Digital Watermarking [[electronic resource] ] : 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers / / edited by Hyoung-Joong Kim, Yun Q. Shi, Mauro Barni |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (X, 317 p. 140 illus., 60 illus. in color.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Data structures (Computer science) Coding theory Information theory Information storage and retrieval Computer graphics Optical data processing Cryptology Data Structures and Information Theory Coding and Information Theory Information Storage and Retrieval Computer Graphics Image Processing and Computer Vision |
ISBN | 3-642-18405-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996466062903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Digital Watermarking [[electronic resource] ] : 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings / / edited by Anthony T. S. Ho, Yun Q. Shi, Hyoung-Joong Kim, Mauro Barni |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XIII, 337 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Data structures (Computer science) Coding theory Information theory Information storage and retrieval Computer graphics Optical data processing Cryptology Data Structures and Information Theory Coding and Information Theory Information Storage and Retrieval Computer Graphics Image Processing and Computer Vision |
Soggetto genere / forma |
Guildford (2009)
Kongress. |
ISBN | 3-642-03688-0 |
Classificazione |
DAT 050f
DAT 465f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Lectures (Abstracts) -- Data Hiding and the Statistics of Images -- The Changing Face of Cryptography -- Forensic Techniques for Image Source Classification: A Comparative Study -- Session I: Robust Watermarking -- Digital Watermarking Schemes Using Multi-resolution Curvelet and HVS Model -- Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques -- Robust AVS Audio Watermarking -- Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG Attacks -- Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks -- Session II: Video Watermarking -- A Robust Watermarking for MPEG-2 -- Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping -- Blind Digital Watermarking of Low Bit-Rate Advanced H.264/AVC Compressed Video -- Session III: Poster Session -- Fast Embedding Technique for Dirty Paper Trellis Watermarking -- A Homomorphic Method for Sharing Secret Images -- Dot-Size Variant Visual Cryptography -- High Capacity Data Hiding in Binary Document Images -- Session IV: Steganography and Steganalysis -- Hiding Information by Context-Based Synonym Substitution -- A Statistical and Iterative Method for Data Hiding in Palette-Based Images -- Estimating the Information Theoretic Optimal Stego Noise -- Multi-class Blind Steganalysis Based on Image Run-Length Analysis -- Session V: Multimedia Watermarking and Security Protocols -- Local Patch Blind Spectral Watermarking Method for 3D Graphics -- Reading Watermarks from Printed Binary Images with a Camera Phone -- A New Approach in Reversible Watermarking -- Classification Framework for Fair Content Tracing Protocols -- Session VI: Image Forensics and Authentication -- Fragile Watermarking Scheme with Extensive Content Restoration Capability -- Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking -- Camera-Model Identification Using Markovian Transition Probability Matrix -- A Survey of Passive Image Tampering Detection -- An Enhanced Statistical Approach to Identifying Photorealistic Images. |
Record Nr. | UNISA-996465561103316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Digital Watermarking [[electronic resource] ] : 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings / / edited by Anthony T. S. Ho, Yun Q. Shi, Hyoung-Joong Kim, Mauro Barni |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XIII, 337 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Data structures (Computer science) Coding theory Information theory Information storage and retrieval Computer graphics Optical data processing Cryptology Data Structures and Information Theory Coding and Information Theory Information Storage and Retrieval Computer Graphics Image Processing and Computer Vision |
Soggetto genere / forma |
Guildford (2009)
Kongress. |
ISBN | 3-642-03688-0 |
Classificazione |
DAT 050f
DAT 465f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Lectures (Abstracts) -- Data Hiding and the Statistics of Images -- The Changing Face of Cryptography -- Forensic Techniques for Image Source Classification: A Comparative Study -- Session I: Robust Watermarking -- Digital Watermarking Schemes Using Multi-resolution Curvelet and HVS Model -- Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques -- Robust AVS Audio Watermarking -- Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG Attacks -- Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks -- Session II: Video Watermarking -- A Robust Watermarking for MPEG-2 -- Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping -- Blind Digital Watermarking of Low Bit-Rate Advanced H.264/AVC Compressed Video -- Session III: Poster Session -- Fast Embedding Technique for Dirty Paper Trellis Watermarking -- A Homomorphic Method for Sharing Secret Images -- Dot-Size Variant Visual Cryptography -- High Capacity Data Hiding in Binary Document Images -- Session IV: Steganography and Steganalysis -- Hiding Information by Context-Based Synonym Substitution -- A Statistical and Iterative Method for Data Hiding in Palette-Based Images -- Estimating the Information Theoretic Optimal Stego Noise -- Multi-class Blind Steganalysis Based on Image Run-Length Analysis -- Session V: Multimedia Watermarking and Security Protocols -- Local Patch Blind Spectral Watermarking Method for 3D Graphics -- Reading Watermarks from Printed Binary Images with a Camera Phone -- A New Approach in Reversible Watermarking -- Classification Framework for Fair Content Tracing Protocols -- Session VI: Image Forensics and Authentication -- Fragile Watermarking Scheme with Extensive Content Restoration Capability -- Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking -- Camera-Model Identification Using Markovian Transition Probability Matrix -- A Survey of Passive Image Tampering Detection -- An Enhanced Statistical Approach to Identifying Photorealistic Images. |
Record Nr. | UNINA-9910484839803321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital-Forensics and Watermarking [[electronic resource] ] : 11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers / / edited by Yun Q. Shi, Fernando Pérez-González, Hyoung Joong Kim |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XX, 532 p. 245 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computers and civilization Coding theory Information theory Optical data processing Cryptology Systems and Data Security Computers and Society Coding and Information Theory Computer Imaging, Vision, Pattern Recognition and Graphics |
