Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science)

Buy
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results.

This second issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper introduces Fingercasting, which allows joint fingerprinting and decryption of broadcast messages. The second paper presents an estimation attack on content-based video fingerprinting. The third proposes a statistics and spatiality-based feature distance measure for error resilient image authentication. The fourth paper reports on LTSB steganalysis. Finally, the fifth paper surveys various blind and robust watermarking schemes for 3D shapes.

(HTML tags aren't allowed.)

Who Says Elephants Can't Dance?:  Inside IBM's Historic Turnaround
Who Says Elephants Can't Dance?: Inside IBM's Historic Turnaround

In 1990, IBM had its most profitable year ever. By 1993, the computer industry had changed so rapidly the company was on its way to losing $16 billion and IBM was on a watch list for extinction -- victimized by its own lumbering size, an insular corporate culture, and the PC era IBM had itself helped invent.

Then Lou Gerstner was...

Oracle Procure-to-Pay Guide (Osborne ORACLE Press Series)
Oracle Procure-to-Pay Guide (Osborne ORACLE Press Series)
Some of the greatest technological advancements in business have been made in the procure-to-pay processes, not only in automation, but also in connectivity between the supplier and the purchaser. As with all areas, when technology steps in and automates the processes, the steps required to perform the automation are swept away, where they linger,...
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security

If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security measures are now available through the efforts of the Department of Defense,...


Statistical Software Engineering
Statistical Software Engineering

The development and the production of high-quality, reliable, complex computer software have become critical issues in the enormous worldwide computer technology market. The capability to efficiently engineer computer software development and production processes is central to the future economic strength, competitiveness, and national security...

Simulation and Optimization in Finance: Modeling with MATLAB, @Risk, or VBA
Simulation and Optimization in Finance: Modeling with MATLAB, @Risk, or VBA
An introduction to the theory and practice of financial simulation and optimization

In recent years, there has been a notable increase in the use of simulation and optimization methods in the financial industry. Applications include portfolio allocation, risk management, pricing, and capital budgeting under uncertainty.

...
Astrology For Dummies (Sports & Hobbies)
Astrology For Dummies (Sports & Hobbies)
Learn how to get your precise horoscope, decipher astrological symbols, and benefit from the phases of the moon with Astrology for Dummies, Second Edition. You’ll learn how to construct your birth chart, interpret its component parts, and use that information to gain insight into yourself and others. With easy-to-follow, hands-on...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy