Narrow your search

Library

KU Leuven (185)

UCLL (48)

VIVES - Kortrijk, Roeselare, Tielt, Torhout (41)

Thomas More Kempen (38)

VIVES - Brugge, Oostende (37)

National Bank of Belgium (36)

Thomas More Mechelen (35)

ULB (30)

Odisee (29)

LUCA School of Arts (27)

More...

Resource type

book (213)

undetermined (71)

periodical (15)

dissertation (1)

video (1)


Language

English (188)

Dutch (55)

French (23)

German (15)

Arabic (6)

More...

Year
From To Submit

2019 (1)

2018 (2)

2017 (1)

2015 (1)

2013 (10)

More...
Listing 1 - 10 of 304 << page
of 31
>>
Sort by
Information Hiding : Second International Workshop, IH’98, Portland, Oregon, USA, April 14–17, 1998, Proceedings
Authors: --- ---
ISSN: 03029743 ISBN: 3540653864 9783540653868 3540493808 Year: 1998 Volume: 1525 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The mid-1990ssaw an exciting convergenceof a number of dieren t information protection technologies, whose theme was the hiding (as opposed to encryption) of information. Copyright marking schemes are about hiding either copyright notices or individual serial numbers imperceptibly in digital audio and video, as a component in intellectual property protection systems; anonymous c- munication is another area of rapid growth, with people designing systems for electronic cash, digital elections, and privacy in mobile communications; se- rity researchers are also interested in ‘stray’ communication channels, such as those which arise via shared resourcesin operating systems or the physical le- age of information through radio frequency emissions; and n ally, many workers in these elds drew inspiration from ‘classical’ hidden communication methods such as steganography and spread-spectrum radio. The rst international workshop on this new emergent discipline of inf- mation hiding was organised by Ross Anderson and held at the Isaac Newton Institute, Cambridge, from the 30th May to the 1st June 1996, and was judged by attendees to be a successful and signi cant event. In addition to a number of research papers, we had invited talks from David Kahn on the history of steganography and from Gus Simmons on the history of subliminal channels. We also had a number of discussion sessions, culminating in a series of votes on common terms and de nitions. These papers and talks, together with minutes of the discussion, can be found in the proceedings, which are published in this series as Volume 1174.


Book
Introduction to energy and the environment
Author:
ISBN: 0442015577 Year: 1993 Publisher: New York Van Nostrand Reinhold

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Information Hiding : 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers
Authors: ---
ISBN: 3540301143 Year: 2005 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

It is an honor and great pleasure to write a preface for this postproceedings of the 6th International Workshop on Information Hiding. In the past 10 years, the field of data hiding has been maturing and expanding, gradually establishing its place as an active interdisciplinary research area uniquely combining information theory, cryptology, and signal processing. This year, the workshop was followed by the Privacy Enhancing Technologies workshop (PET) hosted at the same location. Delegates viewed this connection as fruitful as it gave both communities a convenient opportunity to interact. We would like to thank all authors who submitted their work for consideration. Out of the 70 submisions received by the program committee, 25 papers were accepted for publication based on their novelty, originality, and scientific merit. We strived to achieve a balanced exposition of papers that would represent many different aspects of information hiding. All papers were divided into eight sessions: digital media watermarking, steganalysis, digital forensics, steganography, software watermarking, security and privacy, anonymity, and data hiding in unusual content. This year, the workshop included a one-hour rump session that offered an opportunity to the delegates to share their work in progress and other brief but interesting contributions.

Keywords

Computer security --- Data protection --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Multimedia information systems. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Management of Computing and Information Systems. --- Computers and Society. --- Information Systems Applications (incl. Internet). --- Multimedia Information Systems. --- Computer Communication Networks. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Information storage and retrieval systems --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Distributed processing --- Information Systems. --- Multimedia systems. --- Cryptology.

The tao of architecture
Author:
ISBN: 0691003300 0691039631 Year: 1981 Publisher: Princeton : Princeton University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Tao of architecture.
Author:
Publisher: s.l. : Princeton university press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
MOZART, Wolfgang Ainadeus LACLEMEMZADI TI T.O . opera séria In 2 bedrijven op tekst van Caterino MazzoXa naar Metastasio , . . XV 621 . . .. Clemehza di Tito/Opéra Seria/ln due Attl/Mezso in Musica dal Signor/W.A. Mozart/.../.../par l'Editeur./.../ N0 4 de la Colleotion des Opéras de Mozart/A Paris,/Au Magasin de J. rrey.../.../.../ OP 4 (2 exemplaren) Italiaanse en Franse tekst. a.. 833
Author:

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Bananyay : Önarcképek / Self-Portraits 1977-78.
Author:
Year: 1979 Publisher: Pécs : IH Galéria,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Des palais du Chah aux prisons de la Révolution
Author:
ISSN: 11520914 ISBN: 2715808755 Year: 1991 Publisher: Paris : Editions Balland,

Information Hiding : 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings
Authors: ---
ISBN: 3540427333 3540454969 Year: 2001 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-proceedings of the 4th International Information Hiding Workshop, IHW 2001, held in Pittsburgh, PA, USA, in April 2001. The 29 revised full papers presented were carefully selected during two rounds of reviewing and revision. All current issues in information hiding are addressed including watermarking and fingerprinting of digitial audio, still image and video; anonymous communications; steganography and subliminal channels; covert channels; and database inference channels.

A strange vvonder or a wonder in a vvoman, : vvherein is plainely expressed the true nature of most women. Especially of some emminent women in this citie. Likewise a plaine discription of many mad tricks and slights lately performed by a zealous sister which was overcome with the Spirit. Written by I. H. gentleman.
Authors: --- ---
Year: 1642 Publisher: London Printed for I. T.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Women --- Human females --- Wimmin --- Woman --- Womon --- Womyn --- Females --- Human beings --- Femininity --- Humor --- Component parts

Listing 1 - 10 of 304 << page
of 31
>>
Sort by