- 5 Résultats
prix le plus bas: € 53,49, prix le plus élevé: € 93,08, prix moyen: € 65,80
1
Information Hiding 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers - Furon, Teddy (Herausgeber); Bas, Patrick (Herausgeber); Doërrg, Gwenaël (Herausgeber); Cayre, François (Herausgeber)
Commander
sur Achtung-Buecher.de
€ 55,60
Envoi: € 0,001
CommanderLien sponsorisé
Furon, Teddy (Herausgeber); Bas, Patrick (Herausgeber); Doërrg, Gwenaël (Herausgeber); Cayre, François (Herausgeber):

Information Hiding 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers - nouveau livre

2008, ISBN: 354077369X

2007 Kartoniert / Broschiert Datensicherheit, Datensicherung, Sicherheit / Datensicherheit, Kryptografie, Verschlüsselung, Wirtschaftsmathematik und -informatik, IT-Management, Ethische… Plus…

Frais d'envoiVersandkostenfrei innerhalb der BRD. (EUR 0.00) MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien
2
Information Hiding
Commander
sur Hugendubel.de
€ 53,49
Envoi: € 0,001
CommanderLien sponsorisé
Information Hiding - Livres de poche

2007, ISBN: 9783540773696

*Information Hiding* - 9th International Workshop IH 2007 Saint Malo France June 11-13 2007 Revised Selected Papers. Auflage 2007 / Taschenbuch für 53.49 € / Aus dem Bereich: Bücher, Engl… Plus…

Frais d'envoiShipping in 3 days, , Versandkostenfrei nach Hause oder Express-Lieferung in Ihre Buchhandlung., DE. (EUR 0.00)
3
Information Hiding
Commander
sur Hugendubel.de
€ 53,49
Envoi: € 0,001
CommanderLien sponsorisé
Information Hiding - Livres de poche

2007

ISBN: 9783540773696

*Information Hiding* - 9th International Workshop IH 2007 Saint Malo France June 11-13 2007 Revised Selected Papers. Auflage 2007 / Taschenbuch für 53.49 € / Aus dem Bereich: Bücher, Ratg… Plus…

Frais d'envoiShipping in 3 days, , Versandkostenfrei nach Hause oder Express-Lieferung in Ihre Buchhandlung., DE. (EUR 0.00)
4
Information Hiding 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers - Furon, Teddy, Francois Cayre  und Gwenael DoerrG
Commander
sur booklooker.de
€ 73,33
Envoi: € 0,001
CommanderLien sponsorisé
Furon, Teddy, Francois Cayre und Gwenael DoerrG:
Information Hiding 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers - livre d'occasion

2008, ISBN: 9783540773696

[PU: Springer Berlin], Neubindung, Aufl. 2007 4160845/12, DE, [SC: 0.00], gebraucht; sehr gut, gewerbliches Angebot, 2007, Banküberweisung, PayPal, Klarna-Sofortüberweisung, International… Plus…

Frais d'envoiVersandkostenfrei, Versand nach Deutschland. (EUR 0.00) Buchpark GmbH
5
Information Hiding - Teddy Furon; François Cayre; Gwenaël DoërrG; Patrick Bas
Commander
sur lehmanns.de
€ 93,08
Envoi: € 0,001
CommanderLien sponsorisé
Teddy Furon; François Cayre; Gwenaël DoërrG; Patrick Bas:
Information Hiding - Première édition

2008, ISBN: 9783540773696

Livres de poche

9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers, Buch, Softcover, [PU: Springer Berlin], Springer Berlin, 2008

Frais d'envoiVersand in 10-14 Tagen. (EUR 0.00)

1Comme certaines plateformes ne transmettent pas les conditions d'expédition et que celles-ci peuvent dépendre du pays de livraison, du prix d'achat, du poids et de la taille de l'article, d'une éventuelle adhésion de la plateforme, d'une livraison directe par la plateforme ou via un prestataire tiers (Marketplace), etc. il est possible que les frais de livraison indiqués par eurolivre ne correspondent pas à ceux de la plateforme qui propose l'article.