ISBN | 3-642-40099-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Steganography and steganalysis -- Watermarking and copyright protection -- Forensics and anti-forensics -- Reversible data hiding; fingerprinting and authentication -- Visual cryptography. |
Record Nr. | UNISA-996466026203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Digital-Forensics and Watermarking [[electronic resource] ] : 11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers / / edited by Yun Q. Shi, Fernando Pérez-González, Hyoung Joong Kim |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XX, 532 p. 245 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computers and civilization Coding theory Information theory Optical data processing Cryptology Systems and Data Security Computers and Society Coding and Information Theory Computer Imaging, Vision, Pattern Recognition and Graphics |
ISBN | 3-642-40099-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Steganography and steganalysis -- Watermarking and copyright protection -- Forensics and anti-forensics -- Reversible data hiding; fingerprinting and authentication -- Visual cryptography. |
Record Nr. | UNINA-9910484746703321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Transactions on data hiding and multimedia security . I [[electronic resource] /] / Yun Q. Shi (ed.) |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, c2006 |
Descrizione fisica | 1 online resource (IX, 139 p.) |
Disciplina | 005.82 |
Altri autori (Persone) | ShiYun Q |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology Transactions on data hiding and multimedia security |
Soggetto topico |
Multimedia systems
Data encryption (Computer science) |
Soggetto non controllato |
Multimedia Systems
Data Encryption (Computer Science) Computers |
ISBN | 3-540-49072-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity -- Watermarking Security: A Survey -- Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data -- Identity-Based DRM: Personal Entertainment Domain -- Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography. |
Record Nr. | UNINA-9910484683003321 |
Berlin ; ; New York, : Springer, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Transactions on data hiding and multimedia security . I [[electronic resource] /] / Yun Q. Shi (ed.) |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, c2006 |
Descrizione fisica | 1 online resource (IX, 139 p.) |
Disciplina | 005.82 |
Altri autori (Persone) | ShiYun Q |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology Transactions on data hiding and multimedia security |
Soggetto topico |
Multimedia systems
Data encryption (Computer science) |
Soggetto non controllato |
Multimedia Systems
Data Encryption (Computer Science) Computers |
ISBN | 3-540-49072-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity -- Watermarking Security: A Survey -- Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data -- Identity-Based DRM: Personal Entertainment Domain -- Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography. |
Record Nr. | UNISA-996466159803316 |
Berlin ; ; New York, : Springer, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Transactions on Data Hiding and Multimedia Security III [[electronic resource] /] / edited by Yun Q. Shi |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 |
Descrizione fisica | 1 online resource (IX, 91 p.) |
Disciplina | 005.8 |
Collana | Transactions on Data Hiding and Multimedia Security |
Soggetto topico |
Data encryption (Computer science)
Computer security Management information systems Computer science Computers and civilization Multimedia information systems Algorithms Cryptology Systems and Data Security Management of Computing and Information Systems Computers and Society Multimedia Information Systems Algorithm Analysis and Problem Complexity |
ISBN | 3-540-69019-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Constructing Good Covering Codes for Applications in Steganography -- On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems -- Secure Steganography Using Gabor Filter and Neural Networks -- Oracle Channels -- Quantization-Based Methods: Additive Attacks Performance Analysis. |
Record Nr. | UNISA-996465610603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Transactions on Data Hiding and Multimedia Security III [[electronic resource] /] / edited by Yun Q. Shi |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 |
Descrizione fisica | 1 online resource (IX, 91 p.) |
Disciplina | 005.8 |
Collana | Transactions on Data Hiding and Multimedia Security |
Soggetto topico |
Data encryption (Computer science)
Computer security Management information systems Computer science Computers and civilization Multimedia information systems Algorithms Cryptology Systems and Data Security Management of Computing and Information Systems Computers and Society Multimedia Information Systems Algorithm Analysis and Problem Complexity |
ISBN | 3-540-69019-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Constructing Good Covering Codes for Applications in Steganography -- On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems -- Secure Steganography Using Gabor Filter and Neural Networks -- Oracle Channels -- Quantization-Based Methods: Additive Attacks Performance Analysis. |
Record Nr. | UNINA-9910768165203321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Transactions on Data Hiding and Multimedia Security IV [[electronic resource] /] / edited by Yun Q. Shi |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (110 p.) |
Disciplina | 006.7 |
Collana | Transactions on Data Hiding and Multimedia Security |
Soggetto topico |
Data encryption (Computer science)
User interfaces (Computer systems) Computers and civilization Computer security Management information systems Computer science Multimedia information systems Cryptology User Interfaces and Human Computer Interaction Computers and Society Systems and Data Security Management of Computing and Information Systems Multimedia Information Systems |
ISBN |
1-282-29242-0
9786612292422 3-642-01757-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | How to Compare Image Watermarking Algorithms -- A Desynchronization Resilient Watermarking Scheme -- Robust Watermarking in Slides of Presentations by Blank Space Coloring: A New Approach -- A Novel Least Distortion Linear Gain Model for Halftone Image Watermarking Incorporating Perceptual Quality Metrics -- Optimum Histogram Pair Based Image Lossless Data Embedding. |
Record Nr. | UNISA-996465766903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|