Eintrag weiter verarbeiten

Transactions on Data Hiding and Multimedia Security VII

Gespeichert in:

Personen und Körperschaften: Shi, Yun Qing (VerfasserIn)
Titel: Transactions on Data Hiding and Multimedia Security VII/ edited by Yun Q. Shi
Format: E-Book
Sprache: Englisch
veröffentlicht:
Berlin, Heidelberg Springer Berlin Heidelberg 2012
Gesamtaufnahme: SpringerLink
Lecture notes in computer science ; 7110
Schlagwörter:
Buchausg. u.d.T.: Transactions on data hiding and multimedia security ; 7, Berlin : Springer, 2012, VIII, 114 S.
Quelle: Verbunddaten SWB
Zugangsinformationen: Elektronischer Volltext - Campuslizenz
LEADER 04993cam a22009132 4500
001 0-1651396159
003 DE-627
005 20240122105119.0
007 cr uuu---uuuuu
008 120410s2012 gw |||||o 00| ||eng c
020 |a 9783642286933  |9 978-3-642-28693-3 
024 7 |a 10.1007/978-3-642-28693-3  |2 doi 
035 |a (DE-627)1651396159 
035 |a (DE-576)363412549 
035 |a (DE-599)BSZ363412549 
035 |a (OCoLC)785707409 
035 |a (ZBM)1238.68023 
035 |a (DE-He213)978-3-642-28693-3 
035 |a (EBP)040541428 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XA-DE 
050 0 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
084 |a *68-06  |2 msc 
084 |a 68P25  |2 msc 
084 |a 00B15  |2 msc 
100 1 |a Shi, Yun Qing  |0 (DE-588)132534215  |0 (DE-627)523628552  |0 (DE-576)299208052  |4 aut 
245 1 0 |a Transactions on Data Hiding and Multimedia Security VII  |c edited by Yun Q. Shi 
264 1 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2012 
300 |a Online-Ressource (IX, 115p. 55 illus, digital) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 7110 
490 0 |a SpringerLink  |a Bücher 
520 |a An Efficient Robust Watermarking Method Integrated in H.264/SVC -- PC-Based Real-Time Video Watermark Embedding System Independent of Platform for Parallel Computing -- IR Hiding: Method for Preventing Illegal Recording of Videos Based on Differences in Sensory Perception between Humans and Devices -- Secure Watermarking on 3D Geometry via ICA and Orthogonal Transformation -- Measuring the Statistical Correlation Inconsistencies in Mobile Images for Tamper Detection.-Secure Steganography Using Randomized Cropping -- Steganography in Streaming Multimedia over Networks. 
520 |a Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. The 7 papers included in this issue deal with the following topics: protection of digital videos, secure watermarking, tamper detection, and steganography. 
650 0 |a Computer science 
650 0 |a Computer Communication Networks 
650 0 |a Computer software 
650 0 |a Optical pattern recognition 
650 0 |a Computer Science 
650 0 |a Data protection 
650 0 |a Data encryption (Computer science) 
650 0 |a Cryptography. 
650 0 |a Computer networks . 
650 0 |a Algorithms. 
650 0 |a Computers and civilization. 
650 0 |a Pattern recognition systems. 
776 1 |z 9783642286926 
776 0 8 |i Buchausg. u.d.T.  |t Transactions on data hiding and multimedia security ; 7  |d Berlin : Springer, 2012  |h VIII, 114 S.  |w (DE-627)1432901613  |w (DE-576)362901619  |z 9783642286926 
830 0 |a Lecture notes in computer science  |v 7110  |9 7110  |w (DE-627)316228877  |w (DE-576)093890923  |w (DE-600)2018930-8  |x 1611-3349  |7 ns 
856 4 0 |u https://doi.org/10.1007/978-3-642-28693-3  |m X:SPRINGER  |x Verlag  |z lizenzpflichtig  |3 Volltext 
856 4 2 |u https://zbmath.org/?q=an:1238.68023  |m B:ZBM  |v 2021-04-12  |x Verlag  |y Zentralblatt MATH  |3 Inhaltstext 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC  |b 2012 
912 |a ZDB-2-SEB 
912 |a ZDB-2-SCS  |b 2012 
912 |a ZDB-2-SXCS  |b 2012 
912 |a ZDB-2-SEB  |b 2012 
951 |a BO 
900 |a Shi, Yun Q. 
