Narrow your search

Library

AP (13)

KDG (13)

Thomas More Mechelen (12)

ULB (12)

KU Leuven (11)

Odisee (11)

Thomas More Kempen (11)

UCLL (11)

ULiège (11)

VIVES (11)

More...

Resource type

book (24)

digital (13)


Language

English (37)


Year
From To Submit

2019 (1)

2015 (2)

2014 (2)

2013 (2)

2012 (5)

More...
Listing 1 - 10 of 37 << page
of 4
>>
Sort by

Book
Transactions on Data Hiding and Multimedia Security X
Author:
ISBN: 9783662467398 3662467380 9783662467381 3662467399 Year: 2015 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. The six papers included in this issue deal with watermarking security, perceptual image hashing, infrared hiding, steganography and steganalysis.

Keywords

Computer Science. --- Data Encryption. --- Systems and Data Security. --- Coding and Information Theory. --- Image Processing and Computer Vision. --- Computer science. --- Data protection. --- Data encryption (Computer science). --- Coding theory. --- Computer vision. --- Informatique --- Protection de l'information (Informatique) --- Chiffrement (Informatique) --- Codage --- Vision par ordinateur --- Engineering & Applied Sciences --- Computer Science --- Computer security. --- Image processing. --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Security measures --- Cryptology. --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Data encryption (Computer science) --- Information theory. --- Optical data processing. --- Optical computing --- Visual data processing --- Bionics --- Electronic data processing --- Integrated optics --- Photonics --- Communication theory --- Communication --- Cybernetics --- Optical equipment


Book
Transactions on Data Hiding and Multimedia Security VI
Author:
ISBN: 3642245552 3642245560 Year: 2011 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This issue consists mainly of a special section on content protection and forensics including four papers. The additional paper deals with histogram-based image hashing for searching content-preserving copies.

Keywords

Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Pattern recognition. --- Computers and civilization. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Computers and Society. --- Pattern Recognition. --- Civilization and computers --- Civilization --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Foundations --- Protection --- Security measures --- Distributed processing --- Computer software. --- Optical pattern recognition. --- Cryptology. --- Optical data processing --- Pattern perception --- Perceptrons --- Visual discrimination --- Software, Computer --- Multimedia systems. --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Information storage and retrieval systems


Book
Transactions on Data Hiding and Multimedia Security VIII
Author:
ISSN: 03029743 ISBN: 364231970X 3642319718 Year: 2012 Volume: 7228 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This special issue contains five selected papers that were presented at the Workshop on Pattern Recognition for IT Security, held in Darmstadt, Germany, in September 2010, in conjunction with the 32nd Annual Symposium of the German Association for Pattern Recognition, DAGM 2010. It demonstrates the broad range of security-related topics that utilize graphical data. The contributions explore the security and reliability of biometric data, the power of machine learning methods to differentiate forged images from originals, the effectiveness of modern watermark embedding schemes and the use of information fusion in steganalysis.

Keywords

Engineering & Applied Sciences --- Computer Science --- Optical pattern recognition --- Information technology --- Security measures --- IT (Information technology) --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Image processing. --- Pattern recognition. --- Biometrics (Biology). --- Computer Science. --- Systems and Data Security. --- Biometrics. --- Data Encryption. --- Coding and Information Theory. --- Pattern Recognition. --- Image Processing and Computer Vision. --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Statistical methods --- Protection --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Optical pattern recognition. --- Computer vision. --- Cryptology. --- Pattern perception --- Perceptrons --- Visual discrimination --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Information theory. --- Optical data processing. --- Optical computing --- Visual data processing --- Bionics --- Electronic data processing --- Integrated optics --- Photonics --- Communication theory --- Communication --- Cybernetics --- Optical equipment


Book
Transactions on Data Hiding and Multimedia Security V
Author:
ISBN: 3642142974 9786613565785 3642142982 1280387866 Year: 2010 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This issue contains a special section on forensic image analysis for crime prevention including two papers. The additional four papers deal with collusion-resistant fingerprinting systems, phase correlation based image matching in scrambled domain, and visual cryptography.

