You have 0 saved results.
Mark results and click the "Add To Watchlist" link in order to add them to this list.
feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_BV019784497
    Format: IX, 306 S. : , Ill., graph. Darst.
    ISBN: 3-540-24839-0
    Series Statement: Lecture notes in computer science 3304
    Note: Literaturangaben
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Elektronisches Wasserzeichen ; Urheberrecht ; Elektronisches Wasserzeichen ; Urheberrecht ; Digitalisierung ; Datensicherung ; Konferenzschrift ; Konferenzschrift ; Kongress ; Konferenzschrift ; Konferenzschrift
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Book
    Book
    New York u.a. :Springer,
    UID:
    almafu_BV004127639
    Format: XXVI, 462 S. : Ill., graph. Darst.
    ISBN: 0-387-97240-4 , 3-540-97240-4
    Note: Literaturangaben
    Language: English
    Subjects: Engineering
    RVK:
    Keywords: Mobiler Roboter ; Fahrerloses Transportsystem ; Autonomer Roboter ; Mobiler Rechner ; Mobiler Rechner
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Book
    Book
    San Francisco [u.a.] :Morgan Kaufmann,
    UID:
    almahu_BV013944363
    Format: XXV, 542 S. : Ill., graph. Darst.
    ISBN: 1-55860-714-5
    Series Statement: The Morgan Kaufmann Series in Multimedia Information and Systems
    Note: 2. Aufl. u.d.T.: Digital watermarking and steganography
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Elektronisches Wasserzeichen
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV022353864
    Format: 1 Online-Ressource (IX, 306 S.) , Ill., graph. Darst.
    ISBN: 3540248390
    Series Statement: Lecture notes in computer science 3304
    Note: Literaturangaben
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Elektronisches Wasserzeichen ; Urheberrecht ; Elektronisches Wasserzeichen ; Urheberrecht ; Digitalisierung ; Datensicherung ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    gbv_276871367
    Format: XII, 408 S , Ill., graph. Darst
    ISBN: 0821866060
    Series Statement: DIMACS series in discrete mathematics and theoretical computer science 19
    Note: NSF Science and Technology Center in Discrete Mathematics and Theoretical Computer Science, a consortium of Rutgers University, Princeton University, AT&T Bell Labs, Bellcore , Includes bibliographical references
    Language: English
    Keywords: Cluster-Analyse ; Computervision ; Dekomposition ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    New York, NY :Springer New York :
    UID:
    almahu_9948621151902882
    Format: XXVI, 462 p. 68 illus. , online resource.
    Edition: 1st ed. 1990.
    ISBN: 9781461389972
    Content: Autonomous robot vehicles are vehicles capable of intelligent motion and action without requiring either a guide or teleoperator control. The recent surge of interest in this subject will grow even grow further as their potential applications increase. Autonomous vehicles are currently being studied for use as reconnaissance/exploratory vehicles for planetary exploration, undersea, land and air environments, remote repair and maintenance, material handling systems for offices and factories, and even intelligent wheelchairs for the disabled. This reference is the first to deal directly with the unique and fundamental problems and recent progress associated with autonomous vehicles. The editors have assembled and combined significant material from a multitude of sources, and, in effect, now conviniently provide a coherent organization to a previously scattered and ill-defined field.
    Note: 1. Guidance (Kinematics, Control, and Trajectory Generation) -- On the Kinematics of Wheeled Mobile Robots -- Kinematic Modeling for Feedback Control of an Omnidirectional Wheeled Mobile Robot -- An Automatic Guidance System of a Self-Controlled Vehicle -- Local Path Control for an Autonomous Vehicle -- Running with Symmetry -- Smooth Local Path Planning for Autonomous Vehicles -- 2. Sensors -- Sensor Models and Multisensor Integration -- Location Estimation and Uncertainty Analysis for Mobile Robots -- Inertial Navigation -- Continuous Transmission F.M. Sonar with One Octave Bandwidth and No Blind Time -- An Optical Rangefinder for Autonomous Robot Cart Navigation -- Error Modeling in Stereo Navigation -- 3. Navigation (Position and Course Estimation) -- Statistical Theory of Passive Location Systems -- Estimating Uncertain Spatial Relationships in Robotics -- The Kalman Filter: An Introduction to Concepts -- Maintaining Representations of the Environment of a Mobile Robot -- Blanche: Position Estimation for an Autonomous Robot Vehicle -- 4. Map Representation -- Sonar-Based Real-World Mapping and Navigation -- Cartographic Databases -- Spatial Planning: A Configuration Space Approach -- Simplified Voronoi Diagrams -- Solving the Find-Path Problem by Good Representation of Free Space -- 5. Sensing Strategies -- Computational Complexity of Art Gallery Problems -- Sensing Strategies for Disambiguating Among Multiple Objects in Known Poses -- Probing Convex Polytopes -- 6. Motion Planning -- An Automatic Motion Planning System for a Convex Polygonal Mobile Robot in 2-Dimensional Polygonal Space -- Path-Planning Strategies for a Point Mobile Automaton Moving Amidst Unknown Obstacles of Arbitrary Shape -- Motion Planning for an Autonomous Vehicle -- Real-Time Obstacle Avoidance for Manipulators and Mobile Robots -- 7. Systems -- The Stanford Cart and the CMU Rover -- An Integrated Navigation and Motion Control System for Autonomous Multisensory Mobile Robots -- A Mars Rover for the 1990's -- A Mobile Robot: Sensing, Planning, and Locomotion.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9781461389996
    Additional Edition: Printed edition: ISBN 9780387972404
    Additional Edition: Printed edition: ISBN 9781461389989
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_9948621027402882
    Format: XII, 604 p. , online resource.
