Warning! Do NOT Download Without a VPN!
Your IP Address is . Location is Planet Earth
Your Internet Provider and Government can track your download activities! Hide your IP ADDRESS with a VPN!
We strongly recommend using a VPN service to anonymize your torrent downloads. It's FREE!
START YOUR FREE TRIAL NOW!
|
Shi Y Transactions On Data Hiding And Multimedia Security VIII 2012 |
---|
Torrent Details |
---|


- NAME
- Shi Y Transactions on Data Hiding and Multimedia Security VIII 2012.torrent
- CATEGORY
- eBooks
- INFOHASH
- 60b47c8f969a2222a77673865b2d7eeb0fa69e42
- SIZE
- 2 MB in 1 file
- ADDED
- Uploaded on 23-03-2023 by our crawler pet called "Spidey".
- SWARM
- 0 seeders & 1 peers
- RATING
- No votes yet.
Please login to vote for this torrent.
Description |
---|
Textbook in PDF format
Graphical data, such as images or video streams, are of growing importance in several disciplines of IT security. Examples range from biometric authentication over digital image forensics to visual passwords and CAPTCHAs. Consequently, methods of image analysis and pattern recognition are increasingly used in security-critical applications. Still, there is a significant gap between the methods developed by the pattern recognition community and their uptake by security researchers.
In an attempt to close this gap, a workshop on PatternRecognition for ITSecurity was held on September 21, 2010, in Darmstadt, Germany, in conjunction with the 32nd Annual Symposium of the German Association for Pattern Recognition (DAGM 2010). The session was chaired by Jana Dittmann (Otto-von-Guericke Universit¨atMagdeburg),Claus Vielhauer (Fachhochschule Brandenburg) and Stefan Katzenbeisser (Technische Universit¨at Darmstadt).
This special issue contains five selected papers that were presented at the workshop and that demonstrate the broad range of security-related topics that utilize graphical data. Contributions explore the security and reliability of biometric data, the power of machine learning methods to differentiate forged images from originals, the effectiveness of modern watermark embedding schemes and the use of information fusion in steganalysis.
We hope that the papers in this special issue are of interest and inspire future interdisciplinary research between the security and graphics communities
Discussion |
---|
Comments 0
There are no comments yet.
Post Your Comment
To post your comment to this torrent, please login to our site.
Files in this torrent |
---|
FILENAME | SIZE | |
---|---|---|
![]() | Shi Y. Transactions on Data Hiding and Multimedia Security VIII 2012.pdf | 1.7 MB |
Alternative Torrents for 'Shi Transactions Data Hiding and Multimedia Security VIII'. |
---|
There are no alternative torrents found.