You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Digital Watermarking, IWDW 2004, held in Seoul, Korea in October/November 2004. The 22 revised full papers presented together with 3 invited papers were carefully selected from over 60 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on systems, theory, authentication and steganography, cryptography, and methods.
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and...
This book constitutes the refereed proceedings of the 4th International Workshop on Digital Watermarking Secure Data Management, IWDW 2005, held in Siena, Italy in September 2005. The 31 revised full papers presented were carefully reviewed and selected from 74 submissions. The papers are organized in topical sections on steganography and steganalysis, fingerprinting, watermarking, attacks, watermarking security, watermarking of unconventional media, channel coding and watermarking, theory, and applications.
Autonomous robot vehicles are vehicles capable of intelligent motion and action without requiring either a guide or teleoperator control. The recent surge of interest in this subject will grow even grow further as their potential applications increase. Autonomous vehicles are currently being studied for use as reconnaissance/exploratory vehicles for planetary exploration, undersea, land and air environments, remote repair and maintenance, material handling systems for offices and factories, and even intelligent wheelchairs for the disabled. This reference is the first to deal directly with the unique and fundamental problems and recent progress associated with autonomous vehicles. The editors have assembled and combined significant material from a multitude of sources, and, in effect, now conviniently provide a coherent organization to a previously scattered and ill-defined field.
Robotics and autonomous systems can aid disabled individuals in daily living or make a workplace more productive, but these tools are only as effective as the technology behind them. Robotic systems must be able to accurately identify and act upon elements in their environment to be effective in performing their duties. Innovative Research in Attention Modeling and Computer Vision Applications explores the latest research in image processing and pattern recognition for use in robotic real-time cryptography and surveillance applications. This book provides researchers, students, academicians, software designers, and application developers with next-generation insight into the use of computer vision technologies in a variety of industries and endeavors. This premier reference work includes chapters on topics ranging from biometric and facial recognition technologies, to digital image and video watermarking, among many others.
Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at the behest of corporations that own and create revenue from the hundreds of thousands of mini-transactio...
Based on a March 2001 workshop, this collection explores connections between random graphs and percolation, between slow mixing and phase transition, and between graph morphisms and hard-constraint models. Topics of the 14 papers include efficient local search near phase transitions in combinatorial optimization, graph homomorphisms and long range action, recent results on parameterized H-colorings, the satisfiability of random k-Horn formulae, a discrete non-Pfaffian approach to the Ising problem, and chromatic numbers of products of tournaments. No indexes are provided. Annotation : 2004 Book News, Inc., Portland, OR (booknews.com).
Papers from an October 1997 workshop survey major topics in modern applications of networks in the context of distributed computing. Articles touch on fundamental problems and challenges related to recent technological advances in the networking industry which are directly relevant and interesting to research on the mathematical principles of distributed computing. Subjects include ATM networking technology, routing and flow control in communications networks, security, optical networking, and mobile computing. No index. Annotation copyrighted by Book News, Inc., Portland, OR.
The 16 papers reflect some of the breakthroughs over the past dozen years in understanding whether or not logical inferences can be made in certain situations and what resources are necessary to make such inferences, questions that play a large role in computer science and artificial intelligence. They discuss such aspects as lower bounds in proof complexity, witnessing theorems and proof systems for feasible arithmetic, algebraic and combinatorial proof systems, and the relationship between proof complexity and Boolean circuit complexity. No index. Member prices are $47 for institutions and $35 for individuals. Annotation copyrighted by Book News, Inc., Portland, OR.
This volume features highlights from the DIMACS Special Year on "Mathematical Support for Molecular Biology". Top researchers presented both new research results and comprehensive overviews on the use of mathematics (especially discrete mathematics) and theoretical computer science in molecular biology. The book provides a unique "snapshot" of this growing area of study. It will be of interest to both experts and novices seeking information on the state of the research.