Transactions on Data Hiding and Multimedia Security VI

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cry...

Celý popis

Uloženo v:
Podrobná bibliografie
Další autoři: Shi, Yun Q. (Editor) 
Emmanuel, Sabu (Editor)
Kankanhalli, Mohan S (Editor)
Chang, Shih-Fu (Editor)
Radhakrishnan, Regunathan (Editor)
Ma, Fulong (Editor)
Zhao, Li (Editor)
Korporace: SpringerLink (online služba)  
Médium: E-kniha
Jazyk:angličtina
Vydáno: Berlin ; Heidelberg : Springer Berlin Heidelberg, 2011
Edice:Lecture Notes in Computer Science
Žánr/forma:elektronické knihy
ISBN:978-3-642-24556-5
9783642245558
Témata:
On-line přístup:Plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo otaguje tento záznam!
Obálka
LEADER 03969nam a22006615i 4500
001 001820687
003 CZ PrSTK
005 20231109122950.0
006 m f d
007 cr nn 008mamaa
008 111103s2011 gw | s |||| 0|eng d
020 |a 978-3-642-24556-5  |9 9783642245565 
024 7 |a 10.1007/978-3-642-24556-5  |2 doi 
040 |a DE-He213  |b cze  |d ABA013 
072 7 |a 004  |x Počítačová věda. Výpočetní technika. Informační technologie  |2 Konspekt  |9 23 
080 |a 004  |2 MRF 
245 1 0 |a Transactions on Data Hiding and Multimedia Security VI /  |c edited by Yun Q. Shi, Sabu Emmanuel, Mohan S. Kankanhalli, Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma, Li Zhao 
264 1 |a Berlin ;  |a Heidelberg :  |b Springer Berlin Heidelberg,  |c 2011 
300 |a 1 online zdroj (XI, 110 stran) :  |b 75 ilustrací 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 6730 
505 0 |a Markovian Rake Transform for Digital Image Tampering Detection -- Embedding Binary Watermarks In Dual-Tree Complex Wavelets Domain for Access Control of Digital Images -- Robust Watermarking of Compressed JPEG Images in Encrypted Domain -- A Progressive Quality Hiding Strategy Based on Equivalence Partitions of Hiding Units -- Histogram-Based Image Hashing for Searching Content-Preserving Copies 
520 |a Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This issue consists mainly of a special section on content protection and forensics including four papers. The additional paper deals with histogram-based image hashing for searching content-preserving copies 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
659 0 |a Computer science 
659 0 |a Computer communication systems 
659 0 |a Computer security 
659 0 |a Data encryption (Computer science) 
659 0 |a Algorithms 
659 0 |a Pattern recognition 
659 0 |a Computers and civilization 
659 1 4 |a Computer Science 
659 2 4 |a Systems and Data Security 
659 2 4 |a Computer Communication Networks 
659 2 4 |a Data Encryption 
659 2 4 |a Algorithm Analysis and Problem Complexity 
659 2 4 |a Computers and Society 
659 2 4 |a Pattern Recognition 
650 0 7 |a informatika  |x if  |7 psh6548  |2 psh 
650 0 7 |a počítačová bezpečnost  |x vt  |7 psh12336  |2 psh 
650 0 7 |a šifrování dat  |x vt  |7 psh12353  |2 psh 
650 0 7 |a algoritmizace  |x vt  |7 psh12472  |2 psh 
650 0 7 |a rozpoznávání obrazců  |x vt  |7 psh12519  |2 psh 
700 1 |a Shi, Yun Q.  |7 stk2007393957  |4 edt 
700 1 |a Emmanuel, Sabu  |4 edt 
700 1 |a Kankanhalli, Mohan S  |4 edt 
700 1 |a Chang, Shih-Fu  |4 edt 
700 1 |a Radhakrishnan, Regunathan  |4 edt 
700 1 |a Ma, Fulong  |4 edt 
700 1 |a Zhao, Li  |4 edt 
710 2 |a SpringerLink (online služba)  |7 ntk2018999494 
776 0 8 |i Tištěné vydání:  |t Transactions on Data Hiding and Multimedia Security VI  |z 9783642245558 
830 0 |a Lecture Notes in Computer Science 
856 4 0 |u https://doi.org/10.1007/978-3-642-24556-5  |y Plný text 
910 |a ABA013 
950 |a Springer  |b Lecture Notes in Computer Science 2017