2008, ISBN: 9783540690191
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring,… Mehr…
Thalia.de Nr. 44259888. Versandkosten:, Sofort per Download lieferbar, DE. (EUR 0.00) Details... |
ISBN: 9783540690191
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring,… Mehr…
Springer.com new in stock. Versandkosten:spese di spedizione aggiuntive., zzgl. Versandkosten Details... |
2008, ISBN: 9783540690191
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring,… Mehr…
Orellfuessli.ch Nr. 44259888. Versandkosten:Lieferzeiten außerhalb der Schweiz 3 bis 21 Werktage, , Sofort per Download lieferbar, zzgl. Versandkosten. (EUR 16.62) Details... |
ISBN: 9783540690191
LNCS Transactions on Data Hiding and Multimedia Security provides a forum for all researchers in these emerging fields, publishing both original and archival research results. This third … Mehr…
hive.co.uk No. 9783540690191. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten. Details... |
2008, ISBN: 9783540690191
eBooks, eBook Download (PDF), [PU: Springer Berlin Heidelberg], Springer Berlin Heidelberg, 2008
lehmanns.de Versandkosten:Download sofort lieferbar. (EUR 0.00) Details... |
2008, ISBN: 9783540690191
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring,… Mehr…
ISBN: 9783540690191
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring,… Mehr…
2008
ISBN: 9783540690191
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring,… Mehr…
ISBN: 9783540690191
LNCS Transactions on Data Hiding and Multimedia Security provides a forum for all researchers in these emerging fields, publishing both original and archival research results. This third … Mehr…
2008, ISBN: 9783540690191
eBooks, eBook Download (PDF), [PU: Springer Berlin Heidelberg], Springer Berlin Heidelberg, 2008
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Transactions on Data Hiding and Multimedia Security III
EAN (ISBN-13): 9783540690191
Erscheinungsjahr: 2008
Herausgeber: Springer Berlin Heidelberg
Buch in der Datenbank seit 2016-12-28T14:50:13+01:00 (Berlin)
Detailseite zuletzt geändert am 2023-05-28T12:48:35+02:00 (Berlin)
ISBN/EAN: 9783540690191
ISBN - alternative Schreibweisen:
978-3-540-69019-1
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: jörgensen, jorgensen
Titel des Buches: multimedia, iii
Daten vom Verlag:
Autor/in: Yun Q. Shi
Titel: Transactions on Data Hiding and Multimedia Security; Lecture Notes in Computer Science; Transactions on Data Hiding and Multimedia Security III
Verlag: Springer; Springer Berlin
91 Seiten
Erscheinungsjahr: 2008-06-02
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
55,00 € (AT)
59,00 CHF (CH)
Available
IX, 91 p.
EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Multimedia; Oracle; Performance; communication; copy protection; covert channels; cryptography; data hiding; digital watermarking algorithms; digital watermarking attacks; fragile watermarking; information hiding; information leakage; networks; security; algorithm analysis and problem complexity; C; Cryptology; Data and Information Security; IT Operations; Computers and Society; Multimedia Information Systems; Algorithms; Computer Science; Kryptografie, Verschlüsselungstechnologie; Computersicherheit; Netzwerksicherheit; Wirtschaftsmathematik und -informatik, IT-Management; Digital- und Informationstechnologien: soziale und ethische Aspekte; Grafische und digitale Media-Anwendungen; Algorithmen und Datenstrukturen; BC
Constructing Good Covering Codes for Applications in Steganography.- On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems.- Secure Steganography Using Gabor Filter and Neural Networks.- Oracle Channels.- Quantization-Based Methods: Additive Attacks Performance Analysis.Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783319163062 Transactions on Data Hiding and Multimedia Security X
- 9783319163062 Transactions on Data Hiding and Multimedia Security X
- 9783642142970 Transactions on Data Hiding and Multimedia Security V (Shi, Yun Q.)
- 9783540490715 Transactions on Data Hiding and Multimedia Security I (Springer Berlin)
- 9783540690160 Transactions on Data Hiding and Multimedia Security III (Shi, Yun Q.)
- 9783642017568 Transactions on Data Hiding and Multimedia Security IV (Shi, Yun Q.)
< zum Archiv...