Full text: Proceedings, XXth congress (Part 4)

International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol XXXV, Part B4. Istanbul 2004 
T. Mittelholzer, (2000), An information-theoretic approach to 
Steganography and Watermarking, /nformation Hiding: Third 
International Workshop, Lecture Notes in Computer Science, 
1768, 1-16. 
B. Ptzmann, (1996), Information hiding terminology, 
Information. Hiding: First International Workshop, Lecture 
Notes in Computer Science, 1174, 347-350. 3 
B. Schneier, (1994), Description of a new variable-length key, 
64-Bit block cipher, Fast Software Encryption, Cambridge 
Security Workshop Proceedings, Lecture Notes in Computer 
Science, 809, 191-204. 
KEY 
C.E., Shannon, (1949), Communication theory of secrecy 
systems, Bell System Technical Journal, 28, 656-715. 
ABST 
The u: 
other | 
demar 
Sustai 
progre 
disco\ 
the da 
digita 
DEM. 
all BC 
produ 
intero 
provic 
comp 
MSRI 
softw 
evalu: 
OGC/ 
conce 
The ! 
was 
mana. 
Multi 
mana 
suppc 
of th 
infor 
to dig 
For 1 
(BM( 
initia 
2001. 
a se 
acqui 
geogi 
Colui 
impo 
Wate 
publi 
and 
digit: 
imag 
330 
 
	        
Waiting...

Note to user

Dear user,

In response to current developments in the web technology used by the Goobi viewer, the software no longer supports your browser.

Please use one of the following browsers to display this page correctly.

Thank you.