Multimedia forensics and security
"This book provides an in-depth treatment of advancements in the emerging field of multimedia forensics and security by tackling challenging issues such as digital watermarking for copyright protection, digital fingerprinting for transaction tracking, and digital camera source identification&qu...
Saved in:
| Other Authors: | Li |
|---|---|
| Format: | Book |
| Published: |
Hershey
Information Science Reference
c2009.
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Multimedia content encryption techniques and applications
by: Lian, Shiguo
Published: (2009)
by: Lian, Shiguo
Published: (2009)
Writing secure code
by: Howard, Michael 1965-
Published: (2003)
by: Howard, Michael 1965-
Published: (2003)
INTRODUCTION TO Computer and Network Security : NAVIGATING SHADES OF GRAY /
by: Brooks, Richard R.
Published: (2014)
by: Brooks, Richard R.
Published: (2014)
Securing information and communications systems principles, technologies, and applications
Published: (2008)
Published: (2008)
Security and privacy in social networks
Published: (2013)
Published: (2013)
DETERMINING CRITICAL SUCCESS FACTORS OF INFORMATION SECURITY KNOWLEDGE TOWARDS ORGANISATIONS' INFORMATION SECURITY EFFECTIVENESS : /
by: Rohana Mohamad Rashid
Published: (2020)
by: Rohana Mohamad Rashid
Published: (2020)
Multimedia data mining a systematic introduction to concepts and theory
by: Zhang
Published: (2009)
by: Zhang
Published: (2009)
Roadmap to information security for IT and InfoSec managers
by: Whitman, Michael E., 1964-
Published: (2011)
by: Whitman, Michael E., 1964-
Published: (2011)
Simple computer security disinfect your PC
Published: (2007)
Published: (2007)
Cryptography protocols, design, and applications
Published: (2012)
Published: (2012)
Applications of secure multiparty computation
Published: (2015)
Published: (2015)
7A Security's official guide cryptography
by: Burnett
Published: (2001)
by: Burnett
Published: (2001)
Fundamentals of multimedia
by: Li ,Ze-Nian
Published: (2004)
by: Li ,Ze-Nian
Published: (2004)
Multimedia security watermarking, steganography, and forensics
Published: (2012)
Published: (2012)
Cryptography and network security principles and practices
by: Stallings
Published: (2003)
by: Stallings
Published: (2003)
Cryptography and network security principles and practice
by: Stallings
Published: (1998)
by: Stallings
Published: (1998)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2011)
by: Stallings, William
Published: (2011)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Citizen-centric privacy requirements engineering framework
by: Nor Asiakin Hasbullah
Published: (2017)
by: Nor Asiakin Hasbullah
Published: (2017)
Digital watermarking 6th International Workshop, IWDW 2007, Guanzhou, China, December 3-5, 2007 : proceedings
Published: (2008)
Published: (2008)
Computer and intrusion forensics
Published: (2003)
Published: (2003)
Crafting the infosec playbook
by: Bollinger, Jeff, et al.
Published: (2015)
by: Bollinger, Jeff, et al.
Published: (2015)
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
Cryptographic solutions for secure online banking and commerce
Published: (2016)
Published: (2016)
A cyber exercise post assessment framework in Malaysia perspective
by: Arniyati Ahmad
Published: (2016)
by: Arniyati Ahmad
Published: (2016)
Information security policies, procedures, and standards a practitioner's reference
by: Landoll, Douglas J.
Published: (2016)
by: Landoll, Douglas J.
Published: (2016)
Multimedia making it work
by: Vaughan
Published: (2008)
by: Vaughan
Published: (2008)
Multimedia making it work
by: VaughanlhTay
by: VaughanlhTay
Multimedia konsep dan praktis
by: Jamalludin Harun 1971-
Published: (2005)
by: Jamalludin Harun 1971-
Published: (2005)
Principles of multimedia
by: Parekh, Ranjan
Published: (2006)
by: Parekh, Ranjan
Published: (2006)
Exploring multimedia
Multimedia in action
by: ShumanlhJames E.
by: ShumanlhJames E.
Experience multimedia
by: Sprankle lhMaureen
by: Sprankle lhMaureen
Information security governance and management framework model and toolset for CISOs and decision makers
by: Volchkov, Andrej
Published: (2019)
by: Volchkov, Andrej
Published: (2019)
Security in computing
by: Pfleegar, Charles P.
Published: (1997)
by: Pfleegar, Charles P.
Published: (1997)
Digital watermarking and steganography
by: Cox, Ingemar J.
Published: (2008)
by: Cox, Ingemar J.
Published: (2008)
Multimedia technology and Applications
by: Hillman lhDavid
by: Hillman lhDavid
Secure ICT service provisioning for cloud, mobile and beyond a workable architectural approach balancing between buyers and providers
by: Von Faber, Eberhard
Published: (2013)
by: Von Faber, Eberhard
Published: (2013)
Principles of information security
by: Whitman, Michael E
Published: (2003)
by: Whitman, Michael E
Published: (2003)
Similar Items
-
Multimedia content encryption techniques and applications
by: Lian, Shiguo
Published: (2009) -
Writing secure code
by: Howard, Michael 1965-
Published: (2003) -
INTRODUCTION TO Computer and Network Security : NAVIGATING SHADES OF GRAY /
by: Brooks, Richard R.
Published: (2014) -
Securing information and communications systems principles, technologies, and applications
Published: (2008) -
Security and privacy in social networks
Published: (2013)


