This book constitutes the refereed procedings of the 5th International Conference on Autonomic and Trusted Computing, ATC ...
Lire la suite
The conference focuses on the state of the art, expe- ence and new trends in the areas of safety, security and reliability ...
Lire la suite
We are happy to present to you the proceedings of the 3rd International Workshop on Digital Watermarking, IWDW 2004. Since ...
Lire la suite
We are delighted to welcome the attendees of the Fourth International Wo- shop on Digital Watermarking (IWDW). Watermarking ...
Lire la suite
IWDW 2006 was held on Jeju, the dream island in Korea. The main theme of the workshop was “Meet the Challenges in this ...
Lire la suite
The objective of this volume is to offer the excellent presentations to the public, and to promote the study exchange among ...
Lire la suite
The objective of this volume is to offer the excellent presentations to the public, and to promote the study exchange among ...
Lire la suite
This book constitutes the refereed proceedings of the Third International Conference on Image and Signal Processing, ICISP ...
Lire la suite
This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...
Lire la suite
All papers were divided into eight sessions: digital media watermarking, steganalysis, digital forensics, steganography, ...
Lire la suite
Constitutes the refereed post-proceedings of the 7th International Workshop on Information Hiding, IH 2005, held in Barcelona, ...
Lire la suite
This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ...
Lire la suite
Provides an insight about various techniques used in multimedia security and identifies its progress in both technological ...
Lire la suite
These are the proceedings of the Workshop on Sequences, Subsequences, and Consequences that was held at the University of ...
Lire la suite
This inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...
Lire la suite
This second issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...
Lire la suite
The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
Lire la suite
The book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...
Lire la suite