- 5 Résultats
prix le plus bas: € 89,57, prix le plus élevé: € 107,03, prix moyen: € 100,38
1
Information Hiding
Commander
sur Hugendubel.de
€ 106,99
Envoi: € 0,001
CommanderLien sponsorisé

Information Hiding - nouveau livre

ISBN: 9783540465140

Information Hiding ab 106.99 € als pdf eBook: Third International Workshop IH'99 Dresden Germany September 29 - October 1 1999 Proceedings. Aus dem Bereich: eBooks, Sachthemen & Ratgeber,… Plus…

Nr. 33581562. Frais d'envoi, , DE. (EUR 0.00)
2
Information Hiding : Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings - G. Grindhammer
Commander
sur hive.co.uk
£ 80,33
(environ € 91,30)
CommanderLien sponsorisé

G. Grindhammer:

Information Hiding : Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings - nouveau livre

ISBN: 9783540465140

; PDF; Reference > Research & information: general > Coding theory & cryptology, Springer Berlin Heidelberg

No. 9783540465140. Frais d'envoiInstock, Despatched same working day before 3pm, zzgl. Versandkosten., Livraison non-comprise
3
Commander
sur hive.co.uk
£ 80,33
(environ € 89,57)
CommanderLien sponsorisé
A.E. Schindler:
Information Hiding : Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings - nouveau livre

ISBN: 9783540465140

; PDF; Computing > Computer security > Data encryption, Springer Berlin Heidelberg

No. 9783540465140. Frais d'envoiInstock, Despatched same working day before 3pm, zzgl. Versandkosten., Livraison non-comprise
4
Commander
sur lehmanns.de
€ 107,03
Envoi: € 0,001
CommanderLien sponsorisé
Andreas Pfitzmann:
Information Hiding - nouveau livre

2006, ISBN: 9783540465140

Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings, eBooks, eBook Download (PDF), [PU: Springer Berlin Heidelberg], Springer Berlin Heidelbe… Plus…

Frais d'envoiDownload sofort lieferbar. (EUR 0.00)
5
Information Hiding
Commander
sur eBook.de
€ 106,99
Envoi: € 0,001
CommanderLien sponsorisé
Information Hiding - nouveau livre

ISBN: 9783540465140

Information Hiding - Third International Workshop IH'99 Dresden Germany September 29 - October 1 1999 Proceedings: ab 106.99 € Medien > Bücher > E-books, [PU: Springer, Berlin/Heidelberg]

Nr. 33581562. Frais d'envoi, , DE. (EUR 0.00)

1Comme certaines plateformes ne transmettent pas les conditions d'expédition et que celles-ci peuvent dépendre du pays de livraison, du prix d'achat, du poids et de la taille de l'article, d'une éventuelle adhésion de la plateforme, d'une livraison directe par la plateforme ou via un prestataire tiers (Marketplace), etc. il est possible que les frais de livraison indiqués par eurolivre ne correspondent pas à ceux de la plateforme qui propose l'article.

Données bibliographiques du meilleur livre correspondant

Détails sur le livre

Informations détaillées sur le livre - Information Hiding


EAN (ISBN-13): 9783540465140
Date de parution: 2006
Editeur: Springer Berlin Heidelberg

Livre dans la base de données depuis 2017-05-10T02:43:36+02:00 (Paris)
Page de détail modifiée en dernier sur 2024-01-01T12:42:05+01:00 (Paris)
ISBN/EAN: 9783540465140

ISBN - Autres types d'écriture:
978-3-540-46514-0
Autres types d'écriture et termes associés:
Auteur du livre: schindler, pfitzmann andreas
Titre du livre: dresden fuß, dresden 1912 1945


Données de l'éditeur

Auteur: Andreas Pfitzmann
Titre: Lecture Notes in Computer Science; Information Hiding - Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings
Editeur: Springer; Springer Berlin
492 Pages
Date de parution: 2006-12-29
Berlin; Heidelberg; DE
Imprimé / Fabriqué en
Langue: Anglais
96,29 € (DE)
99,00 € (AT)
118,00 CHF (CH)
Available
VIII, 492 p.

EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Authentication; Fingerprinting; Image Watermarking; Information Hiding; Intellectual Property Protection; Linux; Softwares Protection; Steganography; Stego-Engineering; Transformation; Watermarking; algorithms; architecture; cryptography; C; Cryptology; Computer Communication Networks; Management of Computing and Information Systems; Multimedia Information Systems; Information Systems Applications (incl. Internet); Cryptology; Computer Communication Networks; IT Operations; Multimedia Information Systems; Computer and Information Systems Applications; Computer Science; Kryptografie, Verschlüsselungstechnologie; Netzwerk-Hardware; Wirtschaftsmathematik und -informatik, IT-Management; Grafische und digitale Media-Anwendungen; Angewandte Informatik; BC

Fundamentals of Steganography.- An Information-Theoretic Approach to Steganography and Watermarking.- One-Time Hash Steganography.- Steganography: Paradigms and Examples.- Steganography Secure against Cover-Stego-Attacks.- Secure Steganographic Methods for Palette Images.- Attacks on Steganographic Systems.- Beyond Symmetric Steganography.- Developments in Steganography.- An Asymmetric Public Detection Watermarking Technique.- Zero Knowledge Watermark Detection.- Watermarking: Proving Ownership.- Proving Ownership of Digital Content.- Error- and Collusion-Secure Fingerprinting for Digital Data.- Watermarking: Detection and Decoding.- Computing the Probability of False Watermark Detection.- Optimum Decoding of Non-additive Full Frame DFT Watermarks.- Watermark Detection after Quantization Attacks.- Content-Based Watermarking for Image Authentication.- Watermarking: Embedding Techniques.- Fast Robust Template Matching for Affine Resistant Image Watermarks.- A Stochastic Approach to Content Adaptive Digital Image Watermarking.- Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation.- Watermarking: New Designs and Applications.- On the Design of a Watermarking System: Considerations and Rationales.- A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking.- Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware.- Watermarking: Improving Robustness.- Robust Watermarking for Images Based on Color Manipulation.- Recovery of Watermarks from Distorted Images.- Cocktail Watermarking on Images.- Watermarking and Software Protection.- Hiding Signatures in Graph Coloring Solutions.- Robust Object Watermarking: Application to Code.- Software DisEngineering: Program Hiding Architecture and Experiments.- The Difficulty of Separating Private and Public Information.- Chaffing at the Bit.- An Entropy-Based Framework for Database Inference.- Covert Information Transmission through the Use of Standard Collision Resolution Algorithms.- The Cocaine Auction Protocol: On the Power of Anonymous Broadcast.- Stego-Engineering.- Protecting Secret Keys in a Compromised Computational System.- StegFS: A Steganographic File System for Linux.- Nonbinary Audio Cryptography.

< pour archiver...