Austrian Post 5.99 DPD courier 6.49 GLS courier 4.49

Transactions on Data Hiding and Multimedia Security X

Book Transactions on Data Hiding and Multimedia Security X Yun Q. Shi
Libristo code: 09214297
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia... Full description
? points 133 b
56.08 včetně DPH
Low in stock at our supplier Shipping in 13-16 days
Austria Delivery to Austria

30-day return policy


You might also be interested in


TOP
The Dragon Prince - Book One: Moon Aaron Ehasz / Paperback
common.buy 10.16
TOP
Girl, Woman, Other Bernardine Evaristo / Paperback
common.buy 10.91
TOP
Trade Wars Are Class Wars Michael Pettis / Paperback
common.buy 17.44
TOP
Everyday Watercolor Flowers Jenna Rainey / Paperback
common.buy 21.72
TOP
The Urban Tarot Robin Scott / Cards
common.buy 20.97
TOP
Love Her or Lose Her Tessa Bailey / Paperback
common.buy 9.30
A Touch of Ruin / Paperback
common.buy 16.47
COMING SOON
First Person Singular / Hardback
common.buy 20.86
Five C's of Cinematography Joseph V Mascelli / Paperback
common.buy 28.03
Think Again Adam Grant / Paperback
common.buy 21.72
The Melody At Night, With You Keith Jarrett / Paperback
common.buy 31.46
Hamnet / Hardback
common.buy 26.00
This Is Where It Ends Marieke Nijkamp / Paperback
common.buy 11.12

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security.§This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. The six papers included in this issue deal with watermarking security, perceptual image hashing, infrared hiding, steganography, and steganalysis.

Give this book today
It's easy
1 Add to cart and choose Deliver as present at the checkout 2 We'll send you a voucher 3 The book will arrive at the recipient's address

Login

Log in to your account. Don't have a Libristo account? Create one now!

 
mandatory
mandatory

Don’t have an account? Discover the benefits of having a Libristo account!

With a Libristo account, you'll have everything under control.

Create a Libristo account