Données bibliographiques du meilleur livre correspondant

Détails sur le livre
Information Hiding

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH 2007, held in Saint Malo, France, in June 2007. The 25 revised full papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on new steganographic schemes, watermarking schemes, computer security, steganography and code theory, watermarking security, steganalysis, watermarking and re-synchronization, fingerprinting, forensics, and steganalysis.

Informations détaillées sur le livre - Information Hiding


EAN (ISBN-13): 9783540773696
ISBN (ISBN-10): 354077369X
Version reliée
Livre de poche
Date de parution: 2008
Editeur: Springer Berlin Heidelberg
393 Pages
Poids: 0,610 kg
Langue: eng/Englisch

Livre dans la base de données depuis 2007-12-07T18:53:29+01:00 (Paris)
Page de détail modifiée en dernier sur 2024-01-23T02:45:43+01:00 (Paris)
ISBN/EAN: 9783540773696

ISBN - Autres types d'écriture:
3-540-77369-X, 978-3-540-77369-6
Autres types d'écriture et termes associés:
Auteur du livre: furon, bas, doerr, cayre, malo, dörr, doa, patrick
Titre du livre: saint malo, information hiding, information france


Données de l'éditeur

Auteur: Teddy Furon; François Cayre; Gwenaël DoërrG; Patrick Bas
Titre: Lecture Notes in Computer Science; Security and Cryptology; Information Hiding - 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers
Editeur: Springer; Springer Berlin
396 Pages
Date de parution: 2008-01-14
Berlin; Heidelberg; DE
Imprimé / Fabriqué en
Poids: 0,623 kg
Langue: Anglais
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
POD
XI, 396 p.

BC; Cryptology; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; Code; Information; Oracle; authentication; communication; cryptography; data hiding; digital fingerprinting; elliptic curve; encryption; information hiding; optimization; privacy; secrecy; security; Management of Computing and Information Systems; Computers and Society; Information Systems Applications (incl. Internet); Systems and Data Security; Computer Communication Networks; Cryptology; IT Operations; Computers and Society; Computer and Information Systems Applications; Data and Information Security; Computer Communication Networks; Kryptografie, Verschlüsselungstechnologie; Wirtschaftsmathematik und -informatik, IT-Management; Digital- und Informationstechnologien: soziale und ethische Aspekte; Angewandte Informatik; Computersicherheit; Netzwerksicherheit; Netzwerk-Hardware; EA

New Steganographic Schemes.- MPSteg-color: A New Steganographic Technique for Color Images.- YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis.- Steganographic Communication with Quantum Information.- Watermarking Schemess.- Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation.- Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization.- Computer Security.- A Graph Game Model for Software Tamper Protection.- Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection.- Space-Efficient Kleptography Without Random Oracles.- Steganography and Code Theory.- How Can Reed-Solomon Codes Improve Steganographic Schemes?.- Reducing the Complexity of Syndrome Coding for Embedding.- Watermarking Security.- Exploiting Security Holes in Lattice Data Hiding.- Practical Security Analysis of Dirty Paper Trellis Watermarking.- Security of Invertible Media Authentication Schemes Revisited.- Steganalysis.- A Fusion of Maximum Likelihood and Structural Steganalysis.- Traffic Analysis Attacks on a Continuously-Observable Steganographic File System.- Watermarking and Re-synchronization.- Soft Feature-Based Watermark Decoding with Insertion/Deletion Correction.- Noise Robust Speech Watermarking with Bit Synchronisation for the Aeronautical Radio.- A Geometrical Robust Image Data Hiding Scheme Using FCA-Based Resynchronization.- Fingerprinting.- Optimization of Tardos’s Fingerprinting Codes in a Viewpoint of Memory Amount.- Combining Tardos Fingerprinting Codes and Fingercasting.- Forensics.- Exposing Digital Forgeries Through Specular Highlights on the Eye.- Tamper Hiding: Defeating Image Forensics.- Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries.- Steganalysis.- Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification.- Generalised Category Attack—Improving Histogram-Based Attack on JPEG LSB Embedding.

< pour archiver...