Digital watermarking: 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010 ; revised selected papers
Saved in:
Format: | Conference Proceeding Book |
---|---|
Language: | English |
Published: |
Berlin [u.a.]
Springer
2011
|
Series: | Lecture notes in computer science
6526 |
Subjects: | |
Online Access: | Inhaltstext Inhaltsverzeichnis |
Physical Description: | X, 316 S. graph. Darst. |
ISBN: | 9783642184048 3642184049 |
Staff View
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV037168516 | ||
003 | DE-604 | ||
005 | 20110330 | ||
007 | t| | ||
008 | 110124s2011 gw d||| |||| 10||| eng d | ||
015 | |a 11,N01 |2 dnb | ||
016 | 7 | |a 1009117904 |2 DE-101 | |
020 | |a 9783642184048 |c Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. sfr 77.50 (freier Pr.) |9 978-3-642-18404-8 | ||
020 | |a 3642184049 |c Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. sfr 77.50 (freier Pr.) |9 3-642-18404-9 | ||
024 | 3 | |a 9783642184048 | |
028 | 5 | 2 | |a Best.-Nr.: 80032272 |
035 | |a (OCoLC)846406444 | ||
035 | |a (DE-599)DNB1009117904 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-706 |a DE-11 |a DE-83 |a DE-91G | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
245 | 1 | 0 | |a Digital watermarking |b 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010 ; revised selected papers |c Hyoung Joong Kim ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2011 | |
300 | |a X, 316 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 6526 | |
650 | 0 | 7 | |a Multimedia |0 (DE-588)4192358-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Bildverarbeitung |0 (DE-588)4006684-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Steganographie |0 (DE-588)4617648-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronisches Wasserzeichen |0 (DE-588)4572344-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Geheimnisprinzip |0 (DE-588)4437501-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2010 |z Seoul |2 gnd-content | |
689 | 0 | 0 | |a Elektronisches Wasserzeichen |0 (DE-588)4572344-8 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Elektronisches Wasserzeichen |0 (DE-588)4572344-8 |D s |
689 | 1 | 1 | |a Steganographie |0 (DE-588)4617648-2 |D s |
689 | 1 | 2 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Elektronisches Wasserzeichen |0 (DE-588)4572344-8 |D s |
689 | 2 | 1 | |a Geheimnisprinzip |0 (DE-588)4437501-3 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Multimedia |0 (DE-588)4192358-3 |D s |
689 | 3 | 1 | |a Elektronisches Wasserzeichen |0 (DE-588)4572344-8 |D s |
689 | 3 | 2 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 4 | 1 | |a Bildverarbeitung |0 (DE-588)4006684-8 |D s |
689 | 4 | 2 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 4 | |5 DE-604 | |
700 | 1 | |a Kim, Hyoung Joong |d 1954- |e Sonstige |0 (DE-588)139143270 |4 oth | |
711 | 2 | |a IWDW |n 9 |d 2010 |c Seoul |j Sonstige |0 (DE-588)16097961-4 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 6526 |w (DE-604)BV000000607 |9 6526 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3639535&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021083172&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-021083172 |
Record in the Search Index
_version_ | 1820875289829310464 |
---|---|
adam_text |
IMAGE 1
TABLE OF CONTENTS
PASSIVE DETECTION OF PAINT-DOCTORED JPEG IMAGES 1
YU QIAN ZHAO, FRANK Y. SHIH, AND YUN Q. SHI
DETECTING DIGITAL IMAGE SPLICING IN CHROMA SPACES 12
XUDONG ZHAO, JIANHUA LI, SHENGHONG LI, AND SHITIN WANG
DISCRIMINATING COMPUTER GRAPHICS IMAGES AND NATURAL IMAGES USING HIDDEN
MARKOV TREE MODEL 23
FENG PAN AND JIWU HUANG
A NEW SCRAMBLING EVALUATION SCHEME BASED ON SPATIAL DISTRIBUTION ENTROPY
AND CENTROID DIFFERENCE OF BIT-PLANE 29
LIANG ZHAO, AVISHEK ADHIKARI, AND KOUICHI SAKURAI
CRYPTANALYSIS ON AN IMAGE SCRAMBLING ENCRYPTION SCHEME BASED ON PIXEL
BIT 45
LIANG ZHAO, AVISHEK ADHIKARI, DI XIAO, AND KOUICHI SAKURAI
PLANE TRANSFORM VISUAL CRYPTOGRAPHY 60
JONATHAN WEIR AND WEIQI YAN
A STATISTICAL MODEL FOR QUANTIZED AC BLOCK DCT COEFFICIENTS IN JPEG
COMPRESSION AND ITS APPLICATION TO DETECTING POTENTIAL COMPRESSION
HISTORY IN BITMAP IMAGES 75
GOPAL NARAYANAN AND YUN QING SHI
A SMART PHONE IMAGE DATABASE FOR SINGLE IMAGE RECAPTURE DETECTION 90
XINTING GAO, BO QIU, JINGJING SHEN, TIAN-TSONG NG, AND YUN QING SHI
DETECTION OF TAMPERING INCONSISTENCIES ON MOBILE PHOTOS 105 HONG CAO AND
ALEX C. KOT
TAMPERED REGION LOCALIZATION OF DIGITAL COLOR IMAGES BASED ON JPEG
COMPRESSION NOISE 120
WEI WANG, JING DONG, AND TIENIU TAN
ROBUST AUDIO WATERMARKING BY USING LOW-FREQUENCY HISTOGRAM 134 SHIJUN
XIANG
ROBUST BLIND WATERMARKING SCHEME USING WAVE ATOMS 148 H. Y. LEUNG AND
L.M. CHENG
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1009117904
DIGITALISIERT DURCH
IMAGE 2
X TABLE OF CONTENTS
ROBUST WATERMARKING OF H.264/SVC-ENCODED VIDEO: QUALITY AND RESOLUTION
SCALABILITY 159
PETER MEERWALD AND ANDREAS UHL
REVERSIBLE WATERMARKING USING PREDICTION ERROR HISTOGRAM AND BLOCKING
170
BO OU, YAO ZHAO, AND RONGRONG NI
AN EFFICIENT PATTERN SUBSTITUTION WATERMARKING METHOD FOR BINARY IMAGES
181
KERNING DONG AND HYOUNG-JOONG KIM
N EW J P EG S T E G A N O G R A P H IC S C H E ME W I TH H I GH S E C U
R I TY P E R F O R M A N CE . . . 189
FANGJUN HUANG, YUN QING SHI, AND JIWU HUANG
TERNARY DATA HIDING TECHNIQUE FOR JPEG STEGANOGRAPHY 202
VASTLY SACHNEV AND HYOUNG-JOONG KIM
INTERLEAVING EMBEDDING SCHEME FOR ECC-BASED MULTIMEDIA FINGERPRINTING
211
XUPING ZHENG, AIXIN ZHANG, SHENGHONG LI, BO JIN, AND JUNHUA TANG
A NOVEL COLLUSION ATTACK STRATEGY FOR DIGITAL FINGERPRINTING 224 HEFEI
LING, HUI FENG, FUHAO ZOU, WEIQI YAN, AND ZHENGDING LU
PRIVACY PRESERVING FACIAL AND FINGERPRINT MULTI-BIOMETRIC AUTHENTICATION
239
ESLA TIMOTHY ANZAKU, HOSIK SOHN, AND YONG MAN RO
BLIND LINGUISTIC STEGANALYSIS AGAINST TRANSLATION BASED STEGANOGRAPHY
251
ZHILI CHEN, LIUSHENG HUANG, PENG MENG, WEI YANG, AND HAIBO MIAO
BLIND QUANTITATIVE STEGANALYSIS BASED ON FEATURE FUSION AND GRADIENT
BOOSTING 266
QINGXIAO GUAN, JING DONG, AND TIENIU TAN
IR HIDING: A METHOD TO PREVENT VIDEO RE-SHOOTING BY EXPLOITING
DIFFERENCES BETWEEN HUMAN PERCEPTIONS AND RECORDING DEVICE
CHARACTERISTICS 280
TAKAYUKI YAMADA, SEIICHI GOHSHI, AND ISAO ECHIZEN
ON LIMITS OF EMBEDDING IN 3D IMAGES BASED ON 2D WATSON'S MODEL . . 293
ZAHRA KAVEHVASH AND SHAHROKH GHAEMMAGHAMI
A REVERSIBLE ACOUSTIC STEGANOGRAPHY FOR INTEGRITY VERIFICATION 305
XUPING HUANG, AKIRA NISHIMURA, AND ISAO ECHIZEN
AUTHOR INDEX 317 |
any_adam_object | 1 |
author_GND | (DE-588)139143270 |
building | Verbundindex |
bvnumber | BV037168516 |
classification_rvk | SS 4800 |
classification_tum | DAT 465f DAT 050f |
ctrlnum | (OCoLC)846406444 (DE-599)DNB1009117904 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV037168516</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110330</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">110124s2011 gw d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">11,N01</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1009117904</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642184048</subfield><subfield code="c">Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. sfr 77.50 (freier Pr.)</subfield><subfield code="9">978-3-642-18404-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642184049</subfield><subfield code="c">Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. sfr 77.50 (freier Pr.)</subfield><subfield code="9">3-642-18404-9</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642184048</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 80032272</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)846406444</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1009117904</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital watermarking</subfield><subfield code="b">9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010 ; revised selected papers</subfield><subfield code="c">Hyoung Joong Kim ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 316 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6526</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Multimedia</subfield><subfield code="0">(DE-588)4192358-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bildverarbeitung</subfield><subfield code="0">(DE-588)4006684-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Steganographie</subfield><subfield code="0">(DE-588)4617648-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Geheimnisprinzip</subfield><subfield code="0">(DE-588)4437501-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="z">Seoul</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Steganographie</subfield><subfield code="0">(DE-588)4617648-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Geheimnisprinzip</subfield><subfield code="0">(DE-588)4437501-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Multimedia</subfield><subfield code="0">(DE-588)4192358-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="1"><subfield code="a">Bildverarbeitung</subfield><subfield code="0">(DE-588)4006684-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="2"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kim, Hyoung Joong</subfield><subfield code="d">1954-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)139143270</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">IWDW</subfield><subfield code="n">9</subfield><subfield code="d">2010</subfield><subfield code="c">Seoul</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16097961-4</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6526</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">6526</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3639535&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021083172&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-021083172</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2010 Seoul gnd-content |
