Transactions on data hiding and multimedia security V

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cry...

Celý popis

Uloženo v:
Podrobná bibliografie
Další autoři: Shi, Yun Q. (Editor) 
Korporace: SpringerLink (online služba) (Distributor) 
Médium: E-kniha
Jazyk:angličtina
Vydáno: Berlin ; Heidelberg ; New York : Springer, 2010
Edice:Lecture notes in computer science
Žánr/forma:elektronické knihy
monografie
ISBN:978-3-642-14298-7
978-3-642-14297-0
3-642-14297-4
Témata:
On-line přístup:Plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo otaguje tento záznam!
Obálka
LEADER 03245cam a22005777i 4500
001 001818256
003 CZ PrSTK
005 20211103134655.0
006 m f d
007 cr nn 008mamaa
008 100626t20102010gw a fs 000 eng
020 |a 978-3-642-14298-7  |q (elektronická kniha) 
020 |z 978-3-642-14297-0  |q (brožováno)  |z 3-642-14297-4 
024 7 |a 10.1007/978-3-642-14298-7  |2 doi 
040 |a DE-He213  |b cze  |d ABA013  |e rda 
044 |a gw  |a xxu 
072 7 |a 004  |x Počítačová věda. Výpočetní technika. Informační technologie  |2 Konspekt  |9 23 
080 |a 003.26  |2 MRF 
080 |a 004  |2 MRF 
080 |a 004.056  |2 MRF 
080 |a 004.056.55  |2 MRF 
080 |a 004.38  |2 MRF 
080 |a 004.42  |2 MRF 
080 |a 004.93'1  |2 MRF 
080 |a (0.034.2:08)  |2 MRF 
080 |a (048.8)  |2 MRF 
245 0 0 |a Transactions on data hiding and multimedia security V /  |c edited by Yun Q. Shi 
264 1 |a Berlin ;  |a Heidelberg ;  |a New York :  |b Springer,  |c [2010] 
264 4 |c ©2010 
300 |a 1 online zdroj (XI, 129 stran) :  |b 66 ilustrací 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
490 1 |a Lecture notes in computer science,  |x 0302-9743 ;  |v 6010 
520 |a Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on data hiding and multimedia security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This issue contains a special section on forensic image analysis for crime prevention including two papers. The additional four papers deal with collusion-resistant fingerprinting systems, phase correlation based image matching in scrambled domain, and visual cryptography. 
650 0 7 |a kryptografie  |x if  |7 psh6600  |2 psh 
650 0 7 |a informatika  |x if  |7 psh6548  |2 psh 
650 0 7 |a počítačová bezpečnost  |x vt  |7 psh12336  |2 psh 
650 0 7 |a šifrování dat  |x vt  |7 psh12353  |2 psh 
650 0 7 |a počítače  |x vt  |7 psh12315  |2 psh 
650 0 7 |a programování  |x vt  |7 psh12467  |2 psh 
650 0 7 |a rozpoznávání obrazců  |x vt  |7 psh12519  |2 psh 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 7 |a monografie  |7 fd132842  |2 czenas 
700 1 |a Shi, Yun Q.  |7 stk2007393957  |4 edt 
710 2 |a SpringerLink (online služba)  |7 ntk2018999494  |4 dst 
776 0 8 |i Tištěné vydání:  |t Transactions on data hiding and multimedia security V  |z 978-3-642-14297-0 
830 0 |a Lecture notes in computer science 
856 4 0 |u https://doi.org/10.1007/978-3-642-14298-7  |y Plný text 
910 |a ABA013 
950 |a Springer  |b Lecture Notes in Computer Science 2017