Narrow your search

Library

Thomas More Mechelen (12)

KU Leuven (11)

Odisee (11)

Thomas More Kempen (11)

UCLL (11)

ULB (11)

ULiège (11)

VIVES (11)


Resource type

book (12)


Language

English (12)


Year
From To Submit

2015 (1)

2014 (1)

2013 (1)

2012 (1)

2011 (2)

More...
Listing 1 - 10 of 12 << page
of 2
>>
Sort by

Book
Transactions on Data Hiding and Multimedia Security X
Author:
ISBN: 9783662467398 3662467380 9783662467381 3662467399 Year: 2015 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. The six papers included in this issue deal with watermarking security, perceptual image hashing, infrared hiding, steganography and steganalysis.

Keywords

Computer Science. --- Data Encryption. --- Systems and Data Security. --- Coding and Information Theory. --- Image Processing and Computer Vision. --- Computer science. --- Data protection. --- Data encryption (Computer science). --- Coding theory. --- Computer vision. --- Informatique --- Protection de l'information (Informatique) --- Chiffrement (Informatique) --- Codage --- Vision par ordinateur --- Engineering & Applied Sciences --- Computer Science --- Computer security. --- Image processing. --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Security measures --- Cryptology. --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Data encryption (Computer science) --- Information theory. --- Optical data processing. --- Optical computing --- Visual data processing --- Bionics --- Electronic data processing --- Integrated optics --- Photonics --- Communication theory --- Communication --- Cybernetics --- Optical equipment


Book
Transactions on Data Hiding and Multimedia Security VI
Author:
ISBN: 3642245552 3642245560 Year: 2011 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This issue consists mainly of a special section on content protection and forensics including four papers. The additional paper deals with histogram-based image hashing for searching content-preserving copies.

Keywords

Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Pattern recognition. --- Computers and civilization. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Computers and Society. --- Pattern Recognition. --- Civilization and computers --- Civilization --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Foundations --- Protection --- Security measures --- Distributed processing --- Computer software. --- Optical pattern recognition. --- Cryptology. --- Optical data processing --- Pattern perception --- Perceptrons --- Visual discrimination --- Software, Computer --- Multimedia systems. --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Information storage and retrieval systems


Book
Transactions on Data Hiding and Multimedia Security VIII
Author:
ISSN: 03029743 ISBN: 364231970X 3642319718 Year: 2012 Volume: 7228 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This special issue contains five selected papers that were presented at the Workshop on Pattern Recognition for IT Security, held in Darmstadt, Germany, in September 2010, in conjunction with the 32nd Annual Symposium of the German Association for Pattern Recognition, DAGM 2010. It demonstrates the broad range of security-related topics that utilize graphical data. The contributions explore the security and reliability of biometric data, the power of machine learning methods to differentiate forged images from originals, the effectiveness of modern watermark embedding schemes and the use of information fusion in steganalysis.

Keywords

Engineering & Applied Sciences --- Computer Science --- Optical pattern recognition --- Information technology --- Security measures --- IT (Information technology) --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Image processing. --- Pattern recognition. --- Biometrics (Biology). --- Computer Science. --- Systems and Data Security. --- Biometrics. --- Data Encryption. --- Coding and Information Theory. --- Pattern Recognition. --- Image Processing and Computer Vision. --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Statistical methods --- Protection --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Optical pattern recognition. --- Computer vision. --- Cryptology. --- Pattern perception --- Perceptrons --- Visual discrimination --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Information theory. --- Optical data processing. --- Optical computing --- Visual data processing --- Bionics --- Electronic data processing --- Integrated optics --- Photonics --- Communication theory --- Communication --- Cybernetics --- Optical equipment


Book
Transactions on Data Hiding and Multimedia Security V
Author:
ISBN: 3642142974 9786613565785 3642142982 1280387866 Year: 2010 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This issue contains a special section on forensic image analysis for crime prevention including two papers. The additional four papers deal with collusion-resistant fingerprinting systems, phase correlation based image matching in scrambled domain, and visual cryptography.

Keywords

Engineering & Applied Sciences --- Computer Science --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Computer programming. --- Data encryption (Computer science). --- Pattern recognition. --- Computers and civilization. --- Computer Science. --- Computers and Society. --- Pattern Recognition. --- Programming Techniques. --- Systems and Data Security. --- Computer Communication Networks. --- Data Encryption. --- Data protection --- Security systems --- Hacking --- Civilization and computers --- Civilization --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Electronic computer programming --- Electronic data processing --- Programming (Electronic computers) --- Coding theory --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Programming --- Distributed processing --- Optical pattern recognition. --- Cryptology. --- Optical data processing --- Pattern perception --- Perceptrons --- Visual discrimination

Transactions on Data Hiding and Multimedia Security III
Author:
ISBN: 3540730915 9786610949397 1280949392 3540730923 9783540490715 9783540730910 9783540690160 354049071X 3540690166 3540490728 3540690190 Year: 2008 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This third issue contains five contributions in the areas of steganography and digital watermarking. The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic scheme. Finally, this volume includes two papers that focus on digital watermarking and data hiding. The fourth paper introduces and analyzes a new covert channel and the fifth contribution analyzes the performance of additive attacks against quantization-based data hiding methods.

Keywords

Data encryption (Computer science). --- Multimedia systems. --- Multimedia systems --- Data encryption (Computer science) --- Engineering & Applied Sciences --- Computer Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Watermarks --- Watermarks. --- Filigrains --- Marks in paper --- Water-marks --- Computer science. --- Computer communication systems. --- Computer security. --- Computers. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Theory of Computation. --- Computer Communication Networks. --- Data Encryption. --- Management of Computing and Information Systems. --- Computers and Society. --- Operating systems (Computers). --- Algorithms. --- Multimedia information systems. --- Operating Systems. --- Multimedia Information Systems. --- Algorithm Analysis and Problem Complexity. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Information storage and retrieval systems --- Algorism --- Algebra --- Arithmetic --- Computer security --- Cryptography --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Informatics --- Science --- Communication systems --- Foundations --- Operating systems --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer privacy --- Computer system security --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Protection --- Security measures --- Distributed processing --- Security measures. --- Marks of origin --- Information Systems. --- Computer software. --- Cryptology. --- Information theory. --- Software, Computer --- Communication theory --- Communication --- Multimedia Systems --- Data Encryption (Computer Science)


Book
Transactions on Data Hiding and Multimedia Security IV
Author:
ISBN: 3642017568 9786612292422 1282292420 3642017576 Year: 2009 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This fourth issue contains five contributions in the area of digital watermarking. The first three papers deal with robust watermarking. The fourth paper introduces a new least distortion linear gain model for halftone image watermarking and the fifth contribution presents an optimal histogram pair based image reversible data hiding scheme.

Keywords

Computer security. --- Data encryption (Computer science). --- Database security. --- Multimedia systems. --- Computer Science --- Engineering & Applied Sciences --- Data encryption (Computer science) --- Digital watermarking. --- Multimedia systems --- Security measures. --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Watermarking, Digital --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer science. --- Multimedia information systems. --- User interfaces (Computer systems). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- User Interfaces and Human Computer Interaction. --- Computers and Society. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Multimedia Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Information storage and retrieval systems --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Communication systems --- Protection --- Security measures --- Image steganography --- Watermarks --- Information Systems. --- Cryptology.


Book
Image and video compression for multimedia engineering fundamentals, algorithms,and standards.
Authors: ---
ISBN: 9780849373640 Year: 2008 Publisher: Boca Raton Crc Press

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Transactions on Data Hiding and Multimedia Security IX : Special Issue on Visual Cryptography
Authors: --- ---
ISBN: 3642550452 3642550460 Year: 2014 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. The seven papers included in this special issue were carefully reviewed and selected from 21 submissions. They address the challenges faced by the emerging area of visual cryptography and provide the readers with an overview of the state of the art in this field of research.


Book
Digital watermarking : 6th international workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007 : proceedings
Authors: --- --- ---
ISBN: 3540922385 3540922377 Year: 2008 Publisher: Berlin, Germany : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in December 2007. The 24 revised full papers together with 3 invited papers were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on watermark security; steganalysis; authentication; reversible data hiding; robust watermarking; poster session; theory and methods in watermarking.

Keywords

Digital watermarking. --- Data encryption (Computer science) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Watermarking, Digital --- Image steganography --- Watermarks --- Data encryption (Computer science). --- Computer science. --- Data structures (Computer scienc. --- Coding theory. --- Computer graphics. --- Computer vision. --- Cryptology. --- Programming Techniques. --- Data Structures and Information Theory. --- Coding and Information Theory. --- Computer Graphics. --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Automatic drafting --- Graphic data processing --- Graphics, Computer --- Computer art --- Graphic arts --- Electronic data processing --- Engineering graphics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Informatics --- Science --- Digital techniques --- Computer programming. --- Data structures (Computer science). --- Information theory. --- Optical data processing. --- Optical computing --- Visual data processing --- Bionics --- Integrated optics --- Photonics --- Computers --- Communication theory --- Communication --- Cybernetics --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Optical equipment --- Programming --- Digital watermarking


Book
Digital Watermarking : 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers
Authors: --- --- ---
ISBN: 3642184049 3642184057 Year: 2011 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held in Seoul, Korea, in October 2010. The 26 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on forensics, visual cryptography, robust watermarking, steganography, fingerprinting, and steganalysis.

Keywords

Engineering & Applied Sciences --- Computer Science --- Computer security --- Data protection --- Digital watermarking --- Watermarking, Digital --- Computer science. --- Data structures (Computer science). --- Data encryption (Computer science). --- Coding theory. --- Information storage and retrieval. --- Computer graphics. --- Image processing. --- Computer Science. --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Coding and Information Theory. --- Information Storage and Retrieval. --- Computer Graphics. --- Image Processing and Computer Vision. --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Automatic drafting --- Graphic data processing --- Graphics, Computer --- Computer art --- Graphic arts --- Electronic data processing --- Engineering graphics --- Image processing --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Informatics --- Science --- Digital techniques --- Image steganography --- Watermarks --- Data structures (Computer scienc. --- Information storage and retrieva. --- Computer vision. --- Cryptology. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Information retrieval. --- Data retrieval --- Data storage --- Discovery, Information --- Information discovery --- Information storage and retrieval --- Retrieval of information --- Documentation --- Information science --- Information storage and retrieval systems --- Machine vision --- Vision, Computer --- Artificial intelligence --- Pattern recognition systems --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Information theory. --- Optical data processing. --- Optical computing --- Visual data processing --- Bionics --- Integrated optics --- Photonics --- Computers --- Communication theory --- Communication --- Cybernetics --- Optical equipment

Listing 1 - 10 of 12 << page
of 2
>>
Sort by