Transactions on Data Hiding and Multimedia Security X:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2015
|
Schriftenreihe: | Lecture Notes in Computer Science
8948 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (IX, 107 p. 43 illus) |
ISBN: | 9783662467398 9783662467381 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-662-46739-8 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV042544878 | ||
003 | DE-604 | ||
005 | 20150716 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 150506s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783662467398 |c Online |9 978-3-662-46739-8 | ||
020 | |a 9783662467381 |c Print |9 978-3-662-46738-1 | ||
024 | 7 | |a 10.1007/978-3-662-46739-8 |2 doi | |
035 | |a (OCoLC)908701857 | ||
035 | |a (DE-599)BVBBV042544878 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-384 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-706 |a DE-20 |a DE-739 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-355 | ||
082 | 0 | |a 005.82 |2 23 | |
084 | |a DAT 670f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Transactions on Data Hiding and Multimedia Security X |c edited by Yun Q. Shi |
264 | 1 | |a Berlin, Heidelberg |b Springer Berlin Heidelberg |c 2015 | |
300 | |a 1 Online-Ressource (IX, 107 p. 43 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 8948 |x 0302-9743 | |
490 | 0 | |a Journal subline | |
650 | 4 | |a Computer science | |
650 | 4 | |a Data protection | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Computer vision | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a Image Processing and Computer Vision | |
650 | 4 | |a Informatik | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
700 | 1 | |a Shi, Yun Qing |e Sonstige |0 (DE-588)132534215 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 8948 |w (DE-604)BV014880109 |9 8948 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-46739-8 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978884&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978884&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027978884 |
Datensatz im Suchindex
_version_ | 1804153311061868544 |
---|---|
adam_text | TRANSACTIONS ON DATA HIDING AND MULTIMEDIA SECURITY X
/ SHI, YUN Q.
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
STRENGTHENING SPREAD SPECTRUM WATERMARKING SECURITY VIA KEY CONTROLLED
WAVELET FILTER
WAVE ATOM-BASED PERCEPTUAL IMAGE HASHING AGAINST CONTENT-PRESERVING AND
CONTENT-ALTERING ATTACKS
IR HIDING: USE OF SPECULAR REFLECTION FOR SHORT-WAVELENGTH-PASS-FILTER
DETECTION TO PREVENT RE-RECORDING OF SCREEN IMAGES
A RELIABLE COVERT COMMUNICATION SCHEME BASED ON VOIP STEGANOGRAPHY
ADAPTIVE STEGANOGRAPHY AND STEGANALYSIS WITH FIXED-SIZE EMBEDDING
PERMUTATION STEGANOGRAPHY IN FAT FILE SYSTEMS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
TRANSACTIONS ON DATA HIDING AND MULTIMEDIA SECURITY X
/ SHI, YUN Q.
: 2015
ABSTRACT / INHALTSTEXT
SINCE THE MID 1990S, DATA HIDING HAS BEEN PROPOSED AS AN ENABLING
TECHNOLOGY FOR SECURING MULTIMEDIA COMMUNICATION AND IS NOW USED IN
VARIOUS APPLICATIONS INCLUDING BROADCAST MONITORING, MOVIE
FINGERPRINTING, STEGANOGRAPHY, VIDEO INDEXING AND RETRIEVAL AND IMAGE
AUTHENTICATION. DATA HIDING AND CRYPTOGRAPHIC TECHNIQUES ARE OFTEN
COMBINED TO COMPLEMENT EACH OTHER, THUS TRIGGERING THE DEVELOPMENT OF A
NEW RESEARCH FIELD OF MULTIMEDIA SECURITY. BESIDES, TWO RELATED
DISCIPLINES, STEGANALYSIS AND DATA FORENSICS, ARE INCREASINGLY
ATTRACTING RESEARCHERS AND BECOMING ANOTHER NEW RESEARCH FIELD OF
MULTIMEDIA SECURITY. THIS JOURNAL, LNCS TRANSACTIONS ON DATA HIDING AND
MULTIMEDIA SECURITY, AIMS TO BE A FORUM FOR ALL RESEARCHERS IN THESE
EMERGING FIELDS, PUBLISHING BOTH ORIGINAL AND ARCHIVAL RESEARCH RESULTS.
