Electronic Books

Total Books: 21 - 38 /38
Digital Watermarking : 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 Proceedings

This book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in ...

Lire la suite
Face Biometrics for Personal Identification

This book provides an ample coverage of theoretical and experimental state-of-the-art work as well as new trends and directions ...

Lire la suite
Face Biometrics for Personal Identification

This book provides an ample coverage of theoretical and experimental state-of-the-art work as well as new trends and directions ...

Lire la suite
Handbook of Biometrics

The Handbook of Biometrics -- an edited volume by prominent invited researchers in biometrics -- describes the fundamentals ...

Lire la suite
Human Ear Recognition by Computer

Human Ear Recognition by Computer is the first book on the automatic recognition of human ears. It presents an entire range ...

Lire la suite
Information Hiding

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...

Lire la suite
Information Hiding

This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...

Lire la suite
Information Hiding

All papers were divided into eight sessions: digital media watermarking, steganalysis, digital forensics, steganography, ...

Lire la suite
Information Hiding (vol. # 3727)

Constitutes the refereed post-proceedings of the 7th International Workshop on Information Hiding, IH 2005, held in Barcelona, ...

Lire la suite
Information Hiding : 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers

This book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information ...

Lire la suite
Information Security and Cryptology (vol. # 4318)

The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...

Lire la suite
Information Systems Security (vol. # 3803)

The 1st InternationalConference on Information Systems Security (ICISS 2005) was held December 19–21, 2005 at Jadavpur ...

Lire la suite
Information Theoretic Security : Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings

This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, ...

Lire la suite
Securing Biometrics Applications

Biometrics is becoming increasingly common in establishments that require high security such as state security and financial ...

Lire la suite
Security and Privacy in Digital Rights Management

This book about the ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with ...

Lire la suite
Structural, Syntactic, and Statistical Pattern Recognition : Joint IAPR International Workshop, SSPR & SPR 2008, Orlando, USA, December 4-6, 2008. Proceedings

This book includes : graph-based methods, probabilistic and stochastic structural models for PR, image and video analysis, ...

Lire la suite
Transactions on Data Hiding and Multimedia Security I

This inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...

Lire la suite
Transactions on Data Hiding and Multimedia Security II

This second issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...

Lire la suite
Total Books: 21 - 38 /38