Transactions on Data Hiding and Multimedia Security IV

Transactions on Data Hiding and Multimedia Security IV

4.11 - 1251 ratings - Source



Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This fourth issue contains five contributions in the area of digital watermarking. The first three papers deal with robust watermarking. The fourth paper introduces a new least distortion linear gain model for halftone image watermarking and the fifth contribution presents an optimal histogram pair based image reversible data hiding scheme.Robust Watermarking in Slides of Presentations by Blank Space Coloring: A New Approach Tsung-YuanLiu1 and Wen-Hsiang Tsai1, 2 1 National Chiao Tung University, Department of Computer Science, National Chiao Tung University, anbsp;...


Title:Transactions on Data Hiding and Multimedia Security IV
Author: Yun Q. Shi
Publisher:Springer Science & Business Media - 2009-07-24
ISBN-13:

You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.

Once you have finished the sign-up process, you will be redirected to your download Book page.

How it works:
  • 1. Register a free 1 month Trial Account.
  • 2. Download as many books as you like (Personal use)
  • 3. Cancel the membership at any time if not satisfied.


Click button below to register and download Ebook
Privacy Policy | Contact | DMCA