The proceeding is a collection of research papers presented at the International Conference on Data Engineering 2013 (DaEng-2013), a conference dedicated to address the challenges in the areas of database, information retrieval, data mining and knowledge management, thereby presenting a consolidated view to the interested researchers in the aforesaid fields. The goal of this conference was to bring together researchers and practitioners from academia and industry to focus on advanced on data engineering concepts and establishing new collaborations in these areas. The topics of interest are as follows but are not limited to: ac Database theory ac Data management ac Data mining and warehousing ac Data privacy a security ac Information retrieval, integration and visualization ac Information system ac Knowledge discovery in databases ac Mobile, grid and cloud computing ac Knowledge-based ac Knowledge management ac Web data, services and intelligence2.1 Types of Steganography Depending upon the cover media, the steganography approach can be classified into several ... Frequency domain [11] steganography includes several techniques i.e. tone insertion, phase coding, amplitude modulation, Cepstral domain and spread spectrum. ... In the Discrete Wavelet Transform (DWT) [17] method, the actual data is embedded at the LSB of the waveletanbsp;...
Title | : | Proceedings of the First International Conference on Advanced Data and Information Engineering (DaEng-2013) |
Author | : | Tutut Herawan, Mustafa Mat Deris, Jemal Abawajy |
Publisher | : | Springer Science & Business Media - 2013-12-14 |
You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.
Once you have finished the sign-up process, you will be redirected to your download Book page.
How it works: