This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their waterm…
This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threa…
The book discusses novel visualization techniques driven by the needs in medicine and life sciences as well as new application areas and challenges for visualization within these fields. It presents ideas and concepts for visual analysis of data from scientific studies of living organs or to the delivery of healthcare. Target scientific domains include the entire field of biology at all scales …
Modern imaging techniques and computational simulations yield complex multi-valued data that require higher-order mathematical descriptors. This book addresses topics of importance when dealing with such data, including frameworks for image processing, visualization and statistical analysis of higher-order descriptors. It also provides examples of the successful use of higher-order descriptors …
This book addresses the fundamental concepts in the theory and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. This updated second edition has also been expanded with ne…
This book takes a quantitative look at ICT-generated event data to highlight current trends and issues in Nigeria at the local, state and national levels. Without emphasizing a specific policy or agenda, it provides context and perspective on the relative spatial-temporal distribution of conflict factors in Nigeria. The analysis of violence at state and local levels reveals a fractal pattern of…
This book constitutes the refereed proceedings of the Third International Conference on Distributed, Ambient, and Pervasive Interactions, DAPI 2015, held as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015, jointly with 15 other thematically conferences. The total of 1462 papers and 246 posters presented at the HCII…
Understand how to utilize the workbench, console, adapters, publisher, and other components in Scribe to ensure you have a rapid development toolkit that will drastically reduce your workload and timeline. In Using Scribe Insight, you’ll learn to build your integrations and migrations with the minimal amount of effort, what shortcuts can be taken to simplify and reduce your labor, and what te…
This book constitutes the thoroughly refereed and revised selected papers from the 10th International Workshop on Agents and Data Mining Interactions, ADMI 2014, held in Paris, France, in May 2014 as satellite workshop of AAMAS 2014, the 13th International Conference on Autonomous Agents and Multiagent Systems. The 11 papers presented were carefully reviewed and selected from numerous submis…
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Agents and Artificial Intelligence, ICAART 2014, held in Angers, France, in March 2014. The 21 revised full papers presented together with one invited paper were carefully reviewed and selected from 225 submissions. The papers are organized in two topical sections on agents and on a…