Listing 1 - 10 of 17 | << page >> |
Sort by
|
Choose an application
Complex analysis --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- complexe analyse (wiskunde) --- informatica --- maatschappij --- multimedia --- informatica management --- OS (operating system)
Choose an application
This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Digital-Forensics and Watermarking, IWDW 2013, held in Auckland, New Zealand, during October 2013. The 24 full and 13 poster papers, presented together with 2 abstracts, were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography and steganalysis; visual cryptography; reversible data hiding; forensics; watermarking; anonymizing and plate recognition.
Computer science. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Computer graphics. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Computers and Society. --- Coding and Information Theory. --- Civilization and computers --- Civilization --- Automatic drafting --- Graphic data processing --- Graphics, Computer --- Computer art --- Graphic arts --- Electronic data processing --- Engineering graphics --- Image processing --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Digital techniques --- Protection --- Security measures --- Computer vision. --- Cryptology. --- Machine vision --- Vision, Computer --- Artificial intelligence --- Pattern recognition systems --- Digital watermarking --- Optical data processing. --- Information theory. --- Communication theory --- Communication --- Cybernetics --- Optical computing --- Visual data processing --- Bionics --- Integrated optics --- Photonics --- Optical equipment
Choose an application
This book constitutes the refereed proceedings of the 16th International Workshop on Digital Forensics and Watermarking, IWDW 2017, held in Magdeburg, Germany, in August 2017. The 30 papers presented in this volume were carefully reviewed and selected from 48 submissions. The contributions are covering the state-of-the-art theoretical and practical developments in the fields of digital watermarking, steganography and steganalysis, forensics and anti-forensics, visual cryptography, and other multimedia-related security issues. Also included are the papers on two special sessions on biometric image tampering detection and on emerging threats of criminal use of information hiding : usage scenarios and detection approaches.
Computer science. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Image processing. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Algorithm Analysis and Problem Complexity. --- Image Processing and Computer Vision. --- Computers and Society. --- Coding and Information Theory. --- Civilization and computers --- Pictorial data processing --- Picture processing --- Processing, Image --- Algorism --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Civilization --- Imaging systems --- Optical data processing --- Algebra --- Arithmetic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Science --- Foundations --- Computer software. --- Computer vision. --- Cryptology. --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Software, Computer --- Data encryption (Computer science) --- Optical data processing. --- Information theory. --- Communication theory --- Communication --- Cybernetics --- Optical computing --- Visual data processing --- Bionics --- Electronic data processing --- Integrated optics --- Photonics --- Optical equipment
Choose an application
Welcome to the proceedings of the Fifth International Workshop on Digital Watermarking (IWDW). Since the first IWDW held in Seoul, Korea in 2002, it has been a focal point for meeting in person and disseminating valuable scientific and technological developments in watermarking. IWDW 2006 was held on Jeju, the dream island in Korea. The main theme of the workshop was Meet the Challenges in this Digital World! As we all know, digital watermarking and its related technologies have emerged as the key ingredients of this digital world. We report on new developments and discuss how to best utilize the watermarking and its related new technologies to cope with many challenging issues in this digital world. This year, we accepted 34 papers out of 76 highly qualified submissions from 14 different countries. Each paper was reviewed by three reviewers. The acceptance ratio of 44% indicates IWDW's continuing commitment to ensuring the quality of the workshop. In addition, we had three invited lectures and one panel discussion that shed invaluable insights to the watermarking community on new developments and future directions. The technical program featured such topics as steganography and steganalysis, data forensics, digital right management, secure watermarking, and their applications. The 34 accepted papers, three invited lectures, and the panel discussion covered both theoretical and practical issues that all of us can benefit from. Furthermore, 13 of the 34 papers were arranged in a poster session in order to facilitate more efficient and interactive information exchange.
Complex analysis --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- complexe analyse (wiskunde) --- informatica --- maatschappij --- multimedia --- informatica management --- OS (operating system)
Choose an application
Ergodic theory. Information theory --- Computer science --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- beeldverwerking --- IR (information retrieval) --- coderen --- DES (data encryption standard) --- cryptologie --- grafische vormgeving --- programmatielogica --- KI (kunstmatige intelligentie) --- informatietheorie
Choose an application
Computer science --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- beeldverwerking --- IR (information retrieval) --- DES (data encryption standard) --- cryptologie --- grafische vormgeving --- programmatielogica --- KI (kunstmatige intelligentie)
Choose an application
This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Digital-Forensics and Watermarking, IWDW 2013, held in Auckland, New Zealand, during October 2013. The 24 full and 13 poster papers, presented together with 2 abstracts, were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography and steganalysis; visual cryptography; reversible data hiding; forensics; watermarking; anonymizing and plate recognition.
Ergodic theory. Information theory --- Mathematical control systems --- Computer science --- Computer architecture. Operating systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- computervisie --- coderen --- DES (data encryption standard) --- computers --- grafische vormgeving --- informatica --- maatschappij --- computerbeveiliging --- KI (kunstmatige intelligentie) --- computerkunde --- informatietheorie
Choose an application
This volume constitutes the proceedings of the 19th International Workshop on Digital Forensics and Watermarking, IWDW 2020, held in Melbourne, VIC, Australia, in November 2020. The 20 full papers in this volume were carefully reviewed and selected from 43 submissions. They cover topics such as: novel research, development and application of digital watermarking and forensics techniques for multimedia security.
Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- computervisie --- cryptografie --- applicatiebeheer --- apps --- computers --- informatica --- programmeren (informatica) --- computerbeveiliging --- architectuur (informatica)
Choose an application
This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Digital-Forensics and Watermarking, IWDW 2014, held in Taipei, Taiwan, during October 2014. The 32 full and 14 poster papers, presented together with 1 keynote speech, were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on forensics; watermarking; reversible data hiding; visual cryptography; and steganography and steganalysis.
Computer Science. --- Data Encryption. --- Systems and Data Security. --- Biometrics. --- Coding and Information Theory. --- Computer science. --- Data protection. --- Data encryption (Computer science). --- Coding theory. --- Informatique --- Protection de l'information (Informatique) --- Chiffrement (Informatique) --- Codage --- Computer Science --- Engineering & Applied Sciences --- Computer security. --- Biometrics (Biology). --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Statistical methods --- Protection --- Security measures --- Cryptology. --- Information theory. --- Communication theory --- Communication --- Cybernetics
Choose an application
This book constitutes revised selected papers from the 14th International Workshop on Digital-Forensics and Watermarking, IWDW 2015, held in Tokyo, Japan, in October 2015. The 35 papers presented in this volume were carefully reviewed and selected from 54 submissions. The contributions are organized in topical sections named: digital forensics; steganography and steganalysis; digital watermarking; reversible data hiding; and visual cryptography.
Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Algorithm Analysis and Problem Complexity. --- Computers and Society. --- Coding and Information Theory. --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Foundations --- Protection --- Security measures --- Computer software. --- Cryptology. --- Software, Computer --- Information theory. --- Communication theory --- Communication --- Cybernetics
Listing 1 - 10 of 17 | << page >> |
Sort by
|