900 |a Shi, Yun-Qing 
951 |b XB-CN 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-28693-3  |9 DE-14 
852 |a DE-14  |x epn:3347086074  |z 2012-04-10T09:47:17Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-28693-3  |9 DE-15 
852 |a DE-15  |x epn:3347086104  |z 2012-04-10T09:47:17Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-28693-3  |9 DE-Ch1 
852 |a DE-Ch1  |x epn:3347086155  |z 2012-04-10T09:47:17Z 
976 |h Elektronischer Volltext - Campuslizenz 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-28693-3  |z Zum Online-Dokument  |9 DE-Zi4 
852 |a DE-Zi4  |x epn:3347086228  |z 2012-11-10T04:19:25Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-28693-3  |9 DE-520 
852 |a DE-520  |x epn:3347086287  |z 2012-04-10T09:47:17Z 
980 |a 1651396159  |b 0  |k 1651396159  |o 363412549 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fvufind.svn.sourceforge.net%3Agenerator&rft.title=Transactions+on+Data+Hiding+and+Multimedia+Security+VII&rft.date=2012&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Transactions+on+Data+Hiding+and+Multimedia+Security+VII&rft.series=Lecture+notes+in+computer+science%2C+7110&rft.au=Shi%2C+Yun+Qing&rft.pub=Springer+Berlin+Heidelberg&rft.edition=&rft.isbn=3642286933
SOLR
_version_ 1792253777178263552
access_facet Electronic Resources
author Shi, Yun Qing
author_facet Shi, Yun Qing
author_role aut
author_sort Shi, Yun Qing
author_variant y q s yq yqs
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25
callnumber-search QA76.9.A25
callnumber-sort QA 276.9 A25
callnumber-subject QA - Mathematics
collection ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS
contents An Efficient Robust Watermarking Method Integrated in H.264/SVC -- PC-Based Real-Time Video Watermark Embedding System Independent of Platform for Parallel Computing -- IR Hiding: Method for Preventing Illegal Recording of Videos Based on Differences in Sensory Perception between Humans and Devices -- Secure Watermarking on 3D Geometry via ICA and Orthogonal Transformation -- Measuring the Statistical Correlation Inconsistencies in Mobile Images for Tamper Detection.-Secure Steganography Using Randomized Cropping -- Steganography in Streaming Multimedia over Networks., Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. The 7 papers included in this issue deal with the following topics: protection of digital videos, secure watermarking, tamper detection, and steganography.
ctrlnum (DE-627)1651396159, (DE-576)363412549, (DE-599)BSZ363412549, (OCoLC)785707409, (ZBM)1238.68023, (DE-He213)978-3-642-28693-3, (EBP)040541428
de15_date 2012-04-10T09:47:17Z
dech1_date 2012-04-10T09:47:17Z
doi_str_mv 10.1007/978-3-642-28693-3
facet_912a ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS
facet_avail Online
finc_class_facet Informatik, Mathematik
format eBook
format_access_txtF_mv Book, E-Book
format_de105 Ebook
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-online-monograph-independent
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy ElectronicBook
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv E-Book
geogr_code not assigned
geogr_code_person China
hierarchy_parent_id 0-316228877
hierarchy_parent_title Lecture notes in computer science
hierarchy_sequence 7110
hierarchy_top_id 0-316228877
hierarchy_top_title Lecture notes in computer science
id 0-1651396159
illustrated Not Illustrated
imprint Berlin, Heidelberg, Springer Berlin Heidelberg, 2012
imprint_str_mv Berlin, Heidelberg: Springer Berlin Heidelberg, 2012
institution DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15
is_hierarchy_id 0-1651396159
is_hierarchy_title Transactions on Data Hiding and Multimedia Security VII
isbn 9783642286933
isbn_isn_mv 9783642286926
issn_isn_mv 1611-3349
kxp_id_str 1651396159
language English
last_indexed 2024-02-29T17:06:33.905Z
local_heading_facet_dezwi2 Computer science, Computer Communication Networks, Computer software, Optical pattern recognition, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Computer networks ., Algorithms., Computers and civilization., Pattern recognition systems.
