0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (12)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 13 of 13 matches in All Departments

Transactions on Data Hiding and Multimedia Security VI (Paperback, 2011): Yun Q. Shi Transactions on Data Hiding and Multimedia Security VI (Paperback, 2011)
Yun Q. Shi
R1,885 Discovery Miles 18 850 Ships in 10 - 15 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This issue consists mainly of a special section on content protection and forensics including four papers. The additional paper deals with histogram-based image hashing for searching content-preserving copies.

Digital Watermarking - 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers... Digital Watermarking - 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers (Paperback, 2011 ed.)
Hyoung Joong Kim, Yun Q. Shi, Mauro Barni
R1,566 Discovery Miles 15 660 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held in Seoul, Korea, in October 2010. The 26 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on forensics, visual cryptography, robust watermarking, steganography, fingerprinting, and steganalysis.

Transactions on Data Hiding and Multimedia Security V (Paperback, Edition.): Yun Q. Shi Transactions on Data Hiding and Multimedia Security V (Paperback, Edition.)
Yun Q. Shi
R1,509 Discovery Miles 15 090 Ships in 10 - 15 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results.

This issue contains a special section on forensic image analysis for crime prevention including two papers. The additional four papers deal with collusion-resistant fingerprinting systems, phase correlation based image matching in scrambled domain, and visual cryptography.

Transactions on Data Hiding and Multimedia Security X (Paperback, 2015 ed.): Yun Q. Shi Transactions on Data Hiding and Multimedia Security X (Paperback, 2015 ed.)
Yun Q. Shi
R1,618 Discovery Miles 16 180 Ships in 10 - 15 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. The six papers included in this issue deal with watermarking security, perceptual image hashing, infrared hiding, steganography and steganalysis.

Transactions on Data Hiding and Multimedia Security IX - Special Issue on Visual Cryptography (Paperback, 2014 ed.): Yun Q.... Transactions on Data Hiding and Multimedia Security IX - Special Issue on Visual Cryptography (Paperback, 2014 ed.)
Yun Q. Shi, Feng Liu, Weiqi Yan
R1,947 Discovery Miles 19 470 Ships in 10 - 15 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. The seven papers included in this special issue were carefully reviewed and selected from 21 submissions. They address the challenges faced by the emerging area of visual cryptography and provide the readers with an overview of the state of the art in this field of research.

Digital-Forensics and Watermarking - 11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012,... Digital-Forensics and Watermarking - 11th International Workshop, IWDW 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Yun Q. Shi, Fernando Perez-Gonzalez, Hyoung Joong Kim
R3,223 Discovery Miles 32 230 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography.

Transactions on Data Hiding and Multimedia Security VIII (Paperback, 2012 ed.): Yun Q. Shi Transactions on Data Hiding and Multimedia Security VIII (Paperback, 2012 ed.)
Yun Q. Shi
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results.
This special issue contains five selected papers that were presented at the Workshop on Pattern Recognition for IT Security, held in Darmstadt, Germany, in September 2010, in conjunction with the 32nd Annual Symposium of the German Association for Pattern Recognition, DAGM 2010.It demonstrates the broad range of security-related topics that utilize graphical data. The contributions explore the security and reliability of biometric data, the power of machine learning methods to differentiate forged images from originals, the effectiveness of modern watermark embedding schemes and the use of information fusion in steganalysis.

Digital Watermarking - 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings (Paperback, 2009... Digital Watermarking - 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings (Paperback, 2009 ed.)
Anthony T.S. Ho, Yun Q. Shi, Hyoung Joong Kim, Mauro Barni
R1,575 Discovery Miles 15 750 Ships in 10 - 15 working days

th The 8 International Workshop on Digital Watermarking (IWDW 2009) was hosted by the University of Surrey, Guildford, Surrey, UK, during August 24 26, 2009.As with previous workshops, IWDW 2009 aimed to providea balanced program covering the latest state-of-the-art theoretical and practical devel- ments in digital watermarking, steganography and steganalysis, and the eme- ing area of image forensics. The selection of the program was a challenging task for the Technical Programme Committee members and reviewers, who ensured the highest quality and reputation of the workshop. From around 50 submissions received from authors in 14 countries, the c- mittee selected 26 regular papers (22 oral and 4 poster presentations). In - dition to the contributed papers, the workshop featured three keynote lectures on watermarking, cryptography and forensics kindly delivered by internati- ally renowned experts, Ingemar Cox, Fred Piper and Ed Delp, respectively. The regular papers and keynote lectures can be found in this proceedings volume. First of all, we would like to thank all the authors, speakers, reviewers and participants for their signi?cant contributions to the success of IWDW 2009."

Transactions on Data Hiding and Multimedia Security IV (Paperback, 2009 ed.): Yun Q. Shi Transactions on Data Hiding and Multimedia Security IV (Paperback, 2009 ed.)
Yun Q. Shi
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results.

This fourth issue contains five contributions in the area of digital watermarking. The first three papers deal with robust watermarking. The fourth paper introduces a new least distortion linear gain model for halftone image watermarking and the fifth contribution presents an optimal histogram pair based image reversible data hiding scheme.

Digital Watermarking - 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007, Proceedings (Paperback, 2008... Digital Watermarking - 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007, Proceedings (Paperback, 2008 ed.)
Yun Q. Shi, Hyoung Joong Kim, Stefan Katzenbeisser
R1,620 Discovery Miles 16 200 Ships in 10 - 15 working days

th It is our great pleasure to present in this volume the proceedings of the 6 Inter- tional Workshop on Digital Watermarking (IWDW), which was held in Guangzhou, China, during December 3-5, 2007. The workshop was hosted by the Sun Yat-sen University and sponsored by both the National Science Foundation of China and the Korea Institute of Information Security and Cryptology. Since its birth in the early 1990s, digital watermarking has become a mature e- bling technology for solving security problems associated with multimedia distribution schemes. Digital watermarks are now used in applications such as broadcast monit- ing, movie fingerprinting, digital rights management, and document authentication, to name but a few. Still, many research challenges remain open, among them security and robustness issues, reversibility and authentication. Continuing the tradition of previous workshops, IWDW 2007 also featured-besides papers dealing with digital watermarking-contributions from other related fields, such as steganography, ste- nalysis and digital forensics.

Transactions on Data Hiding and Multimedia Security III (Paperback, 2008 ed.): Yun Q. Shi Transactions on Data Hiding and Multimedia Security III (Paperback, 2008 ed.)
Yun Q. Shi
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results.

This third issue contains five contributions in the areas of steganography and digital watermarking. The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic scheme. Finally, this volume includes two papers that focus on digital watermarking and data hiding. The fourth paper introduces and analyzes a new covert channel and the fifth contribution analyzes the performance of additive attacks against quantization-based data hiding methods.

Transactions on Data Hiding and Multimedia Security II (Paperback, 2007 ed.): Yun Q. Shi Transactions on Data Hiding and Multimedia Security II (Paperback, 2007 ed.)
Yun Q. Shi
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results.

This second issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper introduces Fingercasting, which allows joint fingerprinting and decryption of broadcast messages. The second paper presents an estimation attack on content-based video fingerprinting. The third proposes a statistics and spatiality-based feature distance measure for error resilient image authentication. The fourth paper reports on LTSB steganalysis. Finally, the fifth paper surveys various blind and robust watermarking schemes for 3D shapes.

Transactions on Data Hiding and Multimedia Security I (Paperback, 2006 ed.): Yun Q. Shi Transactions on Data Hiding and Multimedia Security I (Paperback, 2006 ed.)
Yun Q. Shi
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field in multimedia security. Two related disciplines, steganalysis and data forensics, are also increasingly attracting researchers and forming another new research field in multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results.

This inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper deals with evaluation criteria for the performance of audio watermarking algorithms. The second provides a survey of problems related to watermark security. The third discusses practical implementations of zero-knowledge watermark detectors and proposes efficient solutions for correlation-based detectors. The fourth introduces the concept of Personal Entertainment Domains (PED) in Digital Rights Management (DRM) schemes. The fifth reports on the use of fusion techniques to improve the detection accuracy of steganalysis.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Bestway Beach Ball (51cm)
 (2)
R26 Discovery Miles 260
ZA Choker Necklace
R570 R399 Discovery Miles 3 990
How To Raise A Man - The Modern Mother's…
Megan de Beyer Paperback R230 R180 Discovery Miles 1 800
Catan
 (16)
R1,150 R889 Discovery Miles 8 890
Mosquito Killer (Black)
R499 R225 Discovery Miles 2 250
Metalix Square Non Stick Pan
R159 R49 Discovery Miles 490
Barbie - 4K Ultra HD + Blu-Ray
Margot Robbie, Ryan Gosling Blu-ray disc R767 R513 Discovery Miles 5 130
Gloria
Sam Smith CD R407 Discovery Miles 4 070
Sony PlayStation 5 DualSense Wireless…
 (2)
R1,599 R1,479 Discovery Miles 14 790

 

Partners