Proceedings of the first ACM workshop on Information hiding and multimedia security最新文献

筛选
英文 中文
Session details: Moving steganography and steganalysis from the laboratory to the real world 会议细节:将隐写术和隐写分析从实验室转移到现实世界
Andrew D. Ker
{"title":"Session details: Moving steganography and steganalysis from the laboratory to the real world","authors":"Andrew D. Ker","doi":"10.1145/3245189","DOIUrl":"https://doi.org/10.1145/3245189","url":null,"abstract":"","PeriodicalId":404491,"journal":{"name":"Proceedings of the first ACM workshop on Information hiding and multimedia security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125719436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Session details: From biometric to forensics 会议细节:从生物识别到取证
Chang-Tsun Li
{"title":"Session details: From biometric to forensics","authors":"Chang-Tsun Li","doi":"10.1145/3245191","DOIUrl":"https://doi.org/10.1145/3245191","url":null,"abstract":"","PeriodicalId":404491,"journal":{"name":"Proceedings of the first ACM workshop on Information hiding and multimedia security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129970144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Invited talk 会议详情:邀请演讲
S. Katzenbeisser
{"title":"Session details: Invited talk","authors":"S. Katzenbeisser","doi":"10.1145/3245187","DOIUrl":"https://doi.org/10.1145/3245187","url":null,"abstract":"","PeriodicalId":404491,"journal":{"name":"Proceedings of the first ACM workshop on Information hiding and multimedia security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134330104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Watermarking 会话详细信息:水印
D. Coltuc
{"title":"Session details: Watermarking","authors":"D. Coltuc","doi":"10.1145/3245195","DOIUrl":"https://doi.org/10.1145/3245195","url":null,"abstract":"","PeriodicalId":404491,"journal":{"name":"Proceedings of the first ACM workshop on Information hiding and multimedia security","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116334797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Tracing 会话详细信息:跟踪
P. Bas
{"title":"Session details: Tracing","authors":"P. Bas","doi":"10.1145/3245188","DOIUrl":"https://doi.org/10.1145/3245188","url":null,"abstract":"","PeriodicalId":404491,"journal":{"name":"Proceedings of the first ACM workshop on Information hiding and multimedia security","volume":"1073 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122888625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Invited talk 会议详情:邀请演讲
Jana Dittman
{"title":"Session details: Invited talk","authors":"Jana Dittman","doi":"10.1145/3245194","DOIUrl":"https://doi.org/10.1145/3245194","url":null,"abstract":"","PeriodicalId":404491,"journal":{"name":"Proceedings of the first ACM workshop on Information hiding and multimedia security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116840404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Media encryption 会话详细信息:媒体加密
A. Uhl
{"title":"Session details: Media encryption","authors":"A. Uhl","doi":"10.1145/3245193","DOIUrl":"https://doi.org/10.1145/3245193","url":null,"abstract":"","PeriodicalId":404491,"journal":{"name":"Proceedings of the first ACM workshop on Information hiding and multimedia security","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134475356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: End user and signal processing: a successful synergy towards the assessment of forensic tools 会议细节:最终用户和信号处理:对法医工具评估的成功协同作用
M. Carli
{"title":"Session details: End user and signal processing: a successful synergy towards the assessment of forensic tools","authors":"M. Carli","doi":"10.1145/3245192","DOIUrl":"https://doi.org/10.1145/3245192","url":null,"abstract":"","PeriodicalId":404491,"journal":{"name":"Proceedings of the first ACM workshop on Information hiding and multimedia security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115635941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信