Listing 1 - 10 of 12 | << page >> |
Sort by
|
Choose an application
This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Digital-Forensics and Watermarking, IWDW 2013, held in Auckland, New Zealand, during October 2013. The 24 full and 13 poster papers, presented together with 2 abstracts, were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography and steganalysis; visual cryptography; reversible data hiding; forensics; watermarking; anonymizing and plate recognition.
Computer science. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Computer graphics. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Computers and Society. --- Coding and Information Theory. --- Civilization and computers --- Civilization --- Automatic drafting --- Graphic data processing --- Graphics, Computer --- Computer art --- Graphic arts --- Electronic data processing --- Engineering graphics --- Image processing --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Digital techniques --- Protection --- Security measures --- Computer vision. --- Cryptology. --- Machine vision --- Vision, Computer --- Artificial intelligence --- Pattern recognition systems --- Digital watermarking --- Optical data processing. --- Information theory. --- Communication theory --- Communication --- Cybernetics --- Optical computing --- Visual data processing --- Bionics --- Integrated optics --- Photonics --- Optical equipment
Choose an application
This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography.
Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Computer graphics. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computers and Society. --- Coding and Information Theory. --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Digital watermarking. --- Digital watermarking --- Computer security --- Data protection --- Watermarking, Digital --- Data encryption (Computer science) --- Watermarks --- Image steganography --- Computer vision. --- Cryptology. --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Informatics --- Science --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Protection --- Security measures --- Information theory. --- Optical data processing. --- Civilization and computers --- Civilization --- Optical computing --- Visual data processing --- Bionics --- Electronic data processing --- Integrated optics --- Photonics --- Communication theory --- Communication --- Cybernetics --- Optical equipment
Choose an application
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- DES (data encryption standard) --- informatica --- maatschappij --- multimedia --- informatiesystemen --- informatica management --- computernetwerken
Choose an application
Computer science --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- beeldverwerking --- IR (information retrieval) --- DES (data encryption standard) --- cryptologie --- grafische vormgeving --- programmatielogica --- KI (kunstmatige intelligentie)
Choose an application
This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography.
Ergodic theory. Information theory --- Mathematical control systems --- Computer science --- Computer architecture. Operating systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- computervisie --- coderen --- DES (data encryption standard) --- computers --- grafische vormgeving --- informatica --- maatschappij --- computerbeveiliging --- KI (kunstmatige intelligentie) --- computerkunde --- informatietheorie
Choose an application
This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Digital-Forensics and Watermarking, IWDW 2013, held in Auckland, New Zealand, during October 2013. The 24 full and 13 poster papers, presented together with 2 abstracts, were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography and steganalysis; visual cryptography; reversible data hiding; forensics; watermarking; anonymizing and plate recognition.
Ergodic theory. Information theory --- Mathematical control systems --- Computer science --- Computer architecture. Operating systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- computervisie --- coderen --- DES (data encryption standard) --- computers --- grafische vormgeving --- informatica --- maatschappij --- computerbeveiliging --- KI (kunstmatige intelligentie) --- computerkunde --- informatietheorie
Choose an application
This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Digital-Forensics and Watermarking, IWDW 2014, held in Taipei, Taiwan, during October 2014. The 32 full and 14 poster papers, presented together with 1 keynote speech, were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on forensics; watermarking; reversible data hiding; visual cryptography; and steganography and steganalysis.
Computer Science. --- Data Encryption. --- Systems and Data Security. --- Biometrics. --- Coding and Information Theory. --- Computer science. --- Data protection. --- Data encryption (Computer science). --- Coding theory. --- Informatique --- Protection de l'information (Informatique) --- Chiffrement (Informatique) --- Codage --- Computer Science --- Engineering & Applied Sciences --- Computer security. --- Biometrics (Biology). --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Statistical methods --- Protection --- Security measures --- Cryptology. --- Information theory. --- Communication theory --- Communication --- Cybernetics
Choose an application
This book constitutes revised selected papers from the 14th International Workshop on Digital-Forensics and Watermarking, IWDW 2015, held in Tokyo, Japan, in October 2015. The 35 papers presented in this volume were carefully reviewed and selected from 54 submissions. The contributions are organized in topical sections named: digital forensics; steganography and steganalysis; digital watermarking; reversible data hiding; and visual cryptography.
Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Algorithm Analysis and Problem Complexity. --- Computers and Society. --- Coding and Information Theory. --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Foundations --- Protection --- Security measures --- Computer software. --- Cryptology. --- Software, Computer --- Information theory. --- Communication theory --- Communication --- Cybernetics
Choose an application
This book constitutes the revised post-conference proceedings of the 15th International Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, China, in September 2016. The 45 papers presented in this volume were carefully reviewed and selected from 70 submissions. The contributions are organized in topical sections on digital forensics, visual cryptography, reversible data hiding, and steganography and steganalysis.
Computer science. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Image processing. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Algorithm Analysis and Problem Complexity. --- Image Processing and Computer Vision. --- Computers and Society. --- Coding and Information Theory. --- Civilization and computers --- Pictorial data processing --- Picture processing --- Processing, Image --- Algorism --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Informatics --- Security measures --- Protection of computer systems --- Protection --- Civilization --- Imaging systems --- Optical data processing --- Algebra --- Arithmetic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Science --- Foundations --- Computer software. --- Computer vision. --- Cryptology. --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Software, Computer --- Data encryption (Computer science) --- Optical data processing. --- Information theory. --- Communication theory --- Communication --- Cybernetics --- Optical computing --- Visual data processing --- Bionics --- Electronic data processing --- Integrated optics --- Photonics --- Optical equipment
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on Digital-forensics and Watermarking (IWDW 2011) held in Atlantic City, NJ, USA, during October 23-26, 2011. The 37 revised full papers presented were carefully selected from 59 submissions. Conference papers are organized in 6 technical sessions, covering the topics of steganography and steganalysis, watermarking, visual cryptography, forensics, anti-forensics, fingerprinting, privacy and security.
Computer science --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- beeldverwerking --- IR (information retrieval) --- DES (data encryption standard) --- cryptologie --- grafische vormgeving --- programmatielogica --- KI (kunstmatige intelligentie)
Listing 1 - 10 of 12 | << page >> |
Sort by
|