Listing 1 - 7 of 7 |
Sort by
|
Choose an application
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This third issue contains five contributions in the areas of steganography and digital watermarking. The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic scheme. Finally, this volume includes two papers that focus on digital watermarking and data hiding. The fourth paper introduces and analyzes a new covert channel and the fifth contribution analyzes the performance of additive attacks against quantization-based data hiding methods.
Data encryption (Computer science). --- Multimedia systems. --- Multimedia systems --- Data encryption (Computer science) --- Engineering & Applied Sciences --- Computer Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Watermarks --- Watermarks. --- Filigrains --- Marks in paper --- Water-marks --- Computer science. --- Computer communication systems. --- Computer security. --- Computers. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Theory of Computation. --- Computer Communication Networks. --- Data Encryption. --- Management of Computing and Information Systems. --- Computers and Society. --- Operating systems (Computers). --- Algorithms. --- Multimedia information systems. --- Operating Systems. --- Multimedia Information Systems. --- Algorithm Analysis and Problem Complexity. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Information storage and retrieval systems --- Algorism --- Algebra --- Arithmetic --- Computer security --- Cryptography --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Informatics --- Science --- Communication systems --- Foundations --- Operating systems --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer privacy --- Computer system security --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Protection --- Security measures --- Distributed processing --- Security measures. --- Marks of origin --- Information Systems. --- Computer software. --- Cryptology. --- Information theory. --- Software, Computer --- Communication theory --- Communication --- Multimedia Systems --- Data Encryption (Computer Science)
Choose an application
Complex analysis --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- complexe analyse (wiskunde) --- informatica --- maatschappij --- multimedia --- computerbeveiliging --- informatica management
Choose an application
Image compression --- Multimedia systems --- Video compression
Choose an application
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This third issue contains five contributions in the areas of steganography and digital watermarking. The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic scheme. Finally, this volume includes two papers that focus on digital watermarking and data hiding. The fourth paper introduces and analyzes a new covert channel and the fifth contribution analyzes the performance of additive attacks against quantization-based data hiding methods.
Complex analysis --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- complexe analyse (wiskunde) --- informatica --- maatschappij --- multimedia --- computerbeveiliging --- informatica management
Choose an application
This book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in December 2007. The 24 revised full papers together with 3 invited papers were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on watermark security; steganalysis; authentication; reversible data hiding; robust watermarking; poster session; theory and methods in watermarking.
Digital watermarking. --- Data encryption (Computer science) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Watermarking, Digital --- Image steganography --- Watermarks --- Data encryption (Computer science). --- Computer science. --- Data structures (Computer scienc. --- Coding theory. --- Computer graphics. --- Computer vision. --- Cryptology. --- Programming Techniques. --- Data Structures and Information Theory. --- Coding and Information Theory. --- Computer Graphics. --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Automatic drafting --- Graphic data processing --- Graphics, Computer --- Computer art --- Graphic arts --- Electronic data processing --- Engineering graphics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Informatics --- Science --- Digital techniques --- Computer programming. --- Data structures (Computer science). --- Information theory. --- Optical data processing. --- Optical computing --- Visual data processing --- Bionics --- Integrated optics --- Photonics --- Computers --- Communication theory --- Communication --- Cybernetics --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Optical equipment --- Programming --- Digital watermarking
Choose an application
This book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in December 2007. The 24 revised full papers together with 3 invited papers were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on watermark security; steganalysis; authentication; reversible data hiding; robust watermarking; poster session; theory and methods in watermarking.
Ergodic theory. Information theory --- Graphics industry --- Computer science --- Programming --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- coderen --- DES (data encryption standard) --- cryptologie --- grafische technieken --- grafische vormgeving --- programmatielogica --- KI (kunstmatige intelligentie) --- informatietheorie
Choose an application
Ergodic theory. Information theory --- Graphics industry --- Computer science --- Programming --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- coderen --- DES (data encryption standard) --- cryptologie --- grafische technieken --- grafische vormgeving --- programmatielogica --- KI (kunstmatige intelligentie) --- informatietheorie
Listing 1 - 7 of 7 |
Sort by
|