Information Hiding 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers /

This book contains the thoroughly refereed post-conferernce proceedings of the 13th Information Hiding Conference, IH 2011, held in Prague, Czech Republic, in May 2011. Included in this volume are 23 carefully reviewed papers that were selected out of 69 submissions. The contributions are organized...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Filler, Tomáš (Επιμελητής έκδοσης), Pevný, Tomáš (Επιμελητής έκδοσης), Craver, Scott (Επιμελητής έκδοσης), Ker, Andrew (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011.
Σειρά:Lecture Notes in Computer Science, 6958
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 02842nam a22005895i 4500
001 978-3-642-24178-9
003 DE-He213
005 20151204164455.0
007 cr nn 008mamaa
008 110907s2011 gw | s |||| 0|eng d
020 |a 9783642241789  |9 978-3-642-24178-9 
024 7 |a 10.1007/978-3-642-24178-9  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.82  |2 23 
245 1 0 |a Information Hiding  |h [electronic resource] :  |b 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers /  |c edited by Tomáš Filler, Tomáš Pevný, Scott Craver, Andrew Ker. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg,  |c 2011. 
300 |a XII, 343 p. 106 illus., 50 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 6958 
520 |a This book contains the thoroughly refereed post-conferernce proceedings of the 13th Information Hiding Conference, IH 2011, held in Prague, Czech Republic, in May 2011. Included in this volume are 23 carefully reviewed papers that were selected out of 69 submissions. The contributions are organized in topical sections on: fingerprinting, anonymity and privacy, steganography and steganalysis, watermarking, digital rights management and digital forensics, and digital hiding in unusual context. Also included are the papers that were presented as part of the special session dedicated to the BOSS (Break Our Steganographic System) contest. 
650 0 |a Computer science. 
650 0 |a Data encryption (Computer science). 
650 0 |a Algorithms. 
650 0 |a Computer science  |x Mathematics. 
650 0 |a Multimedia information systems. 
650 0 |a Computer graphics. 
650 0 |a Image processing. 
650 1 4 |a Computer Science. 
650 2 4 |a Data Encryption. 
650 2 4 |a Algorithm Analysis and Problem Complexity. 
650 2 4 |a Multimedia Information Systems. 
650 2 4 |a Discrete Mathematics in Computer Science. 
650 2 4 |a Image Processing and Computer Vision. 
650 2 4 |a Computer Graphics. 
700 1 |a Filler, Tomáš.  |e editor. 
700 1 |a Pevný, Tomáš.  |e editor. 
700 1 |a Craver, Scott.  |e editor. 
700 1 |a Ker, Andrew.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642241772 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 6958 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-24178-9  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645)