000 | 02854nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-3-642-24178-9 | ||
003 | DE-He213 | ||
005 | 20160624102204.0 | ||
007 | cr nn 008mamaa | ||
008 | 110907s2011 gw | s |||| 0|eng d | ||
020 |
_a9783642241789 _9978-3-642-24178-9 |
||
024 | 7 |
_a10.1007/978-3-642-24178-9 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.82 _223 |
245 | 1 | 0 |
_aInformation Hiding _h[electronic resource] : _b13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers / _cedited by Tomáš Filler, Tomáš Pevný, Scott Craver, Andrew Ker. |
260 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2011. |
|
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2011. |
|
300 |
_aXII, 343p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6958 |
|
520 | _aThis book contains the thoroughly refereed post-conferernce proceedings of the 13th Information Hiding Conference, IH 2011, held in Prague, Czech Republic, in May 2011. Included in this volume are 23 carefully reviewed papers that were selected out of 69 submissions. The contributions are organized in topical sections on: fingerprinting, anonymity and privacy, steganography and steganalysis, watermarking, digital rights management and digital forensics, and digital hiding in unusual context. Also included are the papers that were presented as part of the special session dedicated to the BOSS (Break Our Steganographic System) contest. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputer software. | |
650 | 0 | _aComputational complexity. | |
650 | 0 | _aMultimedia systems. | |
650 | 0 | _aComputer graphics. | |
650 | 0 | _aComputer vision. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
650 | 2 | 4 | _aMultimedia Information Systems. |
650 | 2 | 4 | _aDiscrete Mathematics in Computer Science. |
650 | 2 | 4 | _aImage Processing and Computer Vision. |
650 | 2 | 4 | _aComputer Graphics. |
700 | 1 |
_aFiller, Tomáš. _eeditor. |
|
700 | 1 |
_aPevný, Tomáš. _eeditor. |
|
700 | 1 |
_aCraver, Scott. _eeditor. |
|
700 | 1 |
_aKer, Andrew. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642241772 |
786 | _dSpringer | ||
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6958 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-24178-9 |
942 |
_2EBK9924 _cEBK |
||
999 |
_c39218 _d39218 |