Transactions on Data Hiding and Multimedia Security II
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cry...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | SpringerLink (Online service) |
Otros Autores: | Shi, Yun Q. (Editor ) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2007.
|
Edición: | 1st ed. 2007. |
Colección: | Transactions on Data Hiding and Multimedia Security,
4499 |
Temas: | |
Acceso en línea: | Texto Completo |
Ejemplares similares
-
Transactions on Data Hiding and Multimedia Security VII
Publicado: (2012) -
Transactions on Data Hiding and Multimedia Security VI
Publicado: (2011) -
Transactions on Data Hiding and Multimedia Security V
Publicado: (2010) -
Transactions on Data Hiding and Multimedia Security III
Publicado: (2008) -
Financial Cryptography and Data Security 11th International Conference, FC 2007, and First International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad/Tobago, February 12-16, 2007. Revised Selected Papers /
Publicado: (2007)