Transactions on Data Hiding and Multimedia Security VI

Transactions on Data Hiding and Multimedia Security VI

Patchara Sutthiwan, Yun Q. Shi, Hong Zhao, Tian-Tsong Ng, Wei Su (auth.), Yun Q. Shi, Sabu Emmanuel, Mohan S. Kankanhalli, Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma, Li Zhao (eds.)
كم أعجبك هذا الكتاب؟
ما هي جودة الملف الذي تم تنزيله؟
قم بتنزيل الكتاب لتقييم الجودة
ما هي جودة الملفات التي تم تنزيلها؟

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This issue consists mainly of a special section on content protection and forensics including four papers. The additional paper deals with histogram-based image hashing for searching content-preserving copies.

عام:
2011
الإصدار:
1
الناشر:
Springer-Verlag Berlin Heidelberg
اللغة:
english
الصفحات:
110
ISBN 10:
3642245552
ISBN 13:
9783642245558
سلسلة الكتب:
Lecture Notes in Computer Science 6730 Journal Subline
ملف:
PDF, 3.71 MB
IPFS:
CID , CID Blake2b
english, 2011
تنزيل هذا الكتاب غير متاح بسبب شكوى من صاحب حقوق النشر والطبع

Beware of he who would deny you access to information, for in his heart he dreams himself your master

Pravin Lal

أكثر المصطلحات والعبارات المستخدمة