You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Researchers and professionals in the field will find the papers in this new volume essential reading. Topically arranged, they cover a multitude of subjects, from new steganographic schemes to computer security and from watermarking to fingerprinting. Complete with online files and updates, this fascinating book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH 2007, held in Saint Malo, France, in June 2007.
Audiovisual translation is the fastest growing strand within translation studies. This book addresses the need for more robust theoretical frameworks to investigate emerging text- types, address new methodological challenges (including the compilation, analysis and reproduction of audiovisual data), and understand new discourse communities bound together by the production and consumption of audiovisual texts. In this clear, user- friendly book, Luis Pérez-González introduces and explores the field, presenting and critiquing key concepts, research models and methodological approaches. Features include: • introductory overviews at the beginning of each chapter, outlining aims and relevant ...
The Mayan Languages presents a comprehensive survey of the language family associated with the Classic Mayan civilization (AD 200–900), a family whose individual languages are still spoken today by at least six million indigenous Maya in Mexico, Guatemala, Belize, and Honduras. This unique resource is an ideal reference for advanced undergraduate and postgraduate students of Mayan languages and linguistics. Written by a team of experts in the field, The Mayan Languages presents in-depth accounts of the linguistic features that characterize the thirty-one languages of the family, their historical evolution, and the social context in which they are spoken. The Mayan Languages: provides detai...
The Oxford Handbook of The Auditory Brainstem provides an introduction as well as an in-depth reference to the organization and function of ascending and descending auditory pathways in the mammalian brainstem. Individual chapters are organized along the auditory pathway beginning with the cochlea and ending with the auditory midbrain. Each chapter provides an introduction to the respective area, and summarizes our current knowledge before discussing disputes and challenges the field currently faces. A major emphasis throughout this book is on the numerous forms of plasticity that are increasingly observed in many areas of the auditory brainstem. Several chapters focus on neuronal modulation...
This book constitutes the revised post-conference proceedings of the 15th International Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, China, in September 2016. The 45 papers presented in this volume were carefully reviewed and selected from 70 submissions. The contributions are organized in topical sections on digital forensics, visual cryptography, reversible data hiding, and steganography and steganalysis.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Digital Watermarking, IWDW 2008, held in Busan, Korea, in November 2008. The 36 regular papers included in the volume were carefully reviewed and selected from 62 submissions. Areas of interest to the conference are mathematical modeling of embedding and detection; information theoretic, stochastic aspects of data hiding; security issues, including attacks and counter-attacks; combination of data hiding and cryptography; optimum watermark detection and reliable recovery; estimation of watermark capacity; channel coding techniques for watermarking; large-scale experimental tests and benchmarking; new statistical and perceptual models of content; reversible data hiding; data hiding in special media; data hiding and authentication; steganography and steganalysis; data forensics; copyright protection, DRM, and forensic watermarking; and visual cryptography.