|
|
|
|
| LEADER |
02842nam a22005895i 4500 |
| 001 |
978-3-642-24178-9 |
| 003 |
DE-He213 |
| 005 |
20151204164455.0 |
| 007 |
cr nn 008mamaa |
| 008 |
110907s2011 gw | s |||| 0|eng d |
| 020 |
|
|
|a 9783642241789
|9 978-3-642-24178-9
|
| 024 |
7 |
|
|a 10.1007/978-3-642-24178-9
|2 doi
|
| 040 |
|
|
|d GrThAP
|
| 050 |
|
4 |
|a QA76.9.A25
|
| 072 |
|
7 |
|a URY
|2 bicssc
|
| 072 |
|
7 |
|a COM053000
|2 bisacsh
|
| 082 |
0 |
4 |
|a 005.82
|2 23
|
| 245 |
1 |
0 |
|a Information Hiding
|h [electronic resource] :
|b 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers /
|c edited by Tomáš Filler, Tomáš Pevný, Scott Craver, Andrew Ker.
|
| 264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2011.
|
| 300 |
|
|
|a XII, 343 p. 106 illus., 50 illus. in color.
|b online resource.
|
| 336 |
|
|
|a text
|b txt
|2 rdacontent
|
| 337 |
|
|
|a computer
|b c
|2 rdamedia
|
| 338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
| 347 |
|
|
|a text file
|b PDF
|2 rda
|
| 490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 6958
|
| 520 |
|
|
|a This book contains the thoroughly refereed post-conferernce proceedings of the 13th Information Hiding Conference, IH 2011, held in Prague, Czech Republic, in May 2011. Included in this volume are 23 carefully reviewed papers that were selected out of 69 submissions. The contributions are organized in topical sections on: fingerprinting, anonymity and privacy, steganography and steganalysis, watermarking, digital rights management and digital forensics, and digital hiding in unusual context. Also included are the papers that were presented as part of the special session dedicated to the BOSS (Break Our Steganographic System) contest.
|
| 650 |
|
0 |
|a Computer science.
|
| 650 |
|
0 |
|a Data encryption (Computer science).
|
| 650 |
|
0 |
|a Algorithms.
|
| 650 |
|
0 |
|a Computer science
|x Mathematics.
|
| 650 |
|
0 |
|a Multimedia information systems.
|
| 650 |
|
0 |
|a Computer graphics.
|
| 650 |
|
0 |
|a Image processing.
|
| 650 |
1 |
4 |
|a Computer Science.
|
| 650 |
2 |
4 |
|a Data Encryption.
|
| 650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|
| 650 |
2 |
4 |
|a Multimedia Information Systems.
|
| 650 |
2 |
4 |
|a Discrete Mathematics in Computer Science.
|
| 650 |
2 |
4 |
|a Image Processing and Computer Vision.
|
| 650 |
2 |
4 |
|a Computer Graphics.
|
| 700 |
1 |
|
|a Filler, Tomáš.
|e editor.
|
| 700 |
1 |
|
|a Pevný, Tomáš.
|e editor.
|
| 700 |
1 |
|
|a Craver, Scott.
|e editor.
|
| 700 |
1 |
|
|a Ker, Andrew.
|e editor.
|
| 710 |
2 |
|
|a SpringerLink (Online service)
|
| 773 |
0 |
|
|t Springer eBooks
|
| 776 |
0 |
8 |
|i Printed edition:
|z 9783642241772
|
| 830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 6958
|
| 856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-24178-9
|z Full Text via HEAL-Link
|
| 912 |
|
|
|a ZDB-2-SCS
|
| 912 |
|
|
|a ZDB-2-LNC
|
| 950 |
|
|
|a Computer Science (Springer-11645)
|