THE SIX PAPERS INCLUDED IN THIS ISSUE DEAL WITH WATERMARKING SECURITY,
PERCEPTUAL IMAGE HASHING, INFRARED HIDING, STEGANOGRAPHY AND
STEGANALYSIS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author_GND | (DE-588)132534215 |
building | Verbundindex |
bvnumber | BV042544878 |
classification_tum | DAT 670f DAT 000 DAT 465f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)908701857 (DE-599)BVBBV042544878 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-662-46739-8 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02532nmm a2200589zcb4500</leader><controlfield tag="001">BV042544878</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150716 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150506s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662467398</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-662-46739-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662467381</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-662-46738-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-46739-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)908701857</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042544878</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 670f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Transactions on Data Hiding and Multimedia Security X</subfield><subfield code="c">edited by Yun Q. Shi</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin, Heidelberg</subfield><subfield code="b">Springer Berlin Heidelberg</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (IX, 107 p. 43 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">8948</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Journal subline</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer vision</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Image Processing and Computer Vision</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shi, Yun Qing</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)132534215</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">8948</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8948</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-46739-8</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978884&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978884&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027978884</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV042544878 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:24:35Z |
institution | BVB |
isbn | 9783662467398 9783662467381 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027978884 |
oclc_num | 908701857 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (IX, 107 p. 43 illus) |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer Berlin Heidelberg |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science Journal subline |
spelling | Transactions on Data Hiding and Multimedia Security X edited by Yun Q. Shi Berlin, Heidelberg Springer Berlin Heidelberg 2015 1 Online-Ressource (IX, 107 p. 43 illus) txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science 8948 0302-9743 Journal subline Computer science Data protection Data encryption (Computer science) Coding theory Computer vision Computer Science Data Encryption Systems and Data Security Coding and Information Theory Image Processing and Computer Vision Informatik (DE-588)1071861417 Konferenzschrift gnd-content Shi, Yun Qing Sonstige (DE-588)132534215 oth Lecture Notes in Computer Science 8948 (DE-604)BV014880109 8948 https://doi.org/10.1007/978-3-662-46739-8 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978884&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978884&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Transactions on Data Hiding and Multimedia Security X Lecture Notes in Computer Science Computer science Data protection Data encryption (Computer science) Coding theory Computer vision Computer Science Data Encryption Systems and Data Security Coding and Information Theory Image Processing and Computer Vision Informatik |
subject_GND | (DE-588)1071861417 |
title | Transactions on Data Hiding and Multimedia Security X |
title_auth | Transactions on Data Hiding and Multimedia Security X |
title_exact_search | Transactions on Data Hiding and Multimedia Security X |
title_full | Transactions on Data Hiding and Multimedia Security X edited by Yun Q. Shi |
title_fullStr | Transactions on Data Hiding and Multimedia Security X edited by Yun Q. Shi |
title_full_unstemmed | Transactions on Data Hiding and Multimedia Security X edited by Yun Q. Shi |
title_short | Transactions on Data Hiding and Multimedia Security X |
title_sort | transactions on data hiding and multimedia security x |
topic | Computer science Data protection Data encryption (Computer science) Coding theory Computer vision Computer Science Data Encryption Systems and Data Security Coding and Information Theory Image Processing and Computer Vision Informatik |
topic_facet | Computer science Data protection Data encryption (Computer science) Coding theory Computer vision Computer Science Data Encryption Systems and Data Security Coding and Information Theory Image Processing and Computer Vision Informatik Konferenzschrift |
url | https://doi.org/10.1007/978-3-662-46739-8 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978884&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978884&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT shiyunqing transactionsondatahidingandmultimediasecurityx |