Narrow your search
Listing 1 - 5 of 5
Sort by
Information hiding techniques for steganography and digital watermarking.
Authors: ---
ISBN: 1580530354 9781580530354 9781580534154 1580534155 Year: 2000 Publisher: Boston Artech House

Loading...
Export citation

Choose an application

Bookmark

Abstract

Steganography, a means by which two or more parties may communicate using ""invisible"" or ""subliminal"" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia.Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the

Digital watermarking : 5th international workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006 : proceedings
Authors: --- --- ---
ISBN: 9783540488255 3540488251 3540488278 Year: 2006 Volume: 4283 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Welcome to the proceedings of the Fifth International Workshop on Digital Watermarking (IWDW). Since the first IWDW held in Seoul, Korea in 2002, it has been a focal point for meeting in person and disseminating valuable scientific and technological developments in watermarking. IWDW 2006 was held on Jeju, the dream island in Korea. The main theme of the workshop was “Meet the Challenges in this Digital World!” As we all know, digital watermarking and its related technologies have emerged as the key ingredients of this digital world. We report on new developments and discuss how to best utilize the watermarking and its related new technologies to cope with many challenging issues in this digital world. This year, we accepted 34 papers out of 76 highly qualified submissions from 14 different countries. Each paper was reviewed by three reviewers. The acceptance ratio of 44% indicates IWDW’s continuing commitment to ensuring the quality of the workshop. In addition, we had three invited lectures and one panel discussion that shed invaluable insights to the watermarking community on new developments and future directions. The technical program featured such topics as steganography and steganalysis, data forensics, digital right management, secure watermarking, and their applications. The 34 accepted papers, three invited lectures, and the panel discussion covered both theoretical and practical issues that all of us can benefit from. Furthermore, 13 of the 34 papers were arranged in a poster session in order to facilitate more efficient and interactive information exchange.

Keywords

Computer security --- Data protection --- Digital watermarking --- Sécurité informatique --- Protection de l'information (Informatique) --- Filigranes numériques --- Congresses --- Congrès --- Systèmes informatiques --- Protection de l'information (informatique) --- Mesures de sûreté --- Computer Science --- Engineering & Applied Sciences --- Sécurité informatique --- Filigranes numériques --- Congrès --- EPUB-LIV-FT SPRINGER-B --- Watermarking, Digital --- Computer science. --- Operating systems (Computers). --- Data encryption (Computer science). --- Algorithms. --- Multimedia information systems. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Operating Systems. --- Management of Computing and Information Systems. --- Computers and Society. --- Multimedia Information Systems. --- Algorithm Analysis and Problem Complexity. --- Congresses. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Information storage and retrieval systems --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Informatics --- Science --- Communication systems --- Foundations --- Operating systems --- Image steganography --- Watermarks --- Information Systems. --- Multimedia systems. --- Computer software. --- Cryptology. --- Software, Computer --- Computer systems --- Filigranes numériques. --- Mesures de sûreté.

Digital watermarking : third international workshop, IWDW 2004, Seoul, Korea, October 30 - November 1, 2004 : revised selected papers
Authors: --- --- ---
ISBN: 9783540248392 3540248390 3540318054 Year: 2005 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

We are happy to present to you the proceedings of the 3rd International Workshop on Digital Watermarking, IWDW 2004. Since its modern reappearance in the academic community in the early 1990s, great progress has been made in understanding both the capabilities and the weaknesses of digital watermarking. On the theoretical side, we all are now well aware of the fact that digital watermarking is best viewed as a form of communication using side information. In the case of digital watermarking the side information in question is the document to be watermarked. This insight has led to a better understanding of the limits of the capacity and robustness of digital watermarking algorithms. It has also led to new and improved watermarking algorithms, both in terms of capacity and imperceptibility. Similarly, the role of human perception, and models thereof, has been greatly enhanced in the study and design of digital watermarking algorithms and systems. On the practical side, applications of watermarking are not yet abundant. The original euphoria on the role of digital watermarking in copy protection and copyright protection has not resulted in widespread use in practical systems. With hindsight, a number of reasons can be given for this lack of practical applications.

