Hyoung-Joong Kim; Stefan Katzenbeisser; Anthony T. S. Ho Springer-Verlag Berlin and Heidelberg GmbH & Co. KG (2009) Saatavuus: Tilaustuote Pehmeäkantinen kirja
Yun Q. Shi; Hyoung-Joong Kim; Stefan Katzenbeisser Springer-Verlag Berlin and Heidelberg GmbH & Co. KG (2008) Saatavuus: Tilaustuote Pehmeäkantinen kirja
Frank Stajano; Hyoung Joong Kim; Jong-Suk Chae; Seong-Don Kim Springer-Verlag Berlin and Heidelberg GmbH & Co. KG (2007) Saatavuus: Tilaustuote Pehmeäkantinen kirja
Yun Qing Shi; Hyoung-Joong Kim; Fernando Perez-Gonzalez Springer-Verlag Berlin and Heidelberg GmbH & Co. KG (2012) Saatavuus: Tilaustuote Pehmeäkantinen kirja
Yun Q. Shi; Fernando Pérez-González; Hyoung Joong Kim Springer-Verlag Berlin and Heidelberg GmbH & Co. KG (2013) Saatavuus: Tilaustuote Pehmeäkantinen kirja
Yun Qing Shi; Hyoung-Joong Kim; Fernando Pérez-González Springer-Verlag Berlin and Heidelberg GmbH & Co. KG (2014) Saatavuus: Tilaustuote Pehmeäkantinen kirja
Yun-Qing Shi; Hyoung Joong Kim; Fernando Pérez-González; Ching-Nung Yang Springer International Publishing AG (2015) Saatavuus: Tilaustuote Pehmeäkantinen kirja
Yun-Qing Shi; Hyoung Joong Kim; Fernando Pérez-González; Isao Echizen Springer International Publishing AG (2016) Saatavuus: Tilaustuote Pehmeäkantinen kirja
Yun Qing Shi; Hyoung Joong Kim; Fernando Perez-Gonzalez; Feng Liu Springer International Publishing AG (2017) Saatavuus: Tilaustuote Pehmeäkantinen kirja
Christian Kraetzer; Yun-Qing Shi; Jana Dittmann; Hyoung Joong Kim Springer International Publishing AG (2017) Saatavuus: Tilaustuote Pehmeäkantinen kirja
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Digital Watermarking, IWDW 2008, held in Busan, Korea, in November 2008. The 36 regular papers included in the volume were carefully reviewed and selected from 62 submissions. Areas of interest to the conference are mathematical modeling of embedding and detection; information theoretic, stochastic aspects of data hiding; security issues, including attacks and counter-attacks; combination of data hiding and cryptography; optimum watermark detection and reliable recovery; estimation of watermark capacity; channel coding techniques for watermarking; large-scale experimental tests and benchmarking; new statistical and perceptual models of content; reversible data hiding; data hiding in special media; data hiding and authentication; steganography and steganalysis; data forensics; copyright protection, DRM, and forensic watermarking; and visual cryptography.