Transactions on Data Hiding and Multimedia Security V
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cry...
Corporate Author: | SpringerLink (Online service) |
---|---|
Other Authors: | Shi, Yun Q. (Editor) |
Format: | Electronic |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2010.
|
Series: | Lecture Notes in Computer Science,
6010 |
Subjects: | |
Online Access: | https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-14298-7 |
Similar Items
-
Malware analysis and detection engineering : a comprehensive approach to detect and analyze modern malware /
by: Mohanta, Abhijit,, et al.
Published: (2020) -
Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware /
by: Monnappa K A,
Published: (2018) -
The impact of service oriented architecture adoption on organizations /
by: Niknejad, Naghmeh,, et al.
Published: (2019) -
Cybersecurity fundamentals a real-world perspective /
by: Thakur, Kutub.
Published: (2020) -
Internet infrastructure : networking, web services, and cloud computing /
by: Fox, Richard, 1964-, et al.
Published: (2018)