks -- Robust Imperceptible Video Watermarking for MPEG Compression and DA-AD Conversion Using Visual Masking -- Detection of frequency-scale modification using robust audio watermarking based on amplitude modulation -- Audio Watermarking Using Different Wavelet Filters -- Reversible Data Hiding -- A Commutative Encryption and Reversible Watermarking for Fingerprint Image -- Distortion-Free Robust Reversible Watermarking By Modifying and Recording IWT Means of Image Blocks -- Reversible Data Hiding for Encrypted Audios by High Order Smoothness -- Completely Separable Reversible Data Hiding in Encrypted Images -- Optimal Histogram-pair and Prediction-error Based Reversible Data Hiding for Medical Images -- Visual Cryptography -- Authenticated Secret Sharing Scheme Based on GMEMD -- Robust Content-Based Image Hash Functions Using Nested Lattice Codes -- An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion -- A New Construction of Tagged Visual Cryptography Scheme.
Record Nr. UNINA-9910484517203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital-Forensics and Watermarking [[electronic resource] ] : 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Isao Echizen
Digital-Forensics and Watermarking [[electronic resource] ] : 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Isao Echizen
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XVI, 448 p. 224 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Algorithms
Computers and civilization
Coding theory
Information theory
Cryptology
Systems and Data Security
Algorithm Analysis and Problem Complexity
Computers and Society
Coding and Information Theory
ISBN 3-319-31960-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Digital Forensics -- Image Noise and Digital Image Forensics -- Camera Source Identification with Limited Labeled Training Set -- Detecting Video Forgery By Estimating Extrinsic Camera Parameters -- Discriminating between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy -- Multiple MP3 Compression Detection based on the Statistical Properties of Scale Factors -- Detection of Double compression for HEVC videos based on the Co-occurrence Matrix of DCT coefficients.-An Advanced Texture Analysis Method for Image Sharpening Detection -- Source Camera Model Identification Using Features from contaminated Sensor Noise -- Inter-frame Forgery Detection for Static-Background Video Based on MVP Consistency -- An Effective Detection Method Based On Physical Traits of Recaptured Images On LCD Screens -- Steganography and Steganalysis -- Video Steganalysis Based on Intra Prediction Mode Calibration -- Feature Selection for High Dimensional Steganalysis -- Synthetic speech detection and audio steganography in VoIP scenarios -- Digital Watermarking -- Fingerprinting for Broadcast Content Distribution System -- Image Watermarking Based on Reflectance Modification -- Digital Video Watermark Optimization for Detecting Replicated Two-Dimensional Barcodes -- An Authentication and Recovery Scheme for Digital Speech Signal based on DWT -- Enrichment of Visual Appearance of Aesthetic QR Code -- Nondestructive Readout of Copyright Information Embedded in Objects Fabricated with 3-D Printers -- Blind Watermarking Based on Adaptive Lattice Quantization Index Modulation -- Self-embedding Watermarking Scheme Based on MDS Codes -- Watermarking Method using Concatenated Code for Scaling and Rotation Attacks -- DCT-OFDM Based Watermarking Scheme Robust against Clipping, Rotation, and Scaling Attacks -- Robust Imperceptible Video Watermarking for MPEG Compression and DA-AD Conversion Using Visual Masking -- Detection of frequency-scale modification using robust audio watermarking based on amplitude modulation -- Audio Watermarking Using Different Wavelet Filters -- Reversible Data Hiding -- A Commutative Encryption and Reversible Watermarking for Fingerprint Image -- Distortion-Free Robust Reversible Watermarking By Modifying and Recording IWT Means of Image Blocks -- Reversible Data Hiding for Encrypted Audios by High Order Smoothness -- Completely Separable Reversible Data Hiding in Encrypted Images -- Optimal Histogram-pair and Prediction-error Based Reversible Data Hiding for Medical Images -- Visual Cryptography -- Authenticated Secret Sharing Scheme Based on GMEMD -- Robust Content-Based Image Hash Functions Using Nested Lattice Codes -- An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion -- A New Construction of Tagged Visual Cryptography Scheme.
