Listing 1 - 3 of 3 |
Sort by
|
Choose an application
Steganography, a means by which two or more parties may communicate using ""invisible"" or ""subliminal"" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia.Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the
681.3*E3 --- Computer security. --- Data protection. --- Digital watermarking. --- AA / International- internationaal --- 654 --- 384.7 --- Watermarking, Digital --- Data encryption (Computer science) --- Watermarks --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Data encryption: data encryption standard; DES; public key cryptosystems --- Informatieverwerking. Bureautica. --- Tele-informatie. Datatransmissie. --- Security measures --- Computer science --- Digital watermarking --- Computer security --- Cryptography. --- Cryptographie --- Chiffrement (informatique) --- Filigranes numériques --- Protection de l'information (informatique) --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Tele-informatie. Datatransmissie --- Informatieverwerking. Bureautica --- Image steganography --- Cryptographie. --- Filigranes numériques. --- Computer Science --- Engineering & Applied Sciences --- Filigranes numériques.
Choose an application
These post-proceedings contain 27 papers that were accepted for presentation at the Fifth International Workshop on Information Hiding, held 7–9 October 2002, in Noordwijkerhout, The Netherlands. The papers were selected from 78 submissions on the basis of their scienti?c excellence and novelty by the program committee. We tried to have a balanced program covering several aspects of information hiding. The program committee was composed of Ross J. Anderson (Univ- sity of Cambridge, UK), Jan Camenisch (IBM Zurich Research Laboratory, Switzerland), Ingemar J. Cox (NEC Research Institute, USA), John McHugh (SEI/CERT, USA), Ira S. Moskowitz (Naval Research Laboratory, USA), Job Oostveen (Philips Research, The Netherlands), Andreas P?tzmann (Dresden University of Technology, Germany), Mike Reiter (Carnegie Mellon University, USA), and me. We all wish to thank all the authors of submissions for o?ering their papers for consideration. This year, contrary to the four previous workshops, the call for papers - quested anonymous submissions. However, anonymity was not compulsory and we did accept some papers in which the identity of the authors was clear. Each submission was assigned to three members of the program committee. Papers submitted by program committee members were assigned to four reviewers. The program committee relied on the advice of outside colleagues. We also insisted that 12 of the 27 accepted papers should be revised according to the comments of the reviewers.
Computer security --- Data protection --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Computers and civilization. --- Computers. --- Law and legislation. --- Computer Science. --- Data Encryption. --- Science, general. --- Computer Communication Networks. --- Operating Systems. --- Computers and Society. --- Legal Aspects of Computing. --- Computers --- Cryptology. --- Science, Humanities and Social Sciences, multidisciplinary. --- Cyberspace --- Informatics --- Science --- Computer operating systems --- Disk operating systems --- Systems software --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Law and legislation --- Operating systems --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Civilization and computers --- Civilization --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing --- Data encryption (Computer science) --- Computer networks. --- Operating systems (Computers)
Choose an application
"A successor to the popular Artech House book 'Information Hiding Techniques for Steganography and Digital Watermarking', this comprehensive and up-to-date resource gives a thorough review of steganography, digital watermarking, and media fingerprinting with possible applications to modern communication. This practical resource explores steganography and also includes an introduction to watermarking and its methods. This book gives you a working knowledge of watermarking's pros and cons, as well as the implications of watermarking to solve copyright issues on the Internet."
Data encryption (Computer science) --- Digital watermarking.
Listing 1 - 3 of 3 |
Sort by
|