Shi Y. Transactions on Data Hiding and Multimedia Security VIII 2012
- Type:
- Other > E-books
- Files:
- 1
- Size:
- 1.72 MiB (1803990 Bytes)
- Uploaded:
- 2023-03-15 14:05:45 GMT
- By:
- andryold1
- Seeders:
- 1
- Leechers:
- 0
- Comments
- 0
- Info Hash: 60B47C8F969A2222A77673865B2D7EEB0FA69E42
(Problems with magnets links are fixed by upgrading your torrent client!)
Textbook in PDF format Graphical data, such as images or video streams, are of growing importance in several disciplines of IT security. Examples range from biometric authentication over digital image forensics to visual passwords and CAPTCHAs. Consequently, methods of image analysis and pattern recognition are increasingly used in security-critical applications. Still, there is a significant gap between the methods developed by the pattern recognition community and their uptake by security researchers. In an attempt to close this gap, a workshop on PatternRecognition for ITSecurity was held on September 21, 2010, in Darmstadt, Germany, in conjunction with the 32nd Annual Symposium of the German Association for Pattern Recognition (DAGM 2010). The session was chaired by Jana Dittmann (Otto-von-Guericke Universit¨atMagdeburg),Claus Vielhauer (Fachhochschule Brandenburg) and Stefan Katzenbeisser (Technische Universit¨at Darmstadt). This special issue contains five selected papers that were presented at the workshop and that demonstrate the broad range of security-related topics that utilize graphical data. Contributions explore the security and reliability of biometric data, the power of machine learning methods to differentiate forged images from originals, the effectiveness of modern watermark embedding schemes and the use of information fusion in steganalysis. We hope that the papers in this special issue are of interest and inspire future interdisciplinary research between the security and graphics communities
Shi Y. Transactions on Data Hiding and Multimedia Security VIII 2012.pdf | 1.72 MiB |