Transactions on Data Hiding and Multimedia Security IV
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cry...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | SpringerLink (Online service) |
Otros Autores: | Shi, Yun Q. (Editor ) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2009.
|
Edición: | 1st ed. 2009. |
Colección: | Transactions on Data Hiding and Multimedia Security,
5510 |
Temas: | |
Acceso en línea: | Texto Completo |
Ejemplares similares
-
Information Hiding 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers /
Publicado: (2008) -
Biometric User Authentication for IT Security From Fundamentals to Handwriting /
por: Vielhauer, Claus
Publicado: (2006) -
Unconstrained Face Recognition
por: Zhou, Shaohua Kevin, et al.
Publicado: (2006) -
Provable Security 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings /
Publicado: (2010) -
Transactions on Data Hiding and Multimedia Security III
Publicado: (2008)