|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocm45730960 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
001009s2000 maua ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OCL
|d OCLCQ
|d TUU
|d OCLCQ
|d TNF
|d OCLCQ
|d ZCU
|d OCLCO
|d OCLCF
|d OCLCQ
|d VVN
|d BTCTA
|d NLGGC
|d OCLCQ
|d INTCL
|d JBG
|d AGLDB
|d SAV
|d OCLCQ
|d ICD
|d QT7
|d OCLCA
|d LUE
|d YDX
|d OCLCQ
|d WRM
|d VTS
|d OCLCQ
|d INT
|d TOF
|d OCLCQ
|d TKN
|d STF
|d M8D
|d JX9
|d UMK
|d CHBRC
|d UKEHC
|d OCLCO
|d OCLCQ
|d IOY
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 47660780
|a 47924434
|a 50689463
|a 532753796
|a 612317578
|a 961617380
|a 962707808
|a 1024154671
|a 1038574356
|a 1108905542
|a 1135382619
|a 1200085988
|
020 |
|
|
|a 1580530354
|q (electronic bk.)
|
020 |
|
|
|a 9781580530354
|q (electronic bk.)
|
020 |
|
|
|a 9781580534154
|
020 |
|
|
|a 1580534155
|
029 |
1 |
|
|a AU@
|b 000053221604
|
029 |
1 |
|
|a DEBBG
|b BV043171014
|
029 |
1 |
|
|a DEBSZ
|b 422516732
|
035 |
|
|
|a (OCoLC)45730960
|z (OCoLC)47660780
|z (OCoLC)47924434
|z (OCoLC)50689463
|z (OCoLC)532753796
|z (OCoLC)612317578
|z (OCoLC)961617380
|z (OCoLC)962707808
|z (OCoLC)1024154671
|z (OCoLC)1038574356
|z (OCoLC)1108905542
|z (OCoLC)1135382619
|z (OCoLC)1200085988
|
050 |
|
4 |
|a QA76.9.A25
|b I54144 2000eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 21
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Information hiding techniques for steganography and digital watermarking /
|c Stefan Katzenbeisser, Fabien A.P. Petitcolas, editors.
|
260 |
|
|
|a Boston :
|b Artech House,
|c 2000.
|
300 |
|
|
|a 1 online resource (xviii, 220 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Artech House computer security series
|
500 |
|
|
|a "Artech House computing library."
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a "Steganography, a means by which two or more parties may communicate using "invisible" or "subliminal" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use." "Inside, you get a thorough review of steganography, the history of this previously neglected element of cryptography, a description of possible applications, and a survey of methods you can use to hide information in modern media. Included is an overview of "steganalysis," methods that can be used to break steganographic communication."--Jacket
|
505 |
0 |
0 |
|g 1.
|t Introduction to information hiding --
|g I.
|t Secret writing and steganography.
|g 2.
|t Principles of steganography.
|g 3.
|t A survey of steganographic techniques.
|g 4.
|t Steganalysis --
|g II.
|t Watermarking and copyright protection.
|g 5.
|t Introduction to watermarking techniques.
|g 6.
|t A survey of current watermarking techniques.
|g 7.
|t Robustness of copyright marking systems.
|g 8.
|t Fingerprinting.
|g 9.
|t Copyright on the Internet and watermarking.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Watermarks.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
6 |
|a Filigranes (Papeterie)
|
650 |
|
7 |
|a watermarks.
|2 aat
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
650 |
|
7 |
|a Watermarks
|2 fast
|
650 |
|
7 |
|a Cryptographie.
|2 ram
|
650 |
|
7 |
|a Filigranes (papeterie)
|x Techniques numériques.
|2 ram
|
650 |
|
7 |
|a Protection de l'information (informatique)
|2 ram
|
700 |
1 |
|
|a Katzenbeisser, Stefan.
|
700 |
1 |
|
|a Petitcolas, Fabien A. P.
|
776 |
0 |
8 |
|i Print version:
|t Information hiding techniques for steganography and digital watermarking.
|d Boston : Artech House, 2000
|z 1580530354
|w (DLC) 99052317
|w (OCoLC)42733740
|
830 |
|
0 |
|a Artech House computer security series.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=40326
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a Baker and Taylor
|b BTCP
|n bl2004001179
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 40326
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3017261
|
994 |
|
|
|a 92
|b IZTAP
|