Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cry
[Lecture Notes in Computer Science] Transactions on Data Hiding and Multimedia Security V Volume 6010 || Partial Palmprint Matching Using Invariant Local Minutiae Descriptors
โ Scribed by Shi, Yun Q.
- Book ID
- 120366128
- Publisher
- Springer Berlin Heidelberg
- Year
- 2010
- Weight
- 942 KB
- Category
- Article
- ISBN
- 3642142982
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
This Inaugural Issue Of The Lncs Transactions On Data Hiding And Multimedia Security Contains Five Papers Dealing With A Wide Range Of Topics Related To Multimedia Security, From A Survey Of Problems Related To Watermark Security To An Introduction To The Concept Of Personal Entertainment Domains (p
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cry