marc024a_ct_mv 10.1007/978-3-642-28693-3
match_str shi2012transactionsondatahidingandmultimediasecurityvii
mega_collection Verbunddaten SWB
multipart_link 093890923
multipart_part (093890923)7110
names_id_str_mv (DE-588)132534215, (DE-627)523628552, (DE-576)299208052
oclc_num 785707409
physical Online-Ressource (IX, 115p. 55 illus, digital)
publishDate 2012
publishDateSort 2012
publishPlace Berlin, Heidelberg
publisher Springer Berlin Heidelberg
record_format marcfinc
record_id 363412549
recordtype marcfinc
rsn_id_str_mv (DE-15)3038671
rvk_facet No subject assigned
series Lecture notes in computer science, 7110
series2 Lecture Notes in Computer Science ; 7110, SpringerLink ; Bücher
source_id 0
spelling Shi, Yun Qing (DE-588)132534215 (DE-627)523628552 (DE-576)299208052 aut, Transactions on Data Hiding and Multimedia Security VII edited by Yun Q. Shi, Berlin, Heidelberg Springer Berlin Heidelberg 2012, Online-Ressource (IX, 115p. 55 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7110, SpringerLink Bücher, An Efficient Robust Watermarking Method Integrated in H.264/SVC -- PC-Based Real-Time Video Watermark Embedding System Independent of Platform for Parallel Computing -- IR Hiding: Method for Preventing Illegal Recording of Videos Based on Differences in Sensory Perception between Humans and Devices -- Secure Watermarking on 3D Geometry via ICA and Orthogonal Transformation -- Measuring the Statistical Correlation Inconsistencies in Mobile Images for Tamper Detection.-Secure Steganography Using Randomized Cropping -- Steganography in Streaming Multimedia over Networks., Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. The 7 papers included in this issue deal with the following topics: protection of digital videos, secure watermarking, tamper detection, and steganography., Computer science, Computer Communication Networks, Computer software, Optical pattern recognition, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Computer networks ., Algorithms., Computers and civilization., Pattern recognition systems., 9783642286926, Buchausg. u.d.T. Transactions on data hiding and multimedia security ; 7 Berlin : Springer, 2012 VIII, 114 S. (DE-627)1432901613 (DE-576)362901619 9783642286926, Lecture notes in computer science 7110 7110 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-28693-3 X:SPRINGER Verlag lizenzpflichtig Volltext, https://zbmath.org/?q=an:1238.68023 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, http://dx.doi.org/10.1007/978-3-642-28693-3 DE-14, DE-14 epn:3347086074 2012-04-10T09:47:17Z, http://dx.doi.org/10.1007/978-3-642-28693-3 DE-15, DE-15 epn:3347086104 2012-04-10T09:47:17Z, http://dx.doi.org/10.1007/978-3-642-28693-3 DE-Ch1, DE-Ch1 epn:3347086155 2012-04-10T09:47:17Z, http://dx.doi.org/10.1007/978-3-642-28693-3 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:3347086228 2012-11-10T04:19:25Z, http://dx.doi.org/10.1007/978-3-642-28693-3 DE-520, DE-520 epn:3347086287 2012-04-10T09:47:17Z
spellingShingle Shi, Yun Qing, Transactions on Data Hiding and Multimedia Security VII, Lecture notes in computer science, 7110, An Efficient Robust Watermarking Method Integrated in H.264/SVC -- PC-Based Real-Time Video Watermark Embedding System Independent of Platform for Parallel Computing -- IR Hiding: Method for Preventing Illegal Recording of Videos Based on Differences in Sensory Perception between Humans and Devices -- Secure Watermarking on 3D Geometry via ICA and Orthogonal Transformation -- Measuring the Statistical Correlation Inconsistencies in Mobile Images for Tamper Detection.-Secure Steganography Using Randomized Cropping -- Steganography in Streaming Multimedia over Networks., Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. The 7 papers included in this issue deal with the following topics: protection of digital videos, secure watermarking, tamper detection, and steganography., Computer science, Computer Communication Networks, Computer software, Optical pattern recognition, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Computer networks ., Algorithms., Computers and civilization., Pattern recognition systems.
swb_id_str 363412549
title Transactions on Data Hiding and Multimedia Security VII
title_auth Transactions on Data Hiding and Multimedia Security VII
title_full Transactions on Data Hiding and Multimedia Security VII edited by Yun Q. Shi
title_fullStr Transactions on Data Hiding and Multimedia Security VII edited by Yun Q. Shi
title_full_unstemmed Transactions on Data Hiding and Multimedia Security VII edited by Yun Q. Shi
title_in_hierarchy 7110. Transactions on Data Hiding and Multimedia Security VII (2012)
title_short Transactions on Data Hiding and Multimedia Security VII
title_sort transactions on data hiding and multimedia security vii
title_unstemmed Transactions on Data Hiding and Multimedia Security VII
topic Computer science, Computer Communication Networks, Computer software, Optical pattern recognition, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Computer networks ., Algorithms., Computers and civilization., Pattern recognition systems.
topic_facet Computer science, Computer Communication Networks, Computer software, Optical pattern recognition, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Computer networks ., Algorithms., Computers and civilization., Pattern recognition systems.
url https://doi.org/10.1007/978-3-642-28693-3, https://zbmath.org/?q=an:1238.68023, http://dx.doi.org/10.1007/978-3-642-28693-3