Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Investigator's Guide to Steganography
Investigator's Guide to Steganography

Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable...

Information Hiding: 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers (Lecture Notes in Computer Science)
Information Hiding: 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers (Lecture Notes in Computer Science)
This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH 2007, held in Saint Malo, France, in June 2007.

The 25 revised full papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on new steganographic schemes,...

Recent Trends in Signal and Image Processing: Proceedings of ISSIP 2018 (Advances in Intelligent Systems and Computing (922))
Recent Trends in Signal and Image Processing: Proceedings of ISSIP 2018 (Advances in Intelligent Systems and Computing (922))

This book presents fascinating, state-of-the-art research findings in the field of signal and image processing. It includes conference papers covering a wide range of signal processing applications involving filtering, encoding, classification, segmentation, clustering, feature extraction, denoising, watermarking, object recognition,...

Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science)
Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science)
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to...
Multimedia Content Encryption: Techniques and Applications
Multimedia Content Encryption: Techniques and Applications

How to Design a Secure Multimedia Encryption Scheme

The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or...

Artificial Intelligence and Simulation: 13th International Conference on AI, Simulation, and Planning in High Autonomy Systems, AIS 2004, Jeju Island
Artificial Intelligence and Simulation: 13th International Conference on AI, Simulation, and Planning in High Autonomy Systems, AIS 2004, Jeju Island
This book constitutes the refereed post-proceedings of the 13th International Conference on AI, Simulation, and Planning in High Autonomy Systems, AIS 2004, held in Jeju Island, Korea in October 2004.

The 74 revised full papers presented together with 2 invited keynote papers were carefully reviewed and selected from 170 submissions;...

   
   
unlimited object storage image
Result Page: 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy