|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-18405-5 |
003 |
DE-He213 |
005 |
20220114190126.0 |
007 |
cr nn 008mamaa |
008 |
110117s2011 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642184055
|9 978-3-642-18405-5
|
024 |
7 |
|
|a 10.1007/978-3-642-18405-5
|2 doi
|
050 |
|
4 |
|a QA268
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.824
|2 23
|
245 |
1 |
0 |
|a Digital Watermarking
|h [electronic resource] :
|b 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers /
|c edited by Hyoung-Joong Kim, Yun Q. Shi, Mauro Barni.
|
250 |
|
|
|a 1st ed. 2011.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2011.
|
300 |
|
|
|a X, 317 p. 140 illus., 60 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 6526
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held in Seoul, Korea, in October 2010. The 26 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on forensics, visual cryptography, robust watermarking, steganography, fingerprinting, and steganalysis.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Information storage and retrieval systems.
|
650 |
|
0 |
|a Computer graphics.
|
650 |
|
0 |
|a Computer vision.
|
650 |
1 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Data Structures and Information Theory.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
650 |
2 |
4 |
|a Information Storage and Retrieval.
|
650 |
2 |
4 |
|a Computer Graphics.
|
650 |
2 |
4 |
|a Computer Vision.
|
700 |
1 |
|
|a Kim, Hyoung-Joong.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Shi, Yun Q.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Barni, Mauro.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642184048
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642184062
|
830 |
|
0 |
|a Security and Cryptology ;
|v 6526
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-18405-5
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|