Record Nr. UNISA-996466043203316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Digital-Forensics and Watermarking [[electronic resource] ] : 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Ching-Nung Yang
Digital-Forensics and Watermarking [[electronic resource] ] : 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Ching-Nung Yang
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XIII, 626 p. 278 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Biometrics (Biology)
Coding theory
Information theory
Cryptology
Systems and Data Security
Biometrics
Coding and Information Theory
ISBN 3-319-19321-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Forensics -- Watermarking -- Reversible data hiding -- Visual cryptography.- Steganography and steganalysis.
Record Nr. UNINA-9910483252903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital-Forensics and Watermarking [[electronic resource] ] : 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Ching-Nung Yang
Digital-Forensics and Watermarking [[electronic resource] ] : 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Ching-Nung Yang
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XIII, 626 p. 278 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Biometrics (Biology)
Coding theory
Information theory
Cryptology
Systems and Data Security
Biometrics
Coding and Information Theory
ISBN 3-319-19321-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Forensics -- Watermarking -- Reversible data hiding -- Visual cryptography.- Steganography and steganalysis.
Record Nr. UNISA-996198536403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Digital-Forensics and Watermarking [[electronic resource] ] : 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers / / edited by Yun Qing Shi, Hyoung-Joong Kim, Fernando Pérez-González
Digital-Forensics and Watermarking [[electronic resource] ] : 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers / / edited by Yun Qing Shi, Hyoung-Joong Kim, Fernando Pérez-González
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVI, 530 p. 239 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Optical data processing
Computers and civilization
Coding theory
Information theory
Cryptology
Systems and Data Security
Computer Imaging, Vision, Pattern Recognition and Graphics
Computers and Society
Coding and Information Theory
ISBN 3-662-43886-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Steganography -- Steganalysis -- Visual cryptography -- Reversible data hiding -- Forensics -- Watermarking -- Anonymizing and plate recognition.
Record Nr. UNISA-996198260503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Digital-Forensics and Watermarking [[electronic resource] ] : 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers / / edited by Yun Qing Shi, Hyoung-Joong Kim, Fernando Pérez-González
Digital-Forensics and Watermarking [[electronic resource] ] : 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers / / edited by Yun Qing Shi, Hyoung-Joong Kim, Fernando Pérez-González
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVI, 530 p. 239 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Optical data processing
Computers and civilization
Coding theory
Information theory
Cryptology
Systems and Data Security
Computer Imaging, Vision, Pattern Recognition and Graphics
Computers and Society
Coding and Information Theory
ISBN 3-662-43886-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Steganography -- Steganalysis -- Visual cryptography -- Reversible data hiding -- Forensics -- Watermarking -- Anonymizing and plate recognition.
Record Nr. UNINA-9910485050203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital-Forensics and Watermarking [[electronic resource] ] : 11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers / / edited by Yun Q. Shi, Fernando Pérez-González, Hyoung Joong Kim
Digital-Forensics and Watermarking [[electronic resource] ] : 11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers / / edited by Yun Q. Shi, Fernando Pérez-González, Hyoung Joong Kim
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XX, 532 p. 245 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computers and civilization
Coding theory
Information theory
Optical data processing
Cryptology
Systems and Data Security
Computers and Society
Coding and Information Theory
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-642-40099-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Steganography and steganalysis -- Watermarking and copyright protection -- Forensics and anti-forensics -- Reversible data hiding; fingerprinting and authentication -- Visual cryptography.
Record Nr. UNISA-996466026203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Digital-Forensics and Watermarking [[electronic resource] ] : 11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers / / edited by Yun Q. Shi, Fernando Pérez-González, Hyoung Joong Kim
Digital-Forensics and Watermarking [[electronic resource] ] : 11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers / / edited by Yun Q. Shi, Fernando Pérez-González, Hyoung Joong Kim
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XX, 532 p. 245 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computers and civilization
Coding theory
Information theory
Optical data processing
Cryptology
Systems and Data Security
Computers and Society
Coding and Information Theory
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-642-40099-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Steganography and steganalysis -- Watermarking and copyright protection -- Forensics and anti-forensics -- Reversible data hiding; fingerprinting and authentication -- Visual cryptography.
