This book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in ...
Continue readingThis book provides an ample coverage of theoretical and experimental state-of-the-art work as well as new trends and directions ...
Continue readingThis book provides an ample coverage of theoretical and experimental state-of-the-art work as well as new trends and directions ...
Continue readingThe Handbook of Biometrics -- an edited volume by prominent invited researchers in biometrics -- describes the fundamentals ...
Continue readingHuman Ear Recognition by Computer is the first book on the automatic recognition of human ears. It presents an entire range ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...
Continue readingThis volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...
Continue readingAll papers were divided into eight sessions: digital media watermarking, steganalysis, digital forensics, steganography, ...
Continue readingConstitutes the refereed post-proceedings of the 7th International Workshop on Information Hiding, IH 2005, held in Barcelona, ...
Continue readingThis book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information ...
Continue readingThe second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...
Continue readingThe 1st InternationalConference on Information Systems Security (ICISS 2005) was held December 19–21, 2005 at Jadavpur ...
Continue readingThis book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, ...
Continue readingBiometrics is becoming increasingly common in establishments that require high security such as state security and financial ...
Continue readingThis book about the ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with ...
Continue readingThis book includes : graph-based methods, probabilistic and stochastic structural models for PR, image and video analysis, ...
Continue readingThis inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...
Continue readingThis second issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...
Continue reading