Fourth of July 2022
Fourth of July 2022
      • Remove
      • Report inappropriate predictions
        All
        News
        Images
        Videos
        Books
        More
        Tools
          About 150,000 results (0.40 seconds) 

          Search Results


          Information Hiding: First International Workshop, Cambridge, ...

          books.google.com › books
          books.google.com › books
          Ross Anderson, ‎Ross Anderson, PH. · 1996
          Found inside – Page 295
          A drawback to this approach is that lossy data compression algorithms tend to remove most imperceivable artifacts , including At the Information Hiding Workshop held in Cambridge , England , the adjectives cover , embedded , and steyo ...
          Preview
          More editions

          Information Hiding: Steganography and Watermarking-Attacks ...

          books.google.com › books
          books.google.com › books
          Neil F. Johnson, ‎Zoran Duric, ‎Sushil Jajodia · 2012
          Found inside – Page 11
          The analysis of techniques for information hiding in images covers both steganography and digital watermarking. The analysis involves investigating available tools and techniques for hiding information, classifying these techniques, ...
          Preview
          More editions

          Information Hiding: 7th International Workshop, IH 2005, ... - Page 245

          books.google.com › books
          books.google.com › books
          Mauro Barni, ‎Jordi Herrera Joancomartí, ‎Stefan Katzenbeisser · 2005
          Found inside – Page 245
          By using the fundamental principles of information hiding, we have been able to add a new capability--sensing---to RFID tags, while maintaining backward compatibility and preserving infrastructure investments.
          Preview
          More editions

          Information Hiding: 8th International Workshop, IH 2006, ... - Page 314

          books.google.com › books
          books.google.com › books
          Jan Camenisch, ‎Christian Collberg, ‎Neil F. Johnson · 2007
          Found inside – Page 314
          It is well known that all information hiding methods that modify the least significant bits introduce distortions into the cover objects. Those distortions have been utilized by steganalysis algorithms to detect that the objects had ...
          Preview
          More editions

          Information Hiding: 6th International Workshop, IH 2004, ... - Page 178

          books.google.com › books
          books.google.com › books
          Jessica Fridrich · 2004
          Found inside – Page 178
          Information Hiding: Proceedings of the Third International Workshop. Volume 1768 of Lecture Notes in Computer Science., Dresden, Germany, Springer (1999) 1–16 Zöllner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., ...
          Preview
          More editions

          Information Hiding: 9th International Workshop, IH 2007, ...

          books.google.com › books
          books.google.com › books
          Teddy Furon, ‎François Cayre, ‎Gwenaël DoërrG · 2007
          Found inside
          We are glad to present in this volume the proceedings of the ninth edition of Information Hiding (IH 2007). The conference was held in Saint Malo, the Corsairs town, France, during June 11–13, 2007. It was organized by a team of four ...
          Preview
          More editions

          Information Hiding and Applications - Page ii

          books.google.com › books
          books.google.com › books
          Jeng-Shyang Pan, ‎Hsiang-Cheh Huang, ‎Lakhmi C. Jain · 2009
          Found inside – Page ii
          ... and Lakhmi C.Jain (Eds.) Information Hiding and. Further volumes of this series can be found on our homepage:springer.com Vol.205.Ajith Abraham,Aboul-Ella Hassanien,and Václav Snášel (Eds.) Foundations of Computational Intelligence ...
          Preview
          More editions

          Information Hiding: 4th International Workshop, IH 2001, ... - Page 11

          books.google.com › books
          books.google.com › books
          Ira S. Moskowitz · 2003
          Found inside – Page 11
          16. 17. 18. Ross Anderson, ed. Information Hiding: First International Workshop, LNCS 1174, Springer, 1996. 2 2. Ross Anderson. Stretching the limits of steganography. Information Hiding: First International Workshop, Ross Anderson, ed.
          Preview
          More editions

          Information Hiding - Page 42

          books.google.com › books
          books.google.com › books
          Stefan Katzenbeisser, ‎Fabien Petitcolas · 2016
          Found inside – Page 42
          Z ̈ollner, J., et al., “An Information-Theoretic Model for Steganography,” in Information Hiding (2nd International Workshop), Vol. 1525 of LNCS, Berlin Heidelberg: Springer-Verlag, 1998, pp. 306–318. Ker, A. D., “A Fusion of Maximum ...
          Preview
          More editions

          Lossless Information Hiding in Images - Page 22

          books.google.com › books
          books.google.com › books
          Zhe-Ming Lu, ‎Shi-Ze Guo · 2016
          Found inside – Page 22
          In addition to the classification way of information hiding based on research branches (or the object to be protected) in Section 1.2.4, information hiding techniques can also be classified according to various other ways, ...
          Preview
          More editions
          12345678910Next
          HelpSend feedbackPrivacyTerms