genre_facet | Konferenzschrift 2010 Seoul |
id | DE-604.BV037168516 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:13:16Z |
institution | BVB |
institution_GND | (DE-588)16097961-4 |
isbn | 9783642184048 3642184049 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-021083172 |
oclc_num | 846406444 |
open_access_boolean | |
owner | DE-706 DE-11 DE-83 DE-91G DE-BY-TUM |
owner_facet | DE-706 DE-11 DE-83 DE-91G DE-BY-TUM |
physical | X, 316 S. graph. Darst. |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Digital watermarking 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010 ; revised selected papers Hyoung Joong Kim ... (eds.) Berlin [u.a.] Springer 2011 X, 316 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 6526 Multimedia (DE-588)4192358-3 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Bildverarbeitung (DE-588)4006684-8 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Steganographie (DE-588)4617648-2 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Elektronisches Wasserzeichen (DE-588)4572344-8 gnd rswk-swf Geheimnisprinzip (DE-588)4437501-3 gnd rswk-swf Computerforensik (DE-588)4774034-6 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2010 Seoul gnd-content Elektronisches Wasserzeichen (DE-588)4572344-8 s DE-604 Steganographie (DE-588)4617648-2 s Kryptoanalyse (DE-588)4830502-9 s Geheimnisprinzip (DE-588)4437501-3 s Multimedia (DE-588)4192358-3 s Sicherheitsprotokoll (DE-588)4709127-7 s Computerforensik (DE-588)4774034-6 s Bildverarbeitung (DE-588)4006684-8 s Authentifikation (DE-588)4330656-1 s Kim, Hyoung Joong 1954- Sonstige (DE-588)139143270 oth IWDW 9 2010 Seoul Sonstige (DE-588)16097961-4 oth Lecture notes in computer science 6526 (DE-604)BV000000607 6526 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3639535&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021083172&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Digital watermarking 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010 ; revised selected papers Lecture notes in computer science Multimedia (DE-588)4192358-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Bildverarbeitung (DE-588)4006684-8 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Steganographie (DE-588)4617648-2 gnd Authentifikation (DE-588)4330656-1 gnd Elektronisches Wasserzeichen (DE-588)4572344-8 gnd Geheimnisprinzip (DE-588)4437501-3 gnd Computerforensik (DE-588)4774034-6 gnd |
subject_GND | (DE-588)4192358-3 (DE-588)4830502-9 (DE-588)4006684-8 (DE-588)4709127-7 (DE-588)4617648-2 (DE-588)4330656-1 (DE-588)4572344-8 (DE-588)4437501-3 (DE-588)4774034-6 (DE-588)1071861417 |
title | Digital watermarking 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010 ; revised selected papers |
title_auth | Digital watermarking 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010 ; revised selected papers |
title_exact_search | Digital watermarking 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010 ; revised selected papers |
title_full | Digital watermarking 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010 ; revised selected papers Hyoung Joong Kim ... (eds.) |
title_fullStr | Digital watermarking 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010 ; revised selected papers Hyoung Joong Kim ... (eds.) |
title_full_unstemmed | Digital watermarking 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010 ; revised selected papers Hyoung Joong Kim ... (eds.) |
title_short | Digital watermarking |
title_sort | digital watermarking 9th international workshop iwdw 2010 seoul korea october 1 3 2010 revised selected papers |
title_sub | 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010 ; revised selected papers |
topic | Multimedia (DE-588)4192358-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Bildverarbeitung (DE-588)4006684-8 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Steganographie (DE-588)4617648-2 gnd Authentifikation (DE-588)4330656-1 gnd Elektronisches Wasserzeichen (DE-588)4572344-8 gnd Geheimnisprinzip (DE-588)4437501-3 gnd Computerforensik (DE-588)4774034-6 gnd |
topic_facet | Multimedia Kryptoanalyse Bildverarbeitung Sicherheitsprotokoll Steganographie Authentifikation Elektronisches Wasserzeichen Geheimnisprinzip Computerforensik Konferenzschrift 2010 Seoul |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3639535&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021083172&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT kimhyoungjoong digitalwatermarking9thinternationalworkshopiwdw2010seoulkoreaoctober132010revisedselectedpapers AT iwdwseoul digitalwatermarking9thinternationalworkshopiwdw2010seoulkoreaoctober132010revisedselectedpapers |