Digital Watermarking: 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings (Lecture Notes in Computer Science, nr. 4283)
Editat de Yun Qing Shi, Byeungwoo Jeonen Limba Engleză Paperback – 26 Oct 2006
Din seria Lecture Notes in Computer Science
-
20%
Preț: 997.58 lei
-
20%
Preț: 235.39 lei
-
20%
Preț: 395.93 lei
-
20%
Preț: 620.32 lei
-
20%
Preț: 760.11 lei
-
20%
Preț: 619.50 lei
-
20%
Preț: 553.54 lei
-
20%
Preț: 1003.82 lei
-
23%
Preț: 314.85 lei
-
21%
Preț: 518.34 lei
-
21%
Preț: 438.63 lei
-
20%
Preț: 672.56 lei
-
21%
Preț: 373.21 lei
-
20%
Preț: 610.95 lei
-
26%
Preț: 533.33 lei
-
20%
Preț: 312.49 lei
-
20%
Preț: 776.70 lei
-
21%
Preț: 430.00 lei
-
20%
Preț: 312.49 lei
-
20%
Preț: 364.14 lei
-
20%
Preț: 1053.93 lei
-
20%
Preț: 739.98 lei
-
26%
Preț: 528.17 lei
-
26%
Preț: 535.77 lei
-
20%
Preț: 307.00 lei
-
20%
Preț: 404.19 lei
-
20%
Preț: 938.43 lei
-
20%
Preț: 1085.09 lei
-
7%
Preț: 493.66 lei
-
20%
Preț: 303.90 lei
-
20%
Preț: 412.67 lei
-
20%
Preț: 316.63 lei
-
5%
Preț: 345.15 lei
-
20%
Preț: 289.43 lei
-
21%
Preț: 377.67 lei
-
20%
Preț: 399.92 lei
-
20%
Preț: 414.10 lei
-
20%
Preț: 417.23 lei
-
20%
Preț: 760.11 lei
-
20%
Preț: 220.23 lei
-
20%
Preț: 590.72 lei
-
20%
Preț: 336.58 lei
-
20%
Preț: 620.88 lei
-
21%
Preț: 507.06 lei
-
20%
Preț: 398.49 lei
-
20%
Preț: 411.23 lei
-
20%
Preț: 404.19 lei
Preț: 459.40 lei
Preț vechi: 581.51 lei
-21%
Puncte Express: 689
Preț estimativ în valută:
89.76€ • 108.87$ • 79.93£
89.76€ • 108.87$ • 79.93£
Carte disponibilă
Livrare economică 08-13 februarie
Livrare express 02-09 februarie pentru 48.35 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540488255
ISBN-10: 3540488251
Pagini: 492
Ilustrații: Bibliographie
Dimensiuni: 155 x 235 x 29 mm
Greutate: 0.73 kg
Ediția: 2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science , Security and Cryptology
Locul publicării: Berlin, Heidelberg, Germany
ISBN-10: 3540488251
Pagini: 492
Ilustrații: Bibliographie
Dimensiuni: 155 x 235 x 29 mm
Greutate: 0.73 kg
Ediția: 2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science , Security and Cryptology
Locul publicării: Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Watermarking
Is
Not
Cryptography.-
Secure
Quantization
Index
Modulation
Watermark
Detection.-
Steganalysis
in
the
Presence
of
Weak
Cryptography
and
Encoding.-
Category
Attack
for
LSB
Steganalysis
of
JPEG
Images.-
Steganalysis
Using
High-Dimensional
Features
Derived
from
Co-occurrence
Matrix
and
Class-Wise
Non-Principal
Components
Analysis
(CNPCA).-
Multi
Bit
Plane
Image
Steganography.-
Reversible
Watermarking
for
Error
Diffused
Halftone
Images
Using
Statistical
Features.-
Wavelet
Domain
Print-Scan
and
JPEG
Resilient
Data
Hiding
Method.-
A
New
Multi-set
Modulation
Technique
for
Increasing
Hiding
Capacity
of
Binary
Watermark
for
Print
and
Scan
Processes.-
A
Novel
Multibit
Watermarking
Scheme
Combining
Spread
Spectrum
and
Quantization.-
Wavelet
Analysis
Based
Blind
Watermarking
for
3-D
Surface
Meshes.-
Watermarking
for
3D
Keyframe
Animation
Based
on
Geometry
and
Interpolator.-
A
Robust
Video
Watermarking
Scheme
Via
Temporal
Segmentation
and
Middle
Frequency
Component
Adaptive
Modification.-
Capacity
Enhancement
of
Compressed
Domain
Watermarking
Channel
Using
Duo-binary
Coding.-
Detection
of
Image
Splicing
Based
on
Hilbert-Huang
Transform
and
Moments
of
Characteristic
Functions
with
Wavelet
Decomposition.-
Intellectual
Property
Rights
Management
Using
Combination
Encryption
in
MPEG-4.-
Data
Hiding
in
Film
Grain.-
Joint
Screening
Halftoning
and
Visual
Cryptography
for
Image
Protection.-
Robust
Audio
Watermarking
Based
on
Low-Order
Zernike
Moments.-
Analysis
of
Optimal
Search
Interval
for
Estimation
of
Modified
Quantization
Step
Size
in
Quantization-Based
Audio
Watermark
Detection.-
Universal
JPEG
Steganalysis
in
the
Compressed
Frequency
Domain.-
Attack
on
JPEG2000
Steganography
Using
LRCA.-
A
Low-Cost
Attack
on
Branch-Based
Software
Watermarking
Schemes.-
Geometric
Invariant
Domain
for
Image
Watermarking.-
Desynchronization
in
Compression
Process
for
Collusion
Resilient
Video
Fingerprint.-
Lossless
Data
Hiding
Using
Histogram
Shifting
Method
Based
on
Integer
Wavelets.-
Analysis
and
Comparison
of
Typical
Reversible
Watermarking
Methods.-
A
Reversible
Watermarking
Based
on
Histogram
Shifting.-
Towards
Lower
Bounds
on
Embedding
Distortion
in
Information
Hiding.-
Improved
Differential
Energy
Watermarking
for
Embedding
Watermark.-
A
Colorization
Based
Animation
Broadcast
System
with
Traitor
Tracing
Capability.-
Adaptive
Video
Watermarking
Utilizing
Video
Characteristics
in
3D-DCT
Domain.-
Scalable
Protection
and
Access
Control
in
Full
Scalable
Video
Coding.-
A
Wavelet-Based
Fragile
Watermarking
Scheme
for
Secure
Image
Authentication.-
Secure
Watermark
Embedding
Through
Partial
Encryption.-
A
Rotation-Invariant
Secure
Image
Watermarking
Algorithm
Incorporating
Steerable
Pyramid
Transform.-
Error
Resilient
Image
Authentication
Using
Feature
Statistical
and
Spatial
Properties.