Keywords

Computer security --- Data protection --- Digital watermarking --- Sécurité informatique --- Protection de l'information (Informatique) --- Filigranes numériques --- Congresses. --- Congrès --- Computer Science --- Engineering & Applied Sciences --- Watermarking, Digital --- Computer science. --- Operating systems (Computers). --- Data encryption (Computer science). --- Algorithms. --- Multimedia information systems. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Operating Systems. --- Management of Computing and Information Systems. --- Computers and Society. --- Multimedia Information Systems. --- Algorithm Analysis and Problem Complexity. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Information storage and retrieval systems --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Informatics --- Science --- Communication systems --- Foundations --- Operating systems --- Image steganography --- Watermarks --- Information Systems. --- Multimedia systems. --- Computer software. --- Cryptology. --- Software, Computer --- Computer systems --- Cryptography. --- Electronic data processing --- IT Operations. --- Management. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)

Intelligent multimedia data hiding : new directions
Authors: ---
ISBN: 9783540711681 3540711686 9786610853458 128085345X 3540711694 Year: 2007 Publisher: Berlin, Germany ; New York, New York : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents the latest research in the area of multimedia data hiding paradigms. The book is divided into four parts and an appendix. The first part introduces multimedia signal processing and information hiding techniques. It includes multimedia representation, need for multimedia, digital watermarking fundamentals and requirements of watermarking. The second part describes the recent advances in multimedia signal processing. The third part presents information hiding techniques including steganography, secret sharing and watermarking. The final part of this book includes practical applications of intelligent multimedia signal processing and data hiding systems. Appendix includes source codes and/or executables related to the topics in some chapters. Interested readers are invited to use these programs. This book will be valuable to both academia and industry. This book is directed to the final year undergraduate and junior postgraduate students. Researchers and professors in the departments of electrical/electronics/communication engineering, computer science, and relating departments will find this book useful.

Keywords

Computer security. --- Digital watermarking. --- Cryptography. --- Data protection. --- Sécurité informatique --- Filigranes numériques --- Cryptographie --- Protection de l'information (Informatique) --- Civil Engineering --- Computer Science --- Applied Mathematics --- Engineering & Applied Sciences --- Civil & Environmental Engineering --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Watermarking, Digital --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Engineering. --- Health informatics. --- Artificial intelligence. --- Application software. --- Applied mathematics. --- Engineering mathematics. --- Biomedical engineering. --- Appl.Mathematics/Computational Methods of Engineering. --- Artificial Intelligence (incl. Robotics). --- Biomedical Engineering. --- Health Informatics. --- Computer Applications. --- Clinical engineering --- Medical engineering --- Bioengineering --- Biophysics --- Engineering --- Medicine --- Engineering analysis --- Mathematical analysis --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Clinical informatics --- Health informatics --- Medical information science --- Information science --- Construction --- Industrial arts --- Technology --- Mathematics --- Data processing --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Image steganography --- Watermarks --- Data protection --- Security systems --- Hacking --- Medical records --- Computer science. --- Mathematical and Computational Engineering. --- Artificial Intelligence. --- Biomedical Engineering and Bioengineering. --- Data processing. --- Informatics --- Science --- EHR systems --- EHR technology --- EHRs (Electronic health records) --- Electronic health records --- Electronic medical records --- EMR systems --- EMRs (Electronic medical records) --- Information storage and retrieval systems --- Medical care

Information hiding : 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 ; revised selected papers
Authors: ---
ISBN: 9783540741237 3540741232 3540741240 Year: 2007 Publisher: Berlin ; Heidelberg : Springer Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer security --- Data protection --- Digital watermarking --- Data encryption (Computer science) --- Sécurité informatique --- Protection de l'information (Informatique) --- Filigranes numériques --- Chiffrement (Informatique) --- Congresses. --- Congrès --- Computer Science --- Engineering & Applied Sciences --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Management of Computing and Information Systems. --- Computers and Society. --- Information Systems Applications (incl. Internet). --- Systems and Data Security. --- Computer Communication Networks. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Security measures --- Distributed processing --- Information Systems. --- Cryptology. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Security measures. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data

Listing 1 - 5 of 5
Sort by