000 04337nam a22006015i 4500
001 978-3-642-31971-6
003 DE-He213
005 20160624102215.0
007 cr nn 008mamaa
008 120730s2012 gw | s |||| 0|eng d
020 _a9783642319716
_9978-3-642-31971-6
024 7 _a10.1007/978-3-642-31971-6
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8
_223
245 1 0 _aTransactions on Data Hiding and Multimedia Security VIII
_h[electronic resource] :
_bSpecial Issue on Pattern Recognition for IT Security /
_cedited by Yun Q. Shi, Stefan Katzenbeisser.
260 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2012.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2012.
300 _aIX, 103 p. 27 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v7228
505 0 _aExploiting Relative Entropy and Quality Analysis in Cumulative Partial Biometric Fusion -- Improving Reliability of Biometric Hash Generation through the Selection of Dynamic Handwriting Features. Feature-Based Forensic Camera Model Identification -- Watermark Embedding Using Audio Fingerprinting -- Plausibility Considerations on Steganalysis as a Security Mechanism – Discussions on the Example of Audio Steganalysis. Improving Reliability of Biometric Hash Generation through the Selection of Dynamic Handwriting Features. Feature-Based Forensic Camera Model Identification -- Watermark Embedding Using Audio Fingerprinting -- Plausibility Considerations on Steganalysis as a Security Mechanism – Discussions on the Example of Audio Steganalysis.
520 _aSince the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This special issue contains five selected papers that were presented at the Workshop on Pattern Recognition for IT Security, held in Darmstadt, Germany, in September 2010, in conjunction with the 32nd Annual Symposium of the German Association for Pattern Recognition, DAGM 2010. It demonstrates the broad range of security-related topics that utilize graphical data. The contributions explore the security and reliability of biometric data, the power of machine learning methods to differentiate forged images from originals, the effectiveness of modern watermark embedding schemes and the use of information fusion in steganalysis.
650 0 _aComputer science.
650 0 _aData protection.
650 0 _aData encryption (Computer science).
650 0 _aCoding theory.
650 0 _aComputer vision.
650 0 _aOptical pattern recognition.
650 0 _aBiometrics.
650 1 4 _aComputer Science.
650 2 4 _aSystems and Data Security.
650 2 4 _aBiometrics.
650 2 4 _aData Encryption.
650 2 4 _aCoding and Information Theory.
650 2 4 _aPattern Recognition.
650 2 4 _aImage Processing and Computer Vision.
700 1 _aShi, Yun Q.
_eeditor.
700 1 _aKatzenbeisser, Stefan.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642319709
786 _dSpringer
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v7228
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-31971-6
942 _2EBK10363
_cEBK
999 _c39657
_d39657