Digital Watermarking: 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings: Lecture Notes in Computer Science, cartea 4283
Editat de Yun Qing Shi, Byeungwoo Jeonen Limba Engleză Paperback – 26 oct 2006
Din seria Lecture Notes in Computer Science
- 20%
Preț: 323.37 lei - 20%
Preț: 461.65 lei - 20%
Preț: 461.32 lei - 20%
Preț: 390.69 lei - 20%
Preț: 527.36 lei - 15%
Preț: 388.50 lei - 20%
Preț: 461.52 lei - 20%
Preț: 390.35 lei - 20%
Preț: 496.64 lei - 20%
Preț: 461.52 lei - 20%
Preț: 389.72 lei - 15%
Preț: 461.85 lei - 20%
Preț: 389.90 lei - 20%
Preț: 497.04 lei - 20%
Preț: 462.05 lei - 20%
Preț: 252.15 lei - 20%
Preț: 391.14 lei - 20%
Preț: 532.54 lei - 20%
Preț: 461.83 lei - 20%
Preț: 255.91 lei - 20%
Preț: 498.46 lei - 20%
Preț: 497.55 lei - 20%
Preț: 499.36 lei - 20%
Preț: 390.12 lei - 20%
Preț: 391.20 lei - 20%
Preț: 532.41 lei - 20%
Preț: 391.20 lei - 20%
Preț: 391.14 lei - 20%
Preț: 461.77 lei - 20%
Preț: 390.35 lei - 20%
Preț: 461.06 lei - 20%
Preț: 461.65 lei - 20%
Preț: 390.18 lei - 20%
Preț: 392.64 lei - 20%
Preț: 390.94 lei - 20%
Preț: 391.86 lei - 20%
Preț: 389.85 lei - 20%
Preț: 498.32 lei - 20%
Preț: 462.67 lei - 20%
Preț: 460.98 lei - 20%
Preț: 424.26 lei - 20%
Preț: 639.72 lei - 15%
Preț: 535.92 lei - 20%
Preț: 532.28 lei - 20%
Preț: 535.77 lei - 5%
Preț: 516.27 lei - 20%
Preț: 461.57 lei - 20%
Preț: 498.50 lei - 20%
Preț: 461.83 lei - 20%
Preț: 249.95 lei
Preț: 384.13 lei
Nou
Puncte Express: 576
Preț estimativ în valută:
67.97€ • 79.71$ • 59.69£
67.97€ • 79.71$ • 59.69£
Carte tipărită la comandă
Livrare economică 04-18 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540488255
ISBN-10: 3540488251
Pagini: 492
Ilustrații: XII, 476 p.
Dimensiuni: 155 x 235 x 29 mm
Greutate: 0.68 kg
Ediția:2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540488251
Pagini: 492
Ilustrații: XII, 476 p.
Dimensiuni: 155 x 235 x 29 mm
Greutate: 0.68 kg
Ediția:2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Watermarking Is Not Cryptography.- Secure Quantization Index Modulation Watermark Detection.- Steganalysis in the Presence of Weak Cryptography and Encoding.- Category Attack for LSB Steganalysis of JPEG Images.- Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA).- Multi Bit Plane Image Steganography.- Reversible Watermarking for Error Diffused Halftone Images Using Statistical Features.- Wavelet Domain Print-Scan and JPEG Resilient Data Hiding Method.- A New Multi-set Modulation Technique for Increasing Hiding Capacity of Binary Watermark for Print and Scan Processes.- A Novel Multibit Watermarking Scheme Combining Spread Spectrum and Quantization.- Wavelet Analysis Based Blind Watermarking for 3-D Surface Meshes.- Watermarking for 3D Keyframe Animation Based on Geometry and Interpolator.- A Robust Video Watermarking Scheme Via Temporal Segmentation and Middle Frequency Component Adaptive Modification.- Capacity Enhancement of Compressed Domain Watermarking Channel Using Duo-binary Coding.- Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition.- Intellectual Property Rights Management Using Combination Encryption in MPEG-4.- Data Hiding in Film Grain.- Joint Screening Halftoning and Visual Cryptography for Image Protection.- Robust Audio Watermarking Based on Low-Order Zernike Moments.- Analysis of Optimal Search Interval for Estimation of Modified Quantization Step Size in Quantization-Based Audio Watermark Detection.- Universal JPEG Steganalysis in the Compressed Frequency Domain.- Attack on JPEG2000 Steganography Using LRCA.- A Low-Cost Attack on Branch-Based Software Watermarking Schemes.- Geometric InvariantDomain for Image Watermarking.- Desynchronization in Compression Process for Collusion Resilient Video Fingerprint.- Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets.- Analysis and Comparison of Typical Reversible Watermarking Methods.- A Reversible Watermarking Based on Histogram Shifting.- Towards Lower Bounds on Embedding Distortion in Information Hiding.- Improved Differential Energy Watermarking for Embedding Watermark.- A Colorization Based Animation Broadcast System with Traitor Tracing Capability.- Adaptive Video Watermarking Utilizing Video Characteristics in 3D-DCT Domain.- Scalable Protection and Access Control in Full Scalable Video Coding.- A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication.- Secure Watermark Embedding Through Partial Encryption.- A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform.- Error Resilient Image Authentication Using Feature Statistical and Spatial Properties.