All papers were divided into eight sessions: digital media watermarking, steganalysis, digital forensics, steganography, ...
اقرأ المزيد
Constitutes the refereed post-proceedings of the 7th International Workshop on Information Hiding, IH 2005, held in Barcelona, ...
اقرأ المزيد
This book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information ...
اقرأ المزيد
The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...
اقرأ المزيد
The 1st InternationalConference on Information Systems Security (ICISS 2005) was held December 19–21, 2005 at Jadavpur ...
اقرأ المزيد
This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, ...
اقرأ المزيد
This textbook leads the reader from basic concepts of chromatin structure and function and RNA mechanisms to the understanding ...
اقرأ المزيد
The arrival of PDF has successfully optimized certain elements of the production workflow – the next challenge facing the ...
اقرأ المزيد
Offers cutting-edge knowledge on various design and product development related technologies, and applications of these technologies ...
اقرأ المزيد3D printing or additive manufacturing is a novel method of manufacturing parts directly from a digital model by using layer ...
اقرأ المزيد
It covers aspects of unsupervised machine learning used for knowledge discovery in data science and introduces a data-driven ...
اقرأ المزيد
Provides a comprehensive update on the latest information and knowledge which emerged from translational and basic science ...
اقرأ المزيد
This book about the ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with ...
اقرأ المزيد
How are things designed and printed or produced as digital media? What are the processes and techniques one needs to know ...
اقرأ المزيد
This book provides a thorough, up-to-date description of the scientific basis and concepts of tissue engineering in the oral ...
اقرأ المزيد
This inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...
اقرأ المزيد
This second issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...
اقرأ المزيدThe study presents an innovative voice-controlled prosthetic hand for amputees below the elbow to retrieve some of the hand ...
اقرأ المزيد