Record Nr. UNINA-9910484746703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Hiding [[electronic resource] ] : 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers / / edited by Mauro Barni, Jordi Herrera Joancomartí, Stefan Katzenbeisser, Fernando Pérez-González
Information Hiding [[electronic resource] ] : 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers / / edited by Mauro Barni, Jordi Herrera Joancomartí, Stefan Katzenbeisser, Fernando Pérez-González
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XII, 420 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Management information systems
Computer science
Computers and civilization
Application software
Multimedia information systems
Computer communication systems
Cryptology
Management of Computing and Information Systems
Computers and Society
Information Systems Applications (incl. Internet)
Multimedia Information Systems
Computer Communication Networks
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- On Joint Coding for Watermarking and Encryption -- Anonymity -- Compulsion Resistant Anonymous Communications -- Provable Anonymity for Networks of Mixes -- On Blending Attacks for Mixes with Memory -- Pervasive Random Beacon in the Internet for Covert Coordination -- Censorship Resistance Revisited -- Watermarking -- Optimal Embedding for Watermarking in Discrete Data Spaces -- A Spread Spectrum Watermarking Scheme Based on Periodic Clock Changes for Digital Images -- A Quantization Watermarking Technique Robust to Linear and Non-linear Valumetric Distortions Using a Fractal Set of Floating Quantizers -- Theory -- Efficient Steganography with Provable Security Guarantees -- Information-Theoretic Analysis of Security in Side-Informed Data Hiding -- Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis -- Watermark Attacks -- How to Combat Block Replacement Attacks? -- On the Intractability of Inverting Geometric Distortions in Watermarking Schemes -- Steganography -- Pre-processing for Adding Noise Steganography -- Efficient Wet Paper Codes -- Hiding in Unusual Content -- Translation-Based Steganography -- ID Modulation: Embedding Sensor Data in an RFID Timeseries -- Embedding Covert Channels into TCP/IP -- Steganalysis -- Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions -- Assessment of Steganalytic Methods Using Multiple Regression Models -- A General Framework for Structural Steganalysis of LSB Replacement -- New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography -- An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography -- Software Watermarking -- Self-validating Branch-Based Software Watermarking -- Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance -- Dither Modulation Watermarking of Dynamic Memory Traces -- Fingerprinting -- A Family of Collusion 2-Secure Codes -- Best Security Index for Digital Fingerprinting.
Record Nr. UNISA-996465833303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Hiding [[electronic resource] ] : 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers / / edited by Mauro Barni, Jordi Herrera Joancomartí, Stefan Katzenbeisser, Fernando Pérez-González
Information Hiding [[electronic resource] ] : 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers / / edited by Mauro Barni, Jordi Herrera Joancomartí, Stefan Katzenbeisser, Fernando Pérez-González
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XII, 420 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Management information systems
Computer science
Computers and civilization
Application software
Multimedia information systems
Computer communication systems
Cryptology
Management of Computing and Information Systems
Computers and Society
Information Systems Applications (incl. Internet)
Multimedia Information Systems
Computer Communication Networks
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- On Joint Coding for Watermarking and Encryption -- Anonymity -- Compulsion Resistant Anonymous Communications -- Provable Anonymity for Networks of Mixes -- On Blending Attacks for Mixes with Memory -- Pervasive Random Beacon in the Internet for Covert Coordination -- Censorship Resistance Revisited -- Watermarking -- Optimal Embedding for Watermarking in Discrete Data Spaces -- A Spread Spectrum Watermarking Scheme Based on Periodic Clock Changes for Digital Images -- A Quantization Watermarking Technique Robust to Linear and Non-linear Valumetric Distortions Using a Fractal Set of Floating Quantizers -- Theory -- Efficient Steganography with Provable Security Guarantees -- Information-Theoretic Analysis of Security in Side-Informed Data Hiding -- Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis -- Watermark Attacks -- How to Combat Block Replacement Attacks? -- On the Intractability of Inverting Geometric Distortions in Watermarking Schemes -- Steganography -- Pre-processing for Adding Noise Steganography -- Efficient Wet Paper Codes -- Hiding in Unusual Content -- Translation-Based Steganography -- ID Modulation: Embedding Sensor Data in an RFID Timeseries -- Embedding Covert Channels into TCP/IP -- Steganalysis -- Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions -- Assessment of Steganalytic Methods Using Multiple Regression Models -- A General Framework for Structural Steganalysis of LSB Replacement -- New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography -- An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography -- Software Watermarking -- Self-validating Branch-Based Software Watermarking -- Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance -- Dither Modulation Watermarking of Dynamic Memory Traces -- Fingerprinting -- A Family of Collusion 2-Secure Codes -- Best Security Index for Digital Fingerprinting.
Record Nr. UNINA-9910483338403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui