IIH-MSP 2008: Harbin, China

Refine list

showing all ?? records

Digital Crime and Forensics

Ubiquitous Multimedia Services and Applications for Residential Users

Information Retrieval (1)

Wired and Wireless Multimedia Networking and Applications

Techniques and Algorithms for Multimedia Security (1)

Event Analysis in Videos

Fingerprinting

Data Hiding and Steganography (1)

Cryptography (1)

Techniques and Algorithms for Multimedia Security (2)

Pattern Recognition (1)

Image and Speech Processing

Video Signal Processing (1)

Watermarking Applications (1)

Networking Applications (1)

Digital Forensics and Data Hiding Discovery

The Applications of Skin Detection

Advanced Data Hiding and Coding Techniques for Audio Signals

Intelligent Video Processing

Joint Source Channel Coding and Applications

Intelligent Signal and Image Processing (1)

Image Feature Extraction, Compression and Watermarking

Information Retrieval (2)

Video Signal Processing (2)

Video Watermarking

Pattern Recognition (2)

Optimization Techniques and Applications (1)

Cross-Discipline Techniques (1)

Watermarking Applications (2)

Networking Applications (2)

Biometrics - From Sensors to Standardization

Intelligent Watermark Hiding and Digital Image Processing

Intelligent Watermarking Techniques, Image Authentication and Visual Cryptography (1)

Steganography and Watermarking

Digital Communications

Intelligent Signal and Image Processing (2)

Authentication

Intelligent Watermarking Techniques, Image Authentication and Visual Cryptography (2)

Cryptography (2)

Network Security (1)

Pattern Recognition (3)

Optimization Techniques and Applications (2)

Cross-Discipline Techniques (2)

Data Hiding and Steganography (2)

Network Security (2)

a service of  Schloss Dagstuhl - Leibniz Center for Informatics