Digital Watermarking: 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings: Lecture Notes in Computer Science, cartea 4283
Editat de Yun Qing Shi, Byeungwoo Jeonen Limba Engleză Paperback – 26 oct 2006
Din seria Lecture Notes in Computer Science
- 20%
Preț: 1020.28 lei -
Preț: 395.25 lei - 20%
Preț: 327.36 lei - 20%
Preț: 984.64 lei - 20%
Preț: 400.77 lei - 20%
Preț: 328.94 lei - 20%
Preț: 340.04 lei - 20%
Preț: 487.46 lei - 20%
Preț: 629.71 lei - 20%
Preț: 386.08 lei - 20%
Preț: 489.11 lei - 20%
Preț: 556.96 lei - 20%
Preț: 560.93 lei - 15%
Preț: 558.12 lei - 20%
Preț: 782.57 lei - 20%
Preț: 679.09 lei - 20%
Preț: 330.54 lei - 20%
Preț: 733.68 lei - 20%
Preț: 435.28 lei - 20%
Preț: 375.72 lei - 20%
Preț: 342.61 lei - 20%
Preț: 432.78 lei - 20%
Preț: 904.16 lei - 20%
Preț: 1391.87 lei - 20%
Preț: 373.80 lei - 20%
Preț: 400.17 lei - 20%
Preț: 478.59 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 620.33 lei - 20%
Preț: 731.97 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 403.00 lei - 20%
Preț: 563.29 lei - 20%
Preț: 324.19 lei - 20%
Preț: 793.92 lei - 20%
Preț: 336.86 lei - 20%
Preț: 327.36 lei - 20%
Preț: 573.45 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 850.42 lei - 20%
Preț: 560.93 lei - 20%
Preț: 558.53 lei - 20%
Preț: 631.96 lei - 20%
Preț: 568.70 lei - 20%
Preț: 488.90 lei - 20%
Preț: 293.24 lei
Preț: 384.13 lei
Puncte Express: 576
Preț estimativ în valută:
67.94€ • 78.51$ • 58.63£
67.94€ • 78.51$ • 58.63£
Carte tipărită la comandă
Livrare economică 25 aprilie-09 mai
Specificații
ISBN-13: 9783540488255
ISBN-10: 3540488251
Pagini: 492
Ilustrații: XII, 476 p.
Dimensiuni: 155 x 235 x 29 mm
Greutate: 0.68 kg
Ediția:2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540488251
Pagini: 492
Ilustrații: XII, 476 p.
Dimensiuni: 155 x 235 x 29 mm
Greutate: 0.68 kg
Ediția:2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Watermarking Is Not Cryptography.- Secure Quantization Index Modulation Watermark Detection.- Steganalysis in the Presence of Weak Cryptography and Encoding.- Category Attack for LSB Steganalysis of JPEG Images.- Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA).- Multi Bit Plane Image Steganography.- Reversible Watermarking for Error Diffused Halftone Images Using Statistical Features.- Wavelet Domain Print-Scan and JPEG Resilient Data Hiding Method.- A New Multi-set Modulation Technique for Increasing Hiding Capacity of Binary Watermark for Print and Scan Processes.- A Novel Multibit Watermarking Scheme Combining Spread Spectrum and Quantization.- Wavelet Analysis Based Blind Watermarking for 3-D Surface Meshes.- Watermarking for 3D Keyframe Animation Based on Geometry and Interpolator.- A Robust Video Watermarking Scheme Via Temporal Segmentation and Middle Frequency Component Adaptive Modification.- Capacity Enhancement of Compressed Domain Watermarking Channel Using Duo-binary Coding.- Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition.- Intellectual Property Rights Management Using Combination Encryption in MPEG-4.- Data Hiding in Film Grain.- Joint Screening Halftoning and Visual Cryptography for Image Protection.- Robust Audio Watermarking Based on Low-Order Zernike Moments.- Analysis of Optimal Search Interval for Estimation of Modified Quantization Step Size in Quantization-Based Audio Watermark Detection.- Universal JPEG Steganalysis in the Compressed Frequency Domain.- Attack on JPEG2000 Steganography Using LRCA.- A Low-Cost Attack on Branch-Based Software Watermarking Schemes.- Geometric InvariantDomain for Image Watermarking.- Desynchronization in Compression Process for Collusion Resilient Video Fingerprint.- Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets.- Analysis and Comparison of Typical Reversible Watermarking Methods.- A Reversible Watermarking Based on Histogram Shifting.- Towards Lower Bounds on Embedding Distortion in Information Hiding.- Improved Differential Energy Watermarking for Embedding Watermark.- A Colorization Based Animation Broadcast System with Traitor Tracing Capability.- Adaptive Video Watermarking Utilizing Video Characteristics in 3D-DCT Domain.- Scalable Protection and Access Control in Full Scalable Video Coding.- A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication.- Secure Watermark Embedding Through Partial Encryption.- A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform.- Error Resilient Image Authentication Using Feature Statistical and Spatial Properties.