|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-24178-9 |
003 |
DE-He213 |
005 |
20220114164055.0 |
007 |
cr nn 008mamaa |
008 |
110907s2011 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642241789
|9 978-3-642-24178-9
|
024 |
7 |
|
|a 10.1007/978-3-642-24178-9
|2 doi
|
050 |
|
4 |
|a QA268
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.824
|2 23
|
245 |
1 |
0 |
|a Information Hiding
|h [electronic resource] :
|b 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers /
|c edited by Tomas Filler, Tomas Pevny, Scott Craver, Andrew Ker.
|
250 |
|
|
|a 1st ed. 2011.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2011.
|
300 |
|
|
|a XII, 343 p. 106 illus., 50 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 6958
|
520 |
|
|
|a This book contains the thoroughly refereed post-conferernce proceedings of the 13th Information Hiding Conference, IH 2011, held in Prague, Czech Republic, in May 2011. Included in this volume are 23 carefully reviewed papers that were selected out of 69 submissions. The contributions are organized in topical sections on: fingerprinting, anonymity and privacy, steganography and steganalysis, watermarking, digital rights management and digital forensics, and digital hiding in unusual context. Also included are the papers that were presented as part of the special session dedicated to the BOSS (Break Our Steganographic System) contest.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Multimedia systems.
|
650 |
|
0 |
|a Computer science-Mathematics.
|
650 |
|
0 |
|a Discrete mathematics.
|
650 |
|
0 |
|a Computer vision.
|
650 |
|
0 |
|a Computer graphics.
|
650 |
1 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Algorithms.
|
650 |
2 |
4 |
|a Multimedia Information Systems.
|
650 |
2 |
4 |
|a Discrete Mathematics in Computer Science.
|
650 |
2 |
4 |
|a Computer Vision.
|
650 |
2 |
4 |
|a Computer Graphics.
|
700 |
1 |
|
|a Filler, Tomas.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Pevny, Tomas.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Craver, Scott.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Ker, Andrew.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642241796
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642241772
|
830 |
|
0 |
|a Security and Cryptology ;
|v 6958
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-24178-9
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|