000 | 03351nam a22006855i 4500 | ||
---|---|---|---|
001 | 978-3-642-24178-9 | ||
003 | DE-He213 | ||
005 | 20240730200247.0 | ||
007 | cr nn 008mamaa | ||
008 | 110907s2011 gw | s |||| 0|eng d | ||
020 |
_a9783642241789 _9978-3-642-24178-9 |
||
024 | 7 |
_a10.1007/978-3-642-24178-9 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aInformation Hiding _h[electronic resource] : _b13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers / _cedited by Tomas Filler, Tomas Pevny, Scott Craver, Andrew Ker. |
250 | _a1st ed. 2011. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2011. |
|
300 |
_aXII, 343 p. 106 illus., 50 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v6958 |
|
520 | _aThis book contains the thoroughly refereed post-conferernce proceedings of the 13th Information Hiding Conference, IH 2011, held in Prague, Czech Republic, in May 2011. Included in this volume are 23 carefully reviewed papers that were selected out of 69 submissions. The contributions are organized in topical sections on: fingerprinting, anonymity and privacy, steganography and steganalysis, watermarking, digital rights management and digital forensics, and digital hiding in unusual context. Also included are the papers that were presented as part of the special session dedicated to the BOSS (Break Our Steganographic System) contest. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aMultimedia systems. _911575 |
|
650 | 0 |
_aComputer science _xMathematics. _93866 |
|
650 | 0 |
_aDiscrete mathematics. _912873 |
|
650 | 0 |
_aComputer vision. _9162652 |
|
650 | 0 |
_aComputer graphics. _94088 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aMultimedia Information Systems. _931575 |
650 | 2 | 4 |
_aDiscrete Mathematics in Computer Science. _931837 |
650 | 2 | 4 |
_aComputer Vision. _9162653 |
650 | 2 | 4 |
_aComputer Graphics. _94088 |
700 | 1 |
_aFiller, Tomas. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9162654 |
|
700 | 1 |
_aPevny, Tomas. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9162655 |
|
700 | 1 |
_aCraver, Scott. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9162656 |
|
700 | 1 |
_aKer, Andrew. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9162657 |
|
710 | 2 |
_aSpringerLink (Online service) _9162658 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642241772 |
776 | 0 | 8 |
_iPrinted edition: _z9783642241796 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v6958 _9162659 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-24178-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c95962 _d95962 |