Narrow your search

Library

KU Leuven (20)

ULiège (15)

ULB (14)

Odisee (9)

Thomas More Kempen (9)

Thomas More Mechelen (9)

UCLL (9)

VIVES (9)

VUB (9)

KBR (2)

More...

Resource type

book (36)


Language

English (37)


Year
From To Submit

2021 (3)

2019 (4)

2018 (1)

2017 (4)

2015 (2)

More...
Listing 1 - 10 of 37 << page
of 4
>>
Sort by
Information hiding : second International Workshop, IH'98 : Portland, Oregon, USA, April 14-17, 1998 : proceedings
Authors: --- ---
ISSN: 03029743 ISBN: 3540653864 9783540653868 3540493808 Year: 1998 Volume: 1525 Publisher: Berlin ; Heidelberg : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The mid-1990ssaw an exciting convergence of a number of dieren t information protection technologies, whose theme was the hiding (as opposed to encryption) of information. Copyright marking schemes are about hiding either copyright notices or individual serial numbers imperceptibly in digital audio and video, as a component in intellectual property protection systems; anonymous communication is another area of rapid growth, with people designing systems for electronic cash, digital elections, and privacy in mobile communications; security researchers are also interested in ‘stray’ communication channels, such as those which arise via shared resources in operating systems or the physical leverage of information through radio frequency emissions; and n ally, many workers in these fields drew inspiration from ‘classical’ hidden communication methods such as steganography and spread-spectrum radio. The rst international workshop on this new emergent discipline of information hiding was organised by Ross Anderson and held at the Isaac Newton Institute, Cambridge, from the 30th May to the 1st June 1996, and was judged by attendees to be a successful and significant event. In addition to a number of research papers, we had invited talks from David Kahn on the history of steganography and from Gus Simmons on the history of subliminal channels. We also had a number of discussion sessions, culminating in a series of votes on common terms and definitions. These papers and talks, together with minutes of the discussion, can be found in the proceedings, which are published in this series as Volume 1174.

Keywords

Computer security --- Data protection --- Computer Science --- Engineering & Applied Sciences --- Congresses --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Multimedia information systems. --- Management information systems. --- Computer Science. --- Data Encryption. --- Management of Computing and Information Systems. --- Operating Systems. --- Computer Communication Networks. --- Multimedia Information Systems. --- Information Systems. --- Multimedia systems. --- Cryptology. --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Information storage and retrieval systems --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Operating systems --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Distributed processing --- Communication systems --- Data encryption (Computer science) --- Operating systems (Computers) --- Computer security - Congresses --- Data protection - Congresses


Book
Introduction to energy and the environment
Author:
ISBN: 0442015577 Year: 1993 Publisher: New York Van Nostrand Reinhold

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Information Hiding : 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers
Authors: ---
ISBN: 3540301143 Year: 2005 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

It is an honor and great pleasure to write a preface for this postproceedings of the 6th International Workshop on Information Hiding. In the past 10 years, the field of data hiding has been maturing and expanding, gradually establishing its place as an active interdisciplinary research area uniquely combining information theory, cryptology, and signal processing. This year, the workshop was followed by the Privacy Enhancing Technologies workshop (PET) hosted at the same location. Delegates viewed this connection as fruitful as it gave both communities a convenient opportunity to interact. We would like to thank all authors who submitted their work for consideration. Out of the 70 submisions received by the program committee, 25 papers were accepted for publication based on their novelty, originality, and scientific merit. We strived to achieve a balanced exposition of papers that would represent many different aspects of information hiding. All papers were divided into eight sessions: digital media watermarking, steganalysis, digital forensics, steganography, software watermarking, security and privacy, anonymity, and data hiding in unusual content. This year, the workshop included a one-hour rump session that offered an opportunity to the delegates to share their work in progress and other brief but interesting contributions.

Keywords

Computer security --- Data protection --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Multimedia information systems. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Management of Computing and Information Systems. --- Computers and Society. --- Information Systems Applications (incl. Internet). --- Multimedia Information Systems. --- Computer Communication Networks. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Information storage and retrieval systems --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Distributed processing --- Information Systems. --- Multimedia systems. --- Cryptology. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software

Information hiding : 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 ; revised selected papers
Authors: ---
ISBN: 9783540741237 3540741232 3540741240 Year: 2007 Publisher: Berlin ; Heidelberg : Springer Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer security --- Data protection --- Digital watermarking --- Data encryption (Computer science) --- Sécurité informatique --- Protection de l'information (Informatique) --- Filigranes numériques --- Chiffrement (Informatique) --- Congresses. --- Congrès --- Computer Science --- Engineering & Applied Sciences --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Management of Computing and Information Systems. --- Computers and Society. --- Information Systems Applications (incl. Internet). --- Systems and Data Security. --- Computer Communication Networks. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Security measures --- Distributed processing --- Information Systems. --- Cryptology. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Security measures. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data

