Transactions on data hiding and multimedia security V
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cry...
Uloženo v:
Další autoři: | |
---|---|
Korporace: | |
Médium: | E-kniha |
Jazyk: | angličtina |
Vydáno: |
Berlin ; Heidelberg ; New York :
Springer,
2010
|
Edice: | Lecture notes in computer science
|
Žánr/forma: | elektronické knihy monografie |
ISBN: | 978-3-642-14298-7 978-3-642-14297-0 3-642-14297-4 |
Témata: | |
On-line přístup: | Plný text |
Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo otaguje tento záznam!
|
LEADER | 03245cam a22005777i 4500 | ||
---|---|---|---|
001 | 001818256 | ||
003 | CZ PrSTK | ||
005 | 20211103134655.0 | ||
006 | m f d | ||
007 | cr nn 008mamaa | ||
008 | 100626t20102010gw a fs 000 eng | ||
020 | |a 978-3-642-14298-7 |q (elektronická kniha) | ||
020 | |z 978-3-642-14297-0 |q (brožováno) |z 3-642-14297-4 | ||
024 | 7 | |a 10.1007/978-3-642-14298-7 |2 doi | |
040 | |a DE-He213 |b cze |d ABA013 |e rda | ||
044 | |a gw |a xxu | ||
072 | 7 | |a 004 |x Počítačová věda. Výpočetní technika. Informační technologie |2 Konspekt |9 23 | |
080 | |a 003.26 |2 MRF | ||
080 | |a 004 |2 MRF | ||
080 | |a 004.056 |2 MRF | ||
080 | |a 004.056.55 |2 MRF | ||
080 | |a 004.38 |2 MRF | ||
080 | |a 004.42 |2 MRF | ||
080 | |a 004.93'1 |2 MRF | ||
080 | |a (0.034.2:08) |2 MRF | ||
080 | |a (048.8) |2 MRF | ||
245 | 0 | 0 | |a Transactions on data hiding and multimedia security V / |c edited by Yun Q. Shi |
264 | 1 | |a Berlin ; |a Heidelberg ; |a New York : |b Springer, |c [2010] | |
264 | 4 | |c ©2010 | |
300 | |a 1 online zdroj (XI, 129 stran) : |b 66 ilustrací | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a počítač |b c |2 rdamedia | ||
338 | |a online zdroj |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science, |x 0302-9743 ; |v 6010 | |
520 | |a Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on data hiding and multimedia security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This issue contains a special section on forensic image analysis for crime prevention including two papers. The additional four papers deal with collusion-resistant fingerprinting systems, phase correlation based image matching in scrambled domain, and visual cryptography. | ||
650 | 0 | 7 | |a kryptografie |x if |7 psh6600 |2 psh |
650 | 0 | 7 | |a informatika |x if |7 psh6548 |2 psh |
650 | 0 | 7 | |a počítačová bezpečnost |x vt |7 psh12336 |2 psh |
650 | 0 | 7 | |a šifrování dat |x vt |7 psh12353 |2 psh |
650 | 0 | 7 | |a počítače |x vt |7 psh12315 |2 psh |
650 | 0 | 7 | |a programování |x vt |7 psh12467 |2 psh |
650 | 0 | 7 | |a rozpoznávání obrazců |x vt |7 psh12519 |2 psh |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 7 | |a monografie |7 fd132842 |2 czenas | |
700 | 1 | |a Shi, Yun Q. |7 stk2007393957 |4 edt | |
710 | 2 | |a SpringerLink (online služba) |7 ntk2018999494 |4 dst | |
776 | 0 | 8 | |i Tištěné vydání: |t Transactions on data hiding and multimedia security V |z 978-3-642-14297-0 |
830 | 0 | |a Lecture notes in computer science | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-14298-7 |y Plný text |
910 | |a ABA013 | ||
950 | |a Springer |b Lecture Notes in Computer Science 2017 |