000726648 000__ 03222cam\a2200469Ii\4500 000726648 001__ 726648 000726648 005__ 20230306140832.0 000726648 006__ m\\\\\o\\d\\\\\\\\ 000726648 007__ cr\cn\nnnunnun 000726648 008__ 150422s2015\\\\gw\a\\\\ob\\\\001\0\eng\d 000726648 020__ $$a9783662467398$$qelectronic book 000726648 020__ $$a3662467399$$qelectronic book 000726648 020__ $$z9783662467381 000726648 0247_ $$a10.1007/978-3-662-46739-8$$2doi 000726648 035__ $$aSP(OCoLC)ocn907769465 000726648 035__ $$aSP(OCoLC)907769465 000726648 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDXCP$$dUPM$$dVLB 000726648 049__ $$aISEA 000726648 050_4 $$aQA76.9.A25$$bT73 2015eb 000726648 08204 $$a005.8/2$$223 000726648 24500 $$aTransactions on data hiding and multimedia security X$$h[electronic resource] /$$cYun Q. Shi (ed.). 000726648 2463_ $$aTransactions on data hiding and multimedia security 10 000726648 2463_ $$aTransactions on data hiding and multimedia security ten 000726648 264_1 $$aBerlin :$$bSpringer,$$c2015. 000726648 300__ $$a1 online resource :$$billustrations. 000726648 336__ $$atext$$btxt$$2rdacontent 000726648 337__ $$acomputer$$bc$$2rdamedia 000726648 338__ $$aonline resource$$bcr$$2rdacarrier 000726648 4901_ $$aLecture notes in computer science ;$$v8948 000726648 504__ $$aIncludes bibliographical references and author index. 000726648 5050_ $$aStrengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter -- Wave Atom-Based Perceptual Image Hashing Against Content-Preserving and Content-Altering Attacks -- IR Hiding: Use of Specular Reflection for Short-Wavelength-Pass-Filter Detection to Prevent Re-recording of Screen Images -- A Reliable Covert Communication Scheme Based on VoIP Steganography -- Adaptive Steganography and Steganalysis with Fixed-Size Embedding -- Permutation Steganography in FAT File systems. 000726648 506__ $$aAccess limited to authorized users. 000726648 520__ $$aSince the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. The six papers included in this issue deal with watermarking security, perceptual image hashing, infrared hiding, steganography and steganalysis. 000726648 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed April 22, 2015). 000726648 650_0 $$aData encryption (Computer science) 000726648 650_0 $$aMultimedia systems$$xSecurity measures. 000726648 7001_ $$aShi, Yun Q.,$$eeditor. 000726648 830_0 $$aLecture notes in computer science ;$$v8948. 000726648 85280 $$bebk$$hSpringerLink 000726648 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-662-46739-8$$zOnline Access$$91397441.1 000726648 909CO $$ooai:library.usi.edu:726648$$pGLOBAL_SET 000726648 980__ $$aEBOOK 000726648 980__ $$aBIB 000726648 982__ $$aEbook 000726648 983__ $$aOnline 000726648 994__ $$a92$$bISE