    Edition: 1st ed. 2004.
    ISBN: 9783540246244
    Series Statement: Lecture Notes in Computer Science, 2939
    Content: We are happy to present to you the proceedings of the 2nd International Workshop on Digital Watermarking, IWDW 2003. Since its modern re-appearance in the academic community in the early 1990s, great progress has been made in understanding both the capabilities and the weaknesses of digital watermarking. On the theoretical side, we all are now well aware of the fact that digital waterma- ing is best viewed as a form of communication using side information. In the case of digital watermarking the side information in question is the document to be wat- marked. This insight has led to a better understanding of the limits of the capacity and robustness of digital watermarking algorithms. It has also led to new and improved watermarking algorithms, both in terms of capacity and imperceptibility. Similarly, the role of human perception, and models thereof, has been greatly enhanced in the study and design of digital watermarking algorithms and systems. On the practical side, applications of watermarking are not yet abundant. The original euphoria on the role of digital watermarking in copy protection and copyright prot- tion has not resulted in widespread usage in practical systems. With hindsight, a n- ber of reasons can be given for this lack of practical applications.
    Note: Invited Talks -- The Importance of Aliasing in Structured Quantization Index Modulation Data Hiding -- Watermark Embedding for Black-Box Channels -- Image Steganography and Steganalysis: Concepts and Practice -- On the Integration of Watermarks and Cryptography -- I: DRM I -- Content-Dependent Anti-disclosure Image Watermark -- Performance Measurement of Watermark Embedding Patterns -- II: Theory -- Image Fusion Based Visible Watermarking Using Dual-Tree Complex Wavelet Transform -- Optimal Data-Hiding Strategies for Games with BER Payoffs -- Robust Wavelet-Based Information Hiding through Low-Density Parity-Check (LDPC) Codes -- III: Non-St+Stego -- Natural Language Watermarking Using Semantic Substitution for Chinese Text -- Resilient Information Hiding for Abstract Semi-structures -- Model-Based Steganography -- IV: Systems -- Authentication of 3-D Polygonal Meshes -- Use of Motion Estimation to Improve Video Watermarking for MPEG Encoders -- A Robust Printed Image Watermarking Based on Iterative Halftoning Method -- A Feature-Watermarking Scheme for JPEG Image Authentication -- V: Estimation -- An Intelligent Watermark Detection Decoder Based on Independent Component Analysis -- Coefficient Selection Methods for Scalable Spread Spectrum Watermarking -- Performance Analysis of Order Statistical Patchwork -- Rotation-Tolerant Watermark Detection Using Circular Harmonic Function Correlation Filter -- VI: Perception+Audio -- On Perceptual Quality of Watermarked Images - An Experimental Approach -- Audio Watermarking Based on Music Content Analysis: Robust against Time Scale Modification -- Multi-bit Video Watermarking Based on 3D DFT Using Perceptual Models -- EM Estimation of Scale Factor for Quantization-Based Audio Watermarking -- VII: DRM II -- Semi-fragile Watermarking for Tamper Proofing and Authentication of Still Images -- Secure Video Watermarking via Embedding Strength Modulation -- On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving -- Posters -- RST-Resistant Image Watermarking Using Invariant Centroid and Reordered Fourier-Mellin Transform -- Robust Audio Watermarking Using Both DWT and Masking Effect -- Normalization Domain Watermarking Method Based on Pattern Extraction -- Robust Watermarking with Adaptive Receiving -- A Robust Logo Multiresolution Watermarking Based on Independent Component Analysis Extraction -- Highly Reliable Stochastic Perceptual Watermarking Model Based on Multiwavelet Transform -- Metadata Hiding for Content Adaptation -- Echo Watermarking in Sub-band Domain -- Modification of Polar Echo Kernel for Performance Improvement of Audio Watermarking -- Increasing Robustness of an Improved Spread Spectrum Audio Watermarking Method Using Attack Characterization -- Enhancement Methods of Image Quality in Screen Mark Attack -- A Method to Improve the Stego-Image Quality for Palette-Based Image Steganography -- A Secure Steganographic Scheme against Statistical Analyses -- A Three-Dimensional Watermarking Algorithm Using the DCT Transform of Triangle Strips -- High Quality Perceptual Steganographic Techniques -- A Watermarking Scheme Applicable for Fingerprinting Protocol -- A New Digital Watermarking for Architectural Design Drawing Using LINEs and ARCs Based on Vertex -- Public Watermark Detection Using Multiple Proxies and Secret Sharing -- Towards Generic Detection Scheme in Zero Knowledge Protocol for Blind Watermark Detection -- Lossless Watermarking Considering the Human Visual System -- Data-Hiding Capacity Improvement for Text Watermarking Using Space Coding Method.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783662181386
    Additional Edition: Printed edition: ISBN 9783540210610
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    almahu_9947363953502882
    Format: IX, 306 p. , online resource.
    ISBN: 9783540318057
    Series Statement: Lecture Notes in Computer Science, 3304
    Content: We are happy to present to you the proceedings of the 3rd International Workshop on Digital Watermarking, IWDW 2004. Since its modern reappearance in the academic community in the early 1990s, great progress has been made in understanding both the capabilities and the weaknesses of digital watermarking. On the theoretical side, we all are now well aware of the fact that digital watermarking is best viewed as a form of communication using side information. In the case of digital watermarking the side information in question is the document to be watermarked. This insight has led to a better understanding of the limits of the capacity and robustness of digital watermarking algorithms. It has also led to new and improved watermarking algorithms, both in terms of capacity and imperceptibility. Similarly, the role of human perception, and models thereof, has been greatly enhanced in the study and design of digital watermarking algorithms and systems. On the practical side, applications of watermarking are not yet abundant. The original euphoria on the role of digital watermarking in copy protection and copyright protection has not resulted in widespread use in practical systems. With hindsight, a number of reasons can be given for this lack of practical applications.
    Note: Invited Lecture -- Reversible Data Hiding -- Fingerprinting Curves -- Informed Detection Revisited -- Session I: Systems -- A Counter-Geometric Distortions Data Hiding Scheme Using Double Channels in Color Images -- A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition -- Better Use of Human Visual Model in Watermarking Based on Linear Prediction Synthesis Filter -- Watermarking System for QoS Aware Content Adaptation -- Session II: Theory -- Weighted Segmented Digital Watermarking -- Robust Estimation of Amplitude Modification for Scalar Costa Scheme Based Audio Watermark Detection -- Reversible Data Hiding Using Integer Wavelet Transform and Companding Technique -- Session III: Authentication and Stego -- Alteration-Locating Authentication Watermarking for Binary Images -- On Security Notions of Steganographic Systems -- A Multi-feature Based Invertible Authentication Watermarking for JPEG Images -- Steganographic Scheme Using a Block Cipher -- Watermarking Attack: Security of WSS Techniques -- Session IV: Cryptography -- Flaws in Generic Watermarking Protocols Based on Zero-Knowledge Proofs -- Cryptanalysis of a Wavelet Based Watermarking Scheme -- A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems -- Towards the Public but Noninvertible Watermarking -- A Generalization of an Anonymous Buyer-Seller Watermarking Protocol and Its Application to Mobile Communications -- Session V: Methods -- Robust Frequency Domain Audio Watermarking: A Tuning Analysis -- Watermarking Technique for Authentication of 3-D Polygonal Meshes -- Fidelity-Controlled Robustness Enhancement of Blind Watermarking Schemes Using Evolutionary Computational Techniques -- Robust Watermarking on Polygonal Meshes Using Distribution of Vertex Norms -- A Video Watermarking Using the 3-D Wavelet Transform and Two Perceptual Watermarks.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540248392
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages