You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-proceedings of the7th International Workshop on Information Hiding, IH 2005, held in Barcelona, Spain in June 2005. The 28 revised full papers presented together with an invited talk were carefully selected from 90 papers submitted. The papers are organized in topical sections on anonymity, watermarking, theory, watermark attacks, steganography, hiding in unusual content, steganalysis, software watermarking, and fingerprinting.
These post-proceedings contain 27 papers that were accepted for presentation at the Fifth International Workshop on Information Hiding, held 7–9 October 2002, in Noordwijkerhout, The Netherlands. The papers were selected from 78 submissions on the basis of their scienti?c excellence and novelty by the program committee. We tried to have a balanced program covering several aspects of information hiding. The program committee was composed of Ross J. Anderson (Univ- sity of Cambridge, UK), Jan Camenisch (IBM Zurich Research Laboratory, Switzerland), Ingemar J. Cox (NEC Research Institute, USA), John McHugh (SEI/CERT, USA), Ira S. Moskowitz (Naval Research Laboratory, USA), Job Oostveen (Phili...
The rapid growth of the Internet has fueled the demand for enhanced watermarking and data hiding technologies and has stimulated research into new ways to implement watermarking systems in the real world. This book presents the fundamental principles of watermarking system design and discusses state-of-the-art technologies in information concealment and recovery. It highlights the requirements and challenges of applications in security, image/video indexing, hidden communications, image captioning, and transmission error recovery and concealment. It explains the foundations of digital watermarking technologies, and offers an understanding of new approaches and applications, and lays the groundwork for future developments in the field.
This book constitutes the thoroughly refereed postproceedings of the Second International Workshop on Digital Watermarking, IWDW 2003, held in Seoul, Korea, in October 2004. The 44 revised full papers presented together with 4 invited articles were carefully selected during two rounds of reviewing and improvement from more than 90 submissions. The papers address all current aspects of digital watermarking, in particular theoretical modeling, robustness, capacity, imperceptibility and the human perceptual system, security and attacks, watermarking systems and implementations, and integration of digital watermarking in digital rights management.
A guide to the current technologies related to the delivery process for both live and on-demand services within IPTV delivery networks IPTV Delivery Networks is an important resource thatoffers an in-depth discussion to the IPTV (Internet Protocol Television) delivery networks for both live and on demand IPTV services.This important book also includes a review of the issues and challenges surrounding the delivery of IPTV over various emerging networking and communications technologies. The authors — an international team of experts — introduce a framework for delivery network applicable for live and video-on-demand services. They review the fundamental issues of IPTV delivery networks an...
This book constitutes the proceedings of the 28th International Tyrrhenian Workshop on Digital Communication, TIWDC 2017, which took place in Palermo, Italy, in September 2017. The 18 papers presented in this volume were carefully reviewed and selected from 40 submissions. They were organized in topical sections named: biometric systems; emerging services with Network Function Virtualization (NFV); multimedia forensics; security protocols; software defined networks; and technologies for Internet of Things (IoT).
Peterson's Graduate Programs in Computer Science & Information Technology, Electrical & Computer Engineering, and Energy & Power Engineering contains a wealth of information on colleges and universities that offer graduate work these exciting fields. The profiled institutions include those in the United States, Canada and abroad that are accredited by U.S. accrediting bodies. Up-to-date data, collected through Peterson's Annual Survey of Graduate and Professional Institutions, provides valuable information on degree offerings, professional accreditation, jointly offered degrees, part-time and evening/weekend programs, postbaccalaureate distance degrees, faculty, students, degree requirements...
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be...
This book constitutes the refereed proceedings of the 5th International Workshop on Digital Watermarking Secure Data Management, IWDW 2006, held in Jeju Island, Korea in November 2006. The 34 revised full papers presented together with 3 invited lectures cover both theoretical and practical issues in digital watermarking.
Benford's law states that the leading digits of many data sets are not uniformly distributed from one through nine, but rather exhibit a profound bias. This bias is evident in everything from electricity bills and street addresses to stock prices, population numbers, mortality rates, and the lengths of rivers. Here, Steven Miller brings together many of the world’s leading experts on Benford’s law to demonstrate the many useful techniques that arise from the law, show how truly multidisciplinary it is, and encourage collaboration. Beginning with the general theory, the contributors explain the prevalence of the bias, highlighting explanations for when systems should and should not follow...