Keywords

Engineering & Applied Sciences --- Computer Science --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Computer programming. --- Data encryption (Computer science). --- Pattern recognition. --- Computers and civilization. --- Computer Science. --- Computers and Society. --- Pattern Recognition. --- Programming Techniques. --- Systems and Data Security. --- Computer Communication Networks. --- Data Encryption. --- Data protection --- Security systems --- Hacking --- Civilization and computers --- Civilization --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Electronic computer programming --- Electronic data processing --- Programming (Electronic computers) --- Coding theory --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Programming --- Distributed processing --- Optical pattern recognition. --- Cryptology. --- Optical data processing --- Pattern perception --- Perceptrons --- Visual discrimination

Transactions on data hiding and multimedia security.
Author:
ISBN: 3540730915 9786610949397 1280949392 3540730923 9783540490715 9783540730910 9783540690160 354049071X 3540690166 3540490728 3540690190 Year: 2006 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field in multimedia security. Two related disciplines, steganalysis and data forensics, are also increasingly attracting researchers and forming another new research field in multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper deals with evaluation criteria for the performance of audio watermarking algorithms. The second provides a survey of problems related to watermark security. The third discusses practical implementations of zero-knowledge watermark detectors and proposes efficient solutions for correlation-based detectors. The fourth introduces the concept of Personal Entertainment Domains (PED) in Digital Rights Management (DRM) schemes. The fifth reports on the use of fusion techniques to improve the detection accuracy of steganalysis.

Keywords

Data encryption (Computer science). --- Multimedia systems. --- Multimedia systems --- Data encryption (Computer science) --- Engineering & Applied Sciences --- Computer Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Watermarks --- Watermarks. --- Filigrains --- Marks in paper --- Water-marks --- Computer science. --- Computer communication systems. --- Computer security. --- Computers. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Theory of Computation. --- Computer Communication Networks. --- Data Encryption. --- Management of Computing and Information Systems. --- Computers and Society. --- Operating systems (Computers). --- Algorithms. --- Multimedia information systems. --- Operating Systems. --- Multimedia Information Systems. --- Algorithm Analysis and Problem Complexity. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Information storage and retrieval systems --- Algorism --- Algebra --- Arithmetic --- Computer security --- Cryptography --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Informatics --- Science --- Communication systems --- Foundations --- Operating systems --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer privacy --- Computer system security --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Protection --- Security measures --- Distributed processing --- Security measures. --- Marks of origin --- Information Systems. --- Computer software. --- Cryptology. --- Information theory. --- Software, Computer --- Communication theory --- Communication --- Multimedia Systems --- Data Encryption (Computer Science)


Book
Transactions on Data Hiding and Multimedia Security IV
Author:
ISBN: 3642017568 9786612292422 1282292420 3642017576 Year: 2009 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This fourth issue contains five contributions in the area of digital watermarking. The first three papers deal with robust watermarking. The fourth paper introduces a new least distortion linear gain model for halftone image watermarking and the fifth contribution presents an optimal histogram pair based image reversible data hiding scheme.

Keywords

Computer security. --- Data encryption (Computer science). --- Database security. --- Multimedia systems. --- Computer Science --- Engineering & Applied Sciences --- Data encryption (Computer science) --- Digital watermarking. --- Multimedia systems --- Security measures. --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Watermarking, Digital --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer science. --- Multimedia information systems. --- User interfaces (Computer systems). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- User Interfaces and Human Computer Interaction. --- Computers and Society. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Multimedia Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Information storage and retrieval systems --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Communication systems --- Protection --- Security measures --- Image steganography --- Watermarks --- Information Systems. --- Cryptology.

Transactions on Data Hiding and Multimedia Security I
Author:
ISBN: 9783540393825 Year: 2006 Publisher: Berlin, Heidelberg Springer-Verlag Berlin/Heidelberg


Digital
Transactions on Data Hiding and Multimedia Security II
Author:
ISBN: 9783540730927 Year: 2007 Publisher: Berlin Heidelberg Springer-Verlag GmbH


Digital
Transactions on Data Hiding and Multimedia Security III
Author:
ISBN: 9783540690191 Year: 2008 Publisher: Berlin, Heidelberg Springer-Verlag Berlin Heidelberg


Digital
Transactions on Data Hiding and Multimedia Security IV
Author:
ISBN: 9783642017575 Year: 2009 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg

Listing 1 - 10 of 37 << page
of 4
>>
Sort by