ISBN: 9783540465140
Information Hiding ab 106.99 € als pdf eBook: Third International Workshop IH'99 Dresden Germany September 29 - October 1 1999 Proceedings. Aus dem Bereich: eBooks, Sachthemen & Ratgeber,… Plus…
Hugendubel.de Nr. 33581562. Frais d'envoi, , DE. (EUR 0.00) Details... |
Information Hiding : Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings - nouveau livre
ISBN: 9783540465140
; PDF; Reference > Research & information: general > Coding theory & cryptology, Springer Berlin Heidelberg
hive.co.uk No. 9783540465140. Frais d'envoiInstock, Despatched same working day before 3pm, zzgl. Versandkosten., Livraison non-comprise Details... |
Information Hiding : Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings - nouveau livre
ISBN: 9783540465140
; PDF; Computing > Computer security > Data encryption, Springer Berlin Heidelberg
hive.co.uk No. 9783540465140. Frais d'envoiInstock, Despatched same working day before 3pm, zzgl. Versandkosten., Livraison non-comprise Details... |
2006, ISBN: 9783540465140
Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings, eBooks, eBook Download (PDF), [PU: Springer Berlin Heidelberg], Springer Berlin Heidelbe… Plus…
lehmanns.de Frais d'envoiDownload sofort lieferbar. (EUR 0.00) Details... |
ISBN: 9783540465140
Information Hiding - Third International Workshop IH'99 Dresden Germany September 29 - October 1 1999 Proceedings: ab 106.99 € Medien > Bücher > E-books, [PU: Springer, Berlin/Heidelberg]
eBook.de Nr. 33581562. Frais d'envoi, , DE. (EUR 0.00) Details... |
ISBN: 9783540465140
Information Hiding ab 106.99 € als pdf eBook: Third International Workshop IH'99 Dresden Germany September 29 - October 1 1999 Proceedings. Aus dem Bereich: eBooks, Sachthemen & Ratgeber,… Plus…
2006, ISBN: 9783540465140
Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings, eBooks, eBook Download (PDF), [PU: Springer Berlin Heidelberg], Springer Berlin Heidelbe… Plus…
ISBN: 9783540465140
Information Hiding - Third International Workshop IH'99 Dresden Germany September 29 - October 1 1999 Proceedings: ab 106.99 € Medien > Bücher > E-books, [PU: Springer, Berlin/Heidelberg]
Données bibliographiques du meilleur livre correspondant
Auteur: | |
Titre: | |
ISBN: |
Informations détaillées sur le livre - Information Hiding
EAN (ISBN-13): 9783540465140
Date de parution: 2006
Editeur: Springer Berlin Heidelberg
Livre dans la base de données depuis 2017-05-10T02:43:36+02:00 (Paris)
Page de détail modifiée en dernier sur 2024-01-01T12:42:05+01:00 (Paris)
ISBN/EAN: 9783540465140
ISBN - Autres types d'écriture:
978-3-540-46514-0
Autres types d'écriture et termes associés:
Auteur du livre: schindler, pfitzmann andreas
Titre du livre: dresden fuß, dresden 1912 1945
Données de l'éditeur
Auteur: Andreas Pfitzmann
Titre: Lecture Notes in Computer Science; Information Hiding - Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings
Editeur: Springer; Springer Berlin
492 Pages
Date de parution: 2006-12-29
Berlin; Heidelberg; DE
Imprimé / Fabriqué en
Langue: Anglais
96,29 € (DE)
99,00 € (AT)
118,00 CHF (CH)
Available
VIII, 492 p.
EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Authentication; Fingerprinting; Image Watermarking; Information Hiding; Intellectual Property Protection; Linux; Softwares Protection; Steganography; Stego-Engineering; Transformation; Watermarking; algorithms; architecture; cryptography; C; Cryptology; Computer Communication Networks; Management of Computing and Information Systems; Multimedia Information Systems; Information Systems Applications (incl. Internet); Cryptology; Computer Communication Networks; IT Operations; Multimedia Information Systems; Computer and Information Systems Applications; Computer Science; Kryptografie, Verschlüsselungstechnologie; Netzwerk-Hardware; Wirtschaftsmathematik und -informatik, IT-Management; Grafische und digitale Media-Anwendungen; Angewandte Informatik; BC
Fundamentals of Steganography.- An Information-Theoretic Approach to Steganography and Watermarking.- One-Time Hash Steganography.- Steganography: Paradigms and Examples.- Steganography Secure against Cover-Stego-Attacks.- Secure Steganographic Methods for Palette Images.- Attacks on Steganographic Systems.- Beyond Symmetric Steganography.- Developments in Steganography.- An Asymmetric Public Detection Watermarking Technique.- Zero Knowledge Watermark Detection.- Watermarking: Proving Ownership.- Proving Ownership of Digital Content.- Error- and Collusion-Secure Fingerprinting for Digital Data.- Watermarking: Detection and Decoding.- Computing the Probability of False Watermark Detection.- Optimum Decoding of Non-additive Full Frame DFT Watermarks.- Watermark Detection after Quantization Attacks.- Content-Based Watermarking for Image Authentication.- Watermarking: Embedding Techniques.- Fast Robust Template Matching for Affine Resistant Image Watermarks.- A Stochastic Approach to Content Adaptive Digital Image Watermarking.- Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation.- Watermarking: New Designs and Applications.- On the Design of a Watermarking System: Considerations and Rationales.- A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking.- Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware.- Watermarking: Improving Robustness.- Robust Watermarking for Images Based on Color Manipulation.- Recovery of Watermarks from Distorted Images.- Cocktail Watermarking on Images.- Watermarking and Software Protection.- Hiding Signatures in Graph Coloring Solutions.- Robust Object Watermarking: Application to Code.- Software DisEngineering: Program Hiding Architecture and Experiments.- The Difficulty of Separating Private and Public Information.- Chaffing at the Bit.- An Entropy-Based Framework for Database Inference.- Covert Information Transmission through the Use of Standard Collision Resolution Algorithms.- The Cocaine Auction Protocol: On the Power of Anonymous Broadcast.- Stego-Engineering.- Protecting Secret Keys in a Compromised Computational System.- StegFS: A Steganographic File System for Linux.- Nonbinary Audio Cryptography.Autres livres qui pourraient ressembler au livre recherché:
Dernier livre similaire:
9783540671824 Information Hiding: Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings Andreas Pfitzmann Editor (Andreas Pfitzmann)
- 9783540671824 Information Hiding: Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings Andreas Pfitzmann Editor (Andreas Pfitzmann)
- 9783540290391 Information Hiding: 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers (Lecture Notes in Computer Science, 3727, Band 3727) (Barni, Mauro|Herrera JoancomartÃ, Jordi|Katzenbeisser, Stefan|Pérez-González, Fernando)
- 9783540242079 Information Hiding (Jessica Fridrich)
- 9783540004219 Information Hiding: 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers Fabien A. P. Petitcolas E (Petitcolas, Fabien A.P.)
< pour archiver...