This book constitutes the proceedings of the First International Conference on Computational Intelligence and Information Technology, CIIT 2011, held in Pune, India, in November 2011. The 58 revised full papers, 67 revised short papers, and 32 poster papers presented were carefully reviewed and selected from 483 initial submissions. The papers are contributed by innovative academics and industrial experts in the field of computer science, information technology, computational engineering, mobile communication and security and offer a stage to a common forum, where a constructive dialog on theoretical concepts, practical ideas and results of the state of the art can be developed.To resist cropping attacks, watermark is embedded along with synchronization codes in the WHT domain. To take advantage of the ... In: Multimedia security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property, pp. 75a125. IGI Global ... Wang, X., Zhao, H.: A novel synchronization invariant audio watermarking scheme based on DWT and DCT. IEEE Transactions onanbsp;...
|Title||:||Computational Intelligence and Information Technology|
|Author||:||Vinu V Das, Nessy Thankachan|
|Publisher||:||Springer Science & Business Media - 2013-01-02|