Information Hiding


Book Description

This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Information Hiding, IH 2002, held in Noordwijkerhout, The Netherlands, in October 2002. The 27 revised full papers presented were carefully selected during two rounds of reviewing and revision from 78 submissions. The papers are organized in topical sections on information hiding and networking, anonymity, fundamentals of watermarking, watermarking algorithms, attacks on watermarking algorithms, steganography algorithms, steganalysis, and hiding information in unusual content.




Digital Transformation


Book Description

With the exception of written letters and personal conversations, digital technology forms the basis of nearly every means of communication and information that we use today. It is also used to control the essential elements of economic, scientific, and public and private life: security, production, mobility, media, and healthcare. Without exaggerating it is possible to say that digital technology has become one of the foundations of our technologically oriented civilization. The benefits of modern data technology are so impressive and the potential for future applications so enormous that we cannot fail to promote its development if we are to retain our leading role in the competitive international marketplace. In this process, security plays a vital role in each of the areas of application of digital technology — the more technological sectors are entrusted to data systems technology, the more important their reliability becomes to us. Developing digital systems further while simultaneously ensuring that they always act and respond in the best interests of people is a central goal of the technological research and development propagated and conducted by Fraunhofer.




Modelling Driver Behaviour in Automotive Environments


Book Description

This book presents a general overview of the various factors that contribute to modelling human behaviour in automotive environments. This long-awaited volume, written by world experts in the field, presents state-of-the-art research and case studies. It will be invaluable reading for professional practitioners graduate students, researchers and alike.




Databases, Information Systems, and Peer-to-Peer Computing


Book Description

This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Databases, Information Systems, and Peer-to-Peer Computing, DBISP2P 2003, held in Berlin, Germany in September 2003 as a satellite event of VLDB 2003. The 16 revised full papers presented together with the abstract of an invited contribution were carefully selected during two rounds of reviewing and improvement. The papers are organized in topical sections on structure in P2P networks, semantics and data integration, data streams and publish/subscribe, and data structures and query processing.




Europe and MENA Cooperation Advances in Information and Communication Technologies


Book Description

This book contains a selection of articles from The Europe, Middle East and North Africa Conference on Technology and Security to Support Learning 2016 (EMENA-TSSL'16), held between the 3th and 5th of October at Saidia, Oujda, Morocco. EMENA-TSSL'16 is a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences and challenges in Information & Communication Technologies, and Security to support Learning. The main topics covered are: A) Online Education; B) Emerging Technologies in Education; C) Artificial Intelligence in Education; D) Gamification and Serious games; E) Network & Web Technologies Applications; F) Online experimentation and Virtual Laboratories; G) Multimedia Systems and Applications; H) Security and Privacy; I) Multimedia, Computer Vision and Image Processing; J) Cloud, Big Data Analytics and Applications; K) Human-Computer Interaction; L) Software Systems, Architectures, Applications and Tools; M) Online Languages and Natural Language Processing N) E-content Development, Assessment and Plagiarism; O) Secure E-Learning Development and Auditing; P) Internet of Things and Wireless Sensor Networks.




Security and Privacy in Biometrics


Book Description

This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardization; describes real-world applications, from face and fingerprint-based user recognition, to biometrics-based electronic documents, and biometric systems employing smart cards; reviews the ethical implications of the ubiquity of biometrics in everyday life, and its impact on human dignity; provides guidance on best practices for the processing of biometric data within a legal framework.




Information Hiding


Book Description

This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009. The 19 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography, steganalysis, watermarking, fingerprinting, hiding in unusual content, novel applications and forensics.




Biometrics


Book Description

Biometrics: Personal Identification in Networked Society is a comprehensive and accessible source of state-of-the-art information on all existing and emerging biometrics: the science of automatically identifying individuals based on their physiological or behavior characteristics. In particular, the book covers: *General principles and ideas of designing biometric-based systems and their underlying tradeoffs *Identification of important issues in the evaluation of biometrics-based systems *Integration of biometric cues, and the integration of biometrics with other existing technologies *Assessment of the capabilities and limitations of different biometrics *The comprehensive examination of biometric methods in commercial use and in research development *Exploration of some of the numerous privacy and security implications of biometrics. Also included are chapters on face and eye identification, speaker recognition, networking, and other timely technology-related issues. All chapters are written by leading internationally recognized experts from academia and industry. Biometrics: Personal Identification in Networked Society is an invaluable work for scientists, engineers, application developers, systems integrators, and others working in biometrics.




Digital Watermarking


Book Description

This book constitutes the thoroughly refereed post-conference proceedings of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held in Seoul, Korea, in October 2010. The 26 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on forensics, visual cryptography, robust watermarking, steganography, fingerprinting, and steganalysis.




Experimental and Numerical Investigation of Advanced Materials and Structures


Book Description

The idea of this monograph is to present the latest results related to experimental and numerical investigations of advanced materials and structures. The contributions cover the field of mechanical, civil and materials engineering, ranging from new modelling and simulation techniques, advanced analysis techniques, optimization of structures and materials and constitutive modelling. Well known experts present their research on damage and fracture of material and structures, materials modelling and evaluation up to image processing and visualization for advanced analyses and evaluation.