Narrow your search
Listing 1 - 3 of 3
Sort by
Information hiding techniques for steganography and digital watermarking
Authors: ---
ISBN: 1580530354 9781580530354 9781580534154 1580534155 Year: 2000 Publisher: Boston Artech House

Loading...
Export citation

Choose an application

Bookmark

Abstract

Steganography, a means by which two or more parties may communicate using ""invisible"" or ""subliminal"" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia.Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the

Digital Watermarking : First International Workshop, IWDW 2002, Seoul, Korea, November 21-22, 2002, Revised Papers
Authors: --- ---
ISBN: 3540366172 3540012176 Year: 2003 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The 1st International Workshop on Digital Watermarking (IWDW), the conference covering all aspects of digital watermarking, was held at the Hotel Riviera situated along the beautiful Han River in Seoul, Korea from November 21 to 22, 2002. These proceedings contain 21 papers that were accepted for presentation at the conference. These papers were selected from 67 submissions including 3 invited papers. They went through a thorough review process by the Program Committee and were selected on the basis of excellence and novelty. The following is a brief description of the history of this conference and - viewing process: In August 2001 some members of the Special Interest Group on Multimedia Protection (SIGMP) of the Korea Institute of Information Security and Cryptology (KIISC) agreed to create the IWDW. In November 2001 we set up a Program Committee and solicited papers while asking Springer-Verlag to publish the proceedings of the workshop in their Lecture Notes in Computer Science series. In July 2002 we received 64 submissions from 14 countries using Microsoft’s conference management site (http://cmt. research. microsoft. com/ iwdw2002/). Each submission was assigned a number automatically by the conference management tool and the paper was sent to the Program Committee members for their review. We also encouraged different sets of experts to join for fair reviews.

Keywords

Computer security --- Data protection --- Digital watermarking --- Computer Science --- Engineering & Applied Sciences --- Watermarking, Digital --- Computer science. --- Data encryption (Computer science). --- Multimedia information systems. --- Text processing (Computer science). --- Image processing. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Computers and Society. --- Multimedia Information Systems. --- Document Preparation and Text Processing. --- Image Processing and Computer Vision. --- Management of Computing and Information Systems. --- Image steganography --- Watermarks --- Multimedia systems. --- Natural language processing (Computer science). --- Computer vision. --- Information Systems. --- Cryptology. --- Natural Language Processing (NLP). --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- NLP (Computer science) --- Electronic data processing --- Human-computer interaction --- Semantic computing --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Information storage and retrieval systems --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Optical data processing. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Optical computing --- Visual data processing --- Bionics --- Integrated optics --- Photonics --- Computers --- Civilization and computers --- Civilization --- Communication systems --- Optical equipment

Information Hiding : 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers
Authors: ---
ISBN: 3540364153 3540004211 Year: 2003 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

These post-proceedings contain 27 papers that were accepted for presentation at the Fifth International Workshop on Information Hiding, held 7–9 October 2002, in Noordwijkerhout, The Netherlands. The papers were selected from 78 submissions on the basis of their scienti?c excellence and novelty by the program committee. We tried to have a balanced program covering several aspects of information hiding. The program committee was composed of Ross J. Anderson (Univ- sity of Cambridge, UK), Jan Camenisch (IBM Zurich Research Laboratory, Switzerland), Ingemar J. Cox (NEC Research Institute, USA), John McHugh (SEI/CERT, USA), Ira S. Moskowitz (Naval Research Laboratory, USA), Job Oostveen (Philips Research, The Netherlands), Andreas P?tzmann (Dresden University of Technology, Germany), Mike Reiter (Carnegie Mellon University, USA), and me. We all wish to thank all the authors of submissions for o?ering their papers for consideration. This year, contrary to the four previous workshops, the call for papers - quested anonymous submissions. However, anonymity was not compulsory and we did accept some papers in which the identity of the authors was clear. Each submission was assigned to three members of the program committee. Papers submitted by program committee members were assigned to four reviewers. The program committee relied on the advice of outside colleagues. We also insisted that 12 of the 27 accepted papers should be revised according to the comments of the reviewers.

Keywords

Computer security --- Data protection --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Computers and civilization. --- Computers. --- Law and legislation. --- Computer Science. --- Data Encryption. --- Science, general. --- Computer Communication Networks. --- Operating Systems. --- Computers and Society. --- Legal Aspects of Computing. --- Computers --- Cryptology. --- Science, Humanities and Social Sciences, multidisciplinary. --- Cyberspace --- Informatics --- Science --- Computer operating systems --- Disk operating systems --- Systems software --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Law and legislation --- Operating systems --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Civilization and computers --- Civilization --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing

Listing 1 - 3 of 3
Sort by