Choose an application
This book constitutes the thoroughly refereed post-proceedings of the 4th International Information Hiding Workshop, IHW 2001, held in Pittsburgh, PA, USA, in April 2001. The 29 revised full papers presented were carefully selected during two rounds of reviewing and revision. All current issues in information hiding are addressed including watermarking and fingerprinting of digitial audio, still image and video; anonymous communications; steganography and subliminal channels; covert channels; and database inference channels.
Computer security --- Data protection --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Leadership. --- Special purpose computers. --- Operating systems (Computers). --- Data encryption (Computer science). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Business Strategy/Leadership. --- Computers and Society. --- Management of Computing and Information Systems. --- Operating Systems. --- Special Purpose and Application-Based Systems. --- Information Systems. --- Software engineering. --- Cryptology. --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Informatics --- Science --- Computer software engineering --- Engineering --- Ability --- Command of troops --- Followership --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Operating systems --- Special purpose computers --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Communication systems
Choose an application
Choose an application
Arabic literature --- Almoravides.. --- Littérature arabe --- Almoravides --- Andalusia (Spain) --- Spain --- Andalousie (Espagne) --- Espagne --- History. --- History --- Histoire --- Histoire
Choose an application
Education --- Laïcism --- Muslims --- Education --- Enseignement --- Laïcité --- Musulmans --- Politique et éducation --- History --- History --- History --- Political aspects --- Histoire --- Histoire --- Histoire
Choose an application
Population --- Statistiques démographiques --- Statistics --- Iran --- Developing countries --- Iran --- Pays en développement --- Population --- Population --- Population --- Population
Choose an application
This book contains the thoroughly refereed post-conference proceedings of the 14th Information Hiding Conference, IH 2012, held in Berkeley, CA, USA, in May 2012. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on multimedia forensics and counter-forensics, steganalysis, data hiding in unusual content, steganography, covert channels, anonymity and privacy, watermarking, and fingerprinting.
Computer security --- Data encryption (Computer science) --- Data protection --- Engineering & Applied Sciences --- Computer Science --- Computer science. --- Data encryption (Computer science). --- Algorithms. --- Multimedia information systems. --- Computer graphics. --- Image processing. --- Management information systems. --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Multimedia Information Systems. --- Management of Computing and Information Systems. --- Image Processing and Computer Vision. --- Computer Graphics. --- Computer software. --- Multimedia systems. --- Information Systems. --- Computer vision. --- Cryptology. --- Automatic drafting --- Graphic data processing --- Graphics, Computer --- Computer art --- Graphic arts --- Electronic data processing --- Engineering graphics --- Image processing --- Machine vision --- Vision, Computer --- Artificial intelligence --- Pattern recognition systems --- Software, Computer --- Computer systems --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Information storage and retrieval systems --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Digital techniques --- Optical data processing. --- Optical computing --- Visual data processing --- Bionics --- Integrated optics --- Photonics --- Computers --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Algorism --- Algebra --- Arithmetic --- Optical equipment --- Communication systems --- Foundations
Choose an application
This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009. The 19 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography, steganalysis, watermarking, fingerprinting, hiding in unusual content, novel applications and forensics.
Computer security --- Data protection --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Coding theory. --- Computers. --- Law and legislation. --- Computer Science. --- Data Encryption. --- Data Storage Representation. --- Legal Aspects of Computing. --- Data Structures, Cryptology and Information Theory. --- Coding and Information Theory. --- Systems and Data Security. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Security measures --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Law and legislation --- Information theory. --- Communication theory --- Communication
Choose an application
These post-proceedings contain 27 papers that were accepted for presentation at the Fifth International Workshop on Information Hiding, held 7–9 October 2002, in Noordwijkerhout, The Netherlands. The papers were selected from 78 submissions on the basis of their scienti?c excellence and novelty by the program committee. We tried to have a balanced program covering several aspects of information hiding. The program committee was composed of Ross J. Anderson (Univ- sity of Cambridge, UK), Jan Camenisch (IBM Zurich Research Laboratory, Switzerland), Ingemar J. Cox (NEC Research Institute, USA), John McHugh (SEI/CERT, USA), Ira S. Moskowitz (Naval Research Laboratory, USA), Job Oostveen (Philips Research, The Netherlands), Andreas P?tzmann (Dresden University of Technology, Germany), Mike Reiter (Carnegie Mellon University, USA), and me. We all wish to thank all the authors of submissions for o?ering their papers for consideration. This year, contrary to the four previous workshops, the call for papers - quested anonymous submissions. However, anonymity was not compulsory and we did accept some papers in which the identity of the authors was clear. Each submission was assigned to three members of the program committee. Papers submitted by program committee members were assigned to four reviewers. The program committee relied on the advice of outside colleagues. We also insisted that 12 of the 27 accepted papers should be revised according to the comments of the reviewers.
Computer security --- Data protection --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Computers and civilization. --- Computers. --- Law and legislation. --- Computer Science. --- Data Encryption. --- Science, general. --- Computer Communication Networks. --- Operating Systems. --- Computers and Society. --- Legal Aspects of Computing. --- Computers --- Cryptology. --- Science, Humanities and Social Sciences, multidisciplinary. --- Cyberspace --- Informatics --- Science --- Computer operating systems --- Disk operating systems --- Systems software --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Law and legislation --- Operating systems --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Civilization and computers --- Civilization --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing
Choose an application
Choose an application