Transactions on Data Hiding and Multimedia Security X edited by Yun Q. Shi.

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and crypt...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Shi, Yun Q. (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2015.
Edition:1st ed. 2015.
Series:Transactions on Data Hiding and Multimedia Security, 8948
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Table of Contents:
  • Strengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter
  • Wave Atom-Based Perceptual Image Hashing Against Content-Preserving and Content-Altering Attacks
  • IR Hiding: Use of Specular Reflection for Short-Wavelength-Pass-Filter Detection to Prevent Re-recording of Screen Images
  • A Reliable Covert Communication Scheme Based on VoIP Steganography
  • Adaptive Steganography and Steganalysis with Fixed-Size Embedding
  • Permutation Steganography in FAT File systems.