|
|
| | Techniques and Applications of Digital Watermarking and Content ProtectionWhether you need to quickly come up to speed on the state of the art in digital watermarking or want to explore the latest research in this area, such as 3-D geometry watermarking, this timely reference gives you the hands-on knowledge you need for your work. This book covers the full range of media -- still images, audio data, video, 3-D geometry... | | |
|
Multimedia Security HandbookIntellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. The Multimedia Security Handbook addresses issues related to protecting digital media. It begins by introducing security fundamentals and discussing the vulnerabilities of individual protection... | | | | Information Security for Automatic Speaker Identification
Speaker identification is a widely used technique in several security
systems. In remote access systems, speaker utterances are recoded and
communicated through a communication channel to a receiver that performs the
identification process. Speaker identification is based on characterizing each
speaker with a set of features... |
|
| | Information Hiding: 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers (Lecture Notes in Computer Science)This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH 2007, held in Saint Malo, France, in June 2007.
The 25 revised full papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on new steganographic schemes,... | | |
|
|
Result Page: 4 3 2 1 |