Overview
- Original and archival research in the field of data hiding, visual cryptography and digital watermarking
- Includes theoretical analyses and experimental results
- Features original papers addressing novel ideas and issues
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8948)
Part of the book sub series: Transactions on Data Hiding and Multimedia Security (TDHMS)
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (6 chapters)
Keywords
- VoIP
- authentication
- content-adaptive steganography
- covert communication
- digital images
- game theory
- image hashing
- infrared camcorder
- key controlled wavelet
- mutual information
- parameterizations
- public key encryption
- robustness
- secret sharing
- security
- specular reflection
- spread spectrum
- steganography
- watermarking schemes
- watermarking security
About this book
Editors and Affiliations
Bibliographic Information
Book Title: Transactions on Data Hiding and Multimedia Security X
Editors: Yun Q. Shi
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-662-46739-8
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2015
Softcover ISBN: 978-3-662-46738-1Published: 27 April 2015
eBook ISBN: 978-3-662-46739-8Published: 16 April 2015
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: IX, 107
Number of Illustrations: 43 b/w illustrations
Topics: Cryptology, Systems and Data Security, Coding and Information Theory, Image Processing and Computer Vision