Transactions On Data Hiding And Multimedia Security Iii
Yun Q. Shi
Sold by SMASS Sellers, IRVING, TX, U.S.A.
AbeBooks Seller since February 22, 2022
New - Soft cover
Condition: New
Quantity: 1 available
Add to basketSold by SMASS Sellers, IRVING, TX, U.S.A.
AbeBooks Seller since February 22, 2022
Condition: New
Quantity: 1 available
Add to basketBrand New Original US Edition. Customer service! Satisfaction Guaranteed.
Seller Inventory # ASNT3-1150
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results.
This third issue contains five contributions in the areas of steganography and digital watermarking. The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic scheme. Finally, this volume includes two papers that focus on digital watermarking and data hiding. The fourth paper introduces and analyzes a new covert channel and the fifth contribution analyzes the performance of additive attacks against quantization-based data hiding methods.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results.
This third issue contains five contributions in the areas of steganography and digital watermarking. The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic scheme. Finally, this volume includes two papers that focus on digital watermarking and data hiding. The fourth paper introduces and analyzes a new covert channel and the fifth contribution analyzes the performance of additive attacks against quantization-based data hiding methods.
"About this title" may belong to another edition of this title.
We sell Brand New Textbooks requied for studies in the Univesity. We have been in this business for the past 14 years and we know how to keep our customers happy and satisfies by providing them the required course material and the most affordable prices.
We ship all orders from our Multiple warehouses by Tracakble method only. We have tie up with Fedex, DHL, UPS and USPS for our logistics requirements. All tracking numbers are available within 48 hours of processing the order.
| Order quantity | 5 to 10 business days | 3 to 6 business days |
|---|---|---|
| First item | US$ 0.00 | US$ 0.00 |
Delivery times are set by sellers and vary by carrier and location. Orders passing through Customs may face delays and buyers are responsible for any associated duties or fees. Sellers may contact you regarding additional charges to cover any increased costs to ship your items.