Transactions on data hiding and multimedia security: IX Special issue on visual cryptography
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2014
|
Schriftenreihe: | Lecture notes in computer science
8363 : Journal subline |
Schlagworte: | |
Online-Zugang: | DE-634 DE-M347 DE-92 DE-859 DE-861 DE-91 DE-384 DE-473 DE-703 DE-20 DE-706 DE-29 DE-739 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (VIII, 130 S.) Ill., graph. Darst. |
ISBN: | 9783642550461 |
DOI: | 10.1007/978-3-642-55046-1 |
Internformat
MARC
LEADER | 00000nam a2200000 cc4500 | ||
---|---|---|---|
001 | BV041913798 | ||
003 | DE-604 | ||
007 | t| | ||
007 | cr|uuu---uuuuu | ||
008 | 140612s2014 xx ad|| o|||| 10||| eng d | ||
020 | |a 9783642550461 |c eISBN |9 978-3-642-55046-1 | ||
024 | 7 | |a 10.1007/978-3-642-55046-1 |2 doi | |
035 | |a (OCoLC)879591522 | ||
035 | |a (DE-599)BVBBV041913798 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-20 |a DE-91 |a DE-706 |a DE-739 |a DE-384 |a DE-M347 |a DE-703 |a DE-29 |a DE-92 |a DE-859 |a DE-861 |a DE-634 | ||
082 | 0 | |a 005.82 | |
100 | 1 | |a Shi, Yun Q. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Transactions on data hiding and multimedia security |n IX |p Special issue on visual cryptography |c Yun Q. Shi (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2014 | |
300 | |a 1 Online-Ressource (VIII, 130 S.) |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 8363 : Journal subline | |
490 | 0 | |a Lecture notes in computer science |v ... : Journal subline | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
773 | 0 | 8 | |w (DE-604)BV022196654 |g 9 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-3-642-55045-4 |
830 | 0 | |a Lecture notes in computer science |v 8363 : Journal subline |w (DE-604)BV014880109 |9 8363 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-55046-1 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027357447&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027357447&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-LNC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027357447 | |
966 | e | |u https://doi.org/10.1007/978-3-642-55046-1 |l DE-634 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-55046-1 |l DE-M347 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-55046-1 |l DE-92 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-55046-1 |l DE-859 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-55046-1 |l DE-861 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-55046-1 |l DE-91 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-55046-1 |l DE-384 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-55046-1 |l DE-473 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-55046-1 |l DE-703 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-55046-1 |l DE-20 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-55046-1 |l DE-706 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-55046-1 |l DE-29 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-55046-1 |l DE-739 |p ZDB-2-LNC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1820875004519120896 |
---|---|
adam_text |
TRANSACTIONS ON DATA HIDING AND MULTIMEDIA SECURITY IX
/
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
ESSVCS: AN ENRICHED SECRET SHARING VISUAL CRYPTOGRAPHY
EXTENDED VISUAL CRYPTOGRAPHY SCHEME FOR MULTIPLE-SECRETS CONTINUOUS-TONE
IMAGES
IDEAL SECURE MULTI-SECRET VISUAL CRYPTOGRAPHY SCHEME WITH RING SHARES
PASSWORD PROTECTED VISUAL CRYPTOGRAPHY VIA CELLULAR AUTOMATON RULE 30
A NOVEL PERCEPTUAL SECRET SHARING SCHEME
VISUAL CRYPTOGRAPHY BASED WATERMARKING
FLEXIBLE VISUAL CRYPTOGRAPHY SCHEME AND ITS APPLICATION
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
TRANSACTIONS ON DATA HIDING AND MULTIMEDIA SECURITY IX
/
: 2014
ABSTRACT / INHALTSTEXT
SINCE THE MID 1990S, DATA HIDING HAS BEEN PROPOSED AS AN ENABLING
TECHNOLOGY FOR SECURING MULTIMEDIA COMMUNICATION AND IS NOW USED IN
VARIOUS APPLICATIONS INCLUDING BROADCAST MONITORING, MOVIE
FINGERPRINTING, STEGANOGRAPHY, VIDEO INDEXING AND RETRIEVAL AND IMAGE
AUTHENTICATION. DATA HIDING AND CRYPTOGRAPHIC TECHNIQUES ARE OFTEN
COMBINED TO COMPLEMENT EACH OTHER, THUS TRIGGERING THE DEVELOPMENT OF A
NEW RESEARCH FIELD OF MULTIMEDIA SECURITY. BESIDES, TWO RELATED
DISCIPLINES, STEGANALYSIS AND DATA FORENSICS, ARE INCREASINGLY
ATTRACTING RESEARCHERS AND BECOMING ANOTHER NEW RESEARCH FIELD OF
MULTIMEDIA SECURITY. THIS JOURNAL, LNCS TRANSACTIONS ON DATA HIDING AND
MULTIMEDIA SECURITY, AIMS TO BE A FORUM FOR ALL RESEARCHERS IN THESE
EMERGING FIELDS, PUBLISHING BOTH ORIGINAL AND ARCHIVAL RESEARCH RESULTS.
THE SEVEN PAPERS INCLUDED IN THIS SPECIAL ISSUE WERE CAREFULLY REVIEWED
AND SELECTED FROM 21 SUBMISSIONS. THEY ADDRESS THE CHALLENGES FACED BY
THE EMERGING AREA OF VISUAL CRYPTOGRAPHY AND PROVIDE THE READERS WITH AN
OVERVIEW OF THE STATE OF THE ART IN THIS FIELD OF RESEARCH
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author | Shi, Yun Q. |
author_facet | Shi, Yun Q. |
author_role | aut |
author_sort | Shi, Yun Q. |
author_variant | y q s yq yqs |
building | Verbundindex |
bvnumber | BV041913798 |
classification_rvk | SS 4800 |
collection | ZDB-2-LNC |
ctrlnum | (OCoLC)879591522 (DE-599)BVBBV041913798 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-55046-1 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cc4500</leader><controlfield tag="001">BV041913798</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140612s2014 xx ad|| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642550461</subfield><subfield code="c">eISBN</subfield><subfield code="9">978-3-642-55046-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-55046-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)879591522</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041913798</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shi, Yun Q.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Transactions on data hiding and multimedia security</subfield><subfield code="n">IX</subfield><subfield code="p">Special issue on visual cryptography</subfield><subfield code="c">Yun Q. Shi (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (VIII, 130 S.)</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8363 : Journal subline</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">... : Journal subline</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="w">(DE-604)BV022196654</subfield><subfield code="g">9</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-3-642-55045-4</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8363 : Journal subline</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8363</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-55046-1</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027357447&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027357447&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027357447</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55046-1</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55046-1</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55046-1</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55046-1</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55046-1</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55046-1</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55046-1</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55046-1</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55046-1</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55046-1</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55046-1</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55046-1</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55046-1</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV041913798 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:08:45Z |
institution | BVB |
isbn | 9783642550461 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027357447 |
oclc_num | 879591522 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-20 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-M347 DE-703 DE-29 DE-92 DE-859 DE-861 DE-634 |
owner_facet | DE-473 DE-BY-UBG DE-20 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-M347 DE-703 DE-29 DE-92 DE-859 DE-861 DE-634 |
physical | 1 Online-Ressource (VIII, 130 S.) Ill., graph. Darst. |
psigel | ZDB-2-LNC |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Shi, Yun Q. Verfasser aut Transactions on data hiding and multimedia security IX Special issue on visual cryptography Yun Q. Shi (ed.) Berlin [u.a.] Springer 2014 1 Online-Ressource (VIII, 130 S.) Ill., graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 8363 : Journal subline Lecture notes in computer science ... : Journal subline (DE-588)1071861417 Konferenzschrift gnd-content (DE-604)BV022196654 9 Erscheint auch als Druck-Ausgabe, Paperback 978-3-642-55045-4 Lecture notes in computer science 8363 : Journal subline (DE-604)BV014880109 8363 https://doi.org/10.1007/978-3-642-55046-1 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027357447&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027357447&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Shi, Yun Q. Transactions on data hiding and multimedia security Lecture notes in computer science |
subject_GND | (DE-588)1071861417 |
title | Transactions on data hiding and multimedia security |
title_auth | Transactions on data hiding and multimedia security |
title_exact_search | Transactions on data hiding and multimedia security |
title_full | Transactions on data hiding and multimedia security IX Special issue on visual cryptography Yun Q. Shi (ed.) |
title_fullStr | Transactions on data hiding and multimedia security IX Special issue on visual cryptography Yun Q. Shi (ed.) |
title_full_unstemmed | Transactions on data hiding and multimedia security IX Special issue on visual cryptography Yun Q. Shi (ed.) |
title_short | Transactions on data hiding and multimedia security |
title_sort | transactions on data hiding and multimedia security special issue on visual cryptography |
topic_facet | Konferenzschrift |
url | https://doi.org/10.1007/978-3-642-55046-1 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027357447&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027357447&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV022196654 (DE-604)BV014880109 |
work_keys_str_mv | AT shiyunq transactionsondatahidingandmultimediasecurityix |