Information hiding : 9th international workshop, IH 2007, Saint Malo, France, June 11-13, 2007, revised selected papers
Authors: ---
ISBN: 9783540773696 354077369X 3540773703 Year: 2007 Publisher: Berlin, Germany ; New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH 2007, held in Saint Malo, France, in June 2007. The 25 revised full papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on new steganographic schemes, watermarking schemes, computer security, steganography and code theory, watermarking security, steganalysis, watermarking and re-synchronization, fingerprinting, forensics, and steganalysis.

Keywords

Computer security --- Data protection --- Cryptography --- Sécurité informatique --- Protection de l'information (Informatique) --- Cryptographie --- Congresses. --- Congrès --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Management of Computing and Information Systems. --- Computers and Society. --- Information Systems Applications (incl. Internet). --- Systems and Data Security. --- Computer Communication Networks. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Security measures --- Distributed processing --- Information Systems. --- Cryptology. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software

Information Hiding : Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings
Authors: ---
ISBN: 354067182X 3540465146 Year: 2000 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer security --- Data protection --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Multimedia information systems. --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Multimedia Information Systems. --- Information Systems Applications (incl. Internet). --- Information Systems. --- Multimedia systems. --- Cryptology. --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Information storage and retrieval systems --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication systems --- Distributed processing


Book
Purification of memory : a study of modern Orthodox theologians from a Catholic perspective
Author:
ISBN: 9780227175132 0227175131 Year: 2015 Publisher: Cambridge James Clarke & Co

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Although its various bodies boast a combined total of at least 300 million members, the Eastern Orthodox Church is widely perceived among members of other denominations to be an exotic branch of the faith, often shrouded in mysticism and misunderstanding that has been exacerbated by the longstanding Eastern-Western split.

Information Hiding : 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings
Authors: ---
ISBN: 3540427333 3540454969 Year: 2001 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-proceedings of the 4th International Information Hiding Workshop, IHW 2001, held in Pittsburgh, PA, USA, in April 2001. The 29 revised full papers presented were carefully selected during two rounds of reviewing and revision. All current issues in information hiding are addressed including watermarking and fingerprinting of digitial audio, still image and video; anonymous communications; steganography and subliminal channels; covert channels; and database inference channels.


Book
Information Hiding : 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers
Authors: --- ---
ISBN: 3642363725 3642363733 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book contains the thoroughly refereed post-conference proceedings of the 14th Information Hiding Conference, IH 2012, held in Berkeley, CA, USA, in May 2012. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on multimedia forensics and counter-forensics, steganalysis, data hiding in unusual content, steganography, covert channels, anonymity and privacy, watermarking, and fingerprinting.

Keywords

Computer security --- Data encryption (Computer science) --- Data protection --- Engineering & Applied Sciences --- Computer Science --- Computer science. --- Data encryption (Computer science). --- Algorithms. --- Multimedia information systems. --- Computer graphics. --- Image processing. --- Management information systems. --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Multimedia Information Systems. --- Management of Computing and Information Systems. --- Image Processing and Computer Vision. --- Computer Graphics. --- Computer software. --- Multimedia systems. --- Information Systems. --- Computer vision. --- Cryptology. --- Automatic drafting --- Graphic data processing --- Graphics, Computer --- Computer art --- Graphic arts --- Electronic data processing --- Engineering graphics --- Image processing --- Machine vision --- Vision, Computer --- Artificial intelligence --- Pattern recognition systems --- Software, Computer --- Computer systems --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Information storage and retrieval systems --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Digital techniques --- Optical data processing. --- Optical computing --- Visual data processing --- Bionics --- Integrated optics --- Photonics --- Computers --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Algorism --- Algebra --- Arithmetic --- Optical equipment --- Communication systems --- Foundations


Book
Information Hiding : 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers
Authors: --- ---
ISBN: 3642044301 364204431X Year: 2009 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009. The 19 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography, steganalysis, watermarking, fingerprinting, hiding in unusual content, novel applications and forensics.

Keywords

Computer security --- Data protection --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Coding theory. --- Computers. --- Law and legislation. --- Computer Science. --- Data Encryption. --- Data Storage Representation. --- Legal Aspects of Computing. --- Data Structures, Cryptology and Information Theory. --- Coding and Information Theory. --- Systems and Data Security. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Security measures --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Law and legislation --- Information theory. --- Communication theory --- Communication

Listing 1 - 10 of 37 << page
of 4
>>
Sort by