You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book contains the proceedings of the 5th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2008), held in Turin, Italy on 4–5 September 2008. Previous events in the TrustBus series were held in Zaragoza, Spain (2004), Copenhagen, Denmark (2005), Krakow, Poland (2006), and Regensburg, Germany (2007). TrustBus 2008 brought together academic researchers and industrial developers to discuss the state of the art in technology for establishing trust, privacy and security in digital business. We thank the attendees for coming to Turin to parti- pate and debate upon the latest advances in this area. The conference program included one keynote presentation a...
Explore the concept of risk through numerous examples and their statistical modeling, traveling from a historical perspective all the way to an up-to-date technical analysis. Written with a wide readership in mind, this book begins with accounts of a selection of major historical disasters, such as the North Sea flood of 1953 and the L'Aquila earthquake. These tales serve to set the scene and to motivate the second part of the book, which describes the mathematical tools required to analyze these events, and how to use them. The focus is on the basic understanding of the mathematical modeling of risk and what types of questions the methods allow one to answer. The text offers a bridge between the world of science and that of everyday experience. It is written to be accessible to readers with only a basic background in mathematics and statistics. Even the more technical discussions are interspersed with historical comments and plentiful examples.
This book constitutes the refereed proceedings of the 12th International Conference on Information Hiding, IH 2010, held in Calgary, AB, Canada, in June 2010. The 18 revised full papers presented were carefully reviewed and selected from 39 submissions.
th It is our great pleasure to present this volume of the proceedings of the 10 edition of Information Hiding (IH 2008). The conference was held in Santa Barbara - the Ame- can Riviera, California, USA, during May 19–21, 2008. It was organized by three Santa Barbarans on fire, from both industry (Mayachitra) and academia (UCSB). Over the years, Information Hiding (IH) has established itself as a premier forum for presenting research covering various aspects of information hiding. Continuing the tradition, this year, we provide a balanced program including topics such as anonymity and privacy, forensics, steganography, watermarking, fingerprinting, other hiding domains, and novel applicatio...
This book constitutes the refereed proceedings of seven workshops held at the 18th International Conference on Image Analysis and Processing, ICIAP 2015, in Genoa, Italy, in September 2015: International Workshop on Recent Advances in Digital Security: Biometrics and Forensics, BioFor 2015; International Workshop on Color in Texture and Material Recognition, CTMR 2015; International Workshop on Medical Imaging in Rheumatology: Advanced applications for the analysis of in ammation and damage in the rheumatoid Joint, RHEUMA 2015; International Workshop on Image-Based Smart City Application, ISCA 2015; International Workshop on Multimedia Assisted Dietary Management, MADiMa 2015; International Workshop on Scene Background Modeling and initialization, SBMI 2015; and International Workshop on Image and Video Processing for Quality of Multimedia Experience, QoEM 2015.
This book constitutes the revised post-conference proceedings of the 15th International Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, China, in September 2016. The 45 papers presented in this volume were carefully reviewed and selected from 70 submissions. The contributions are organized in topical sections on digital forensics, visual cryptography, reversible data hiding, and steganography and steganalysis.
A successor to the popular Artech House title Information Hiding Techniques for Steganography and Digital Watermarking, this comprehensive and up-to-date new resource gives the reader a thorough review of steganography, digital watermarking and media fingerprinting with possible applications to modern communication, and a survey of methods used to hide information in modern media. This book explores Steganography, as a means by which two or more parties may communicate using invisible or subliminal communication. "Steganalysis" is described as methods which can be used to break steganographic communication. This comprehensive resource also includes an introduction to watermarking and its methods, a means of hiding copyright data in images and discusses components of commercial multimedia applications that are subject to illegal use. This book demonstrates a working knowledge of watermarking’s pros and cons, and the legal implications of watermarking and copyright issues on the Internet.
Digitising personal information is changing our ways of identifying persons and managing relations. What used to be a "natural" identity, is now as virtual as a user account at a web portal, an email address, or a mobile phone number. It is subject to diverse forms of identity management in business, administration, and among citizens. Core question and source of conflict is who owns how much identity information of whom and who needs to place trust into which identity information to allow access to resources. This book presents multidisciplinary answers from research, government, and industry. Research from states with different cultures on the identification of citizens and ID cards is combined towards analysis of HighTechIDs and Virtual Identities, considering privacy, mobility, profiling, forensics, and identity related crime. "FIDIS has put Europe on the global map as a place for high quality identity management research." –V. Reding, Commissioner, Responsible for Information Society and Media (EU)