Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Statistical Steganalysis (Information Security and Cryptography)
Advanced Statistical Steganalysis (Information Security and Cryptography)

Steganography and steganalysis, the hiding and detection of a covert payload within an innocent cover object, started to receive attention from the computer science, engineering, and mathematics communities in the 1990s. At first the problems were not clearly defined, but proper statistical foundations were proposed and mathematical...

Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia
Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia
Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with...
Security in Sensor Networks
Security in Sensor Networks

Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities.

Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers,
...

Moments and Moment Invariants in Pattern Recognition
Moments and Moment Invariants in Pattern Recognition

Automatic object recognition has become an established discipline in image analysis. Moments and moment invariants play a very important role as features in invariant recognition. They were introduced to the pattern recognition community almost 50 years ago and the mathematical background they utilized is even older, originating from the...

Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking
Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking
"Disappearing Cryptography is a witty and entertaining look at the world of information hiding. Peter Wayner provides an intuitive perspective of the many techniques, applications, and research directions in the area of steganography. The sheer breadth of topics is outstanding and makes this book truly unique. A must read for...
WordPress and Flash 10x Cookbook
WordPress and Flash 10x Cookbook

WordPress is much more than just a blogging platform now. This flexible CMS is the power behind millions of URLs, including blue-chip companies, small business, and personal websites. Flash is a world-famous multimedia platform. This book will show you the best of the proven and popular strategies and techniques to deliver rich multimedia...

The Essential Guide to Image Processing
The Essential Guide to Image Processing
THE Must-have introduction to image processing for both students and practitioners.

This comprehensive and state-of-the art approach to image processing gives engineers and students a comprehensive introduction, and includes full coverage of key applications: image watermarking, fingerprint recognition, face recognition and
...
Multimedia Systems: Algorithms, Standards, and Industry Practices
Multimedia Systems: Algorithms, Standards, and Industry Practices

Multimedia is now a broad “umbrella” that innovatively combines different fields of research and industry to produce practical solutions that are used on a wide scale today. Some of these fields are signal processing, imaging and color science, video and audio analysis, 2D/3D graphics, information theory, compression,...

Multimedia Security Technologies for Digital Rights Management
Multimedia Security Technologies for Digital Rights Management
A timely reference in the innovative and cutting-edge field of multimedia security!

Digital Rights Management (DRM) defines a set of tools that manage the secured use of digital media content found on static and mobile electronic devices, ranging from personal computers and PDAs to digital video recorders and MP3
...
Signal Processing, Perceptual Coding and Watermarking of Digital Audio: Advanced Technologies and Models (Premier Reference Source)
Signal Processing, Perceptual Coding and Watermarking of Digital Audio: Advanced Technologies and Models (Premier Reference Source)
The availability of increased computational power and the proliferation of the Internet have facilitated the production and distribution of unauthorized copies of multimedia information. As a result, the problem of copyright protection has attracted the interest of the worldwide scientific and business communities. The most...
Multimedia Security Handbook
Multimedia Security Handbook
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. The Multimedia Security Handbook addresses issues related to protecting digital media. It begins by introducing security fundamentals and discussing the vulnerabilities of individual protection...
Digital Forensics and Watermarking: 10th International Workshop, IWDW 2011, Atlantic City, NJ, USA
Digital Forensics and Watermarking: 10th International Workshop, IWDW 2011, Atlantic City, NJ, USA

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on Digital-forensics and Watermarking (IWDW 2011) held in Atlantic City, NJ, USA, during October 23-26, 2011. The 37 revised full papers presented were carefully selected from 59 submissions. Conference papers are organized in 6...

Result Page: 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy