This Inaugural Issue Of The Lncs Transactions On Data Hiding And Multimedia Security Contains Five Papers Dealing With A Wide Range Of Topics Related To Multimedia Security, From A Survey Of Problems Related To Watermark Security To An Introduction To The Concept Of Personal Entertainment Domains (p
[Lecture Notes in Computer Science] Transactions on Data Hiding and Multimedia Security IV Volume 5510 || How to Compare Image Watermarking Algorithms
โ Scribed by Shi, Yun Q.
- Book ID
- 121006307
- Publisher
- Springer Berlin Heidelberg
- Year
- 2009
- Weight
- 402 KB
- Category
- Article
- ISBN
- 3642017576
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cry
This Inaugural Issue Of The Lncs Transactions On Data Hiding And Multimedia Security Contains Five Papers Dealing With A Wide Range Of Topics Related To Multimedia Security, From A Survey Of Problems Related To Watermark Security To An Introduction To The Concept Of Personal Entertainment Domains (p
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cry