Digital watermarking and steganography /
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by lim...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Amsterdam ; Boston :
Morgan Kaufmann Publishers,
©2008.
|
Edición: | 2nd ed. |
Colección: | Morgan Kaufmann series in multimedia information and systems.
Morgan Kaufmann series in computer security. |
Temas: | |
Acceso en línea: | Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn190760116 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 080111s2008 ne a ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d OCLCQ |d OSU |d DLC |d IG# |d IDEBK |d OCLCQ |d E7B |d OCLCQ |d UX0 |d MHW |d DKDLA |d OCLCQ |d B24X7 |d OCLCO |d OCLCQ |d OCLCF |d OCLCQ |d OPELS |d OTZ |d SFB |d NLGGC |d DEBSZ |d NNO |d OCLCQ |d AZK |d LOA |d JBG |d AGLDB |d MOR |d PIFAG |d ZCU |d MERUC |d OCLCQ |d U3W |d OCLCA |d STF |d WRM |d D6H |d OCLCQ |d VTS |d NRAMU |d ICG |d INT |d VT2 |d OCLCQ |d WYU |d YOU |d OCLCQ |d LEAUB |d DKC |d OCLCQ |d M8D |d UKCRE |d VLY |d OCLCQ |d OCLCO |d UAB |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d EZC | ||
019 | |a 227968408 |a 228148421 |a 259629025 |a 473204710 |a 647692085 |a 811614718 |a 961646589 |a 962678044 |a 966264703 |a 988433028 |a 992027148 |a 1034971300 |a 1037795566 |a 1038556185 |a 1045453793 |a 1055334056 |a 1065026188 |a 1077930711 |a 1081192116 |a 1153504375 |a 1161999289 |a 1228560321 |a 1256302362 |a 1417813783 | ||
020 | |a 9780080555805 |q (electronic bk.) | ||
020 | |a 0080555802 |q (electronic bk.) | ||
020 | |a 9780123725851 |q (casebound ; |q alk. paper) | ||
020 | |a 0123725852 |q (casebound ; |q alk. paper) | ||
020 | |a 1281096164 | ||
020 | |a 9781281096166 | ||
020 | |a 9786611096168 | ||
020 | |a 6611096167 | ||
029 | 1 | |a AU@ |b 000043178396 | |
029 | 1 | |a AU@ |b 000051561520 | |
029 | 1 | |a AU@ |b 000053281266 | |
029 | 1 | |a CHNEW |b 001007375 | |
029 | 1 | |a DEBBG |b BV042305683 | |
029 | 1 | |a DEBBG |b BV043044241 | |
029 | 1 | |a DEBBG |b BV044049484 | |
029 | 1 | |a DEBSZ |b 405318804 | |
029 | 1 | |a DEBSZ |b 422157090 | |
029 | 1 | |a DEBSZ |b 430461445 | |
029 | 1 | |a DEBSZ |b 449108473 | |
029 | 1 | |a GBVCP |b 802413382 | |
029 | 1 | |a IG# |b 9780123725851 | |
029 | 1 | |a NZ1 |b 12479008 | |
029 | 1 | |a NZ1 |b 14540498 | |
029 | 1 | |a NZ1 |b 15189659 | |
035 | |a (OCoLC)190760116 |z (OCoLC)227968408 |z (OCoLC)228148421 |z (OCoLC)259629025 |z (OCoLC)473204710 |z (OCoLC)647692085 |z (OCoLC)811614718 |z (OCoLC)961646589 |z (OCoLC)962678044 |z (OCoLC)966264703 |z (OCoLC)988433028 |z (OCoLC)992027148 |z (OCoLC)1034971300 |z (OCoLC)1037795566 |z (OCoLC)1038556185 |z (OCoLC)1045453793 |z (OCoLC)1055334056 |z (OCoLC)1065026188 |z (OCoLC)1077930711 |z (OCoLC)1081192116 |z (OCoLC)1153504375 |z (OCoLC)1161999289 |z (OCoLC)1228560321 |z (OCoLC)1256302362 |z (OCoLC)1417813783 | ||
037 | |a 134566:134697 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a QA76.9.A25 |b C68 2008eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 22 |
049 | |a UAMI | ||
245 | 0 | 0 | |a Digital watermarking and steganography / |c Ingemar J. Cox [and others]. |
250 | |a 2nd ed. | ||
260 | |a Amsterdam ; |a Boston : |b Morgan Kaufmann Publishers, |c ©2008. | ||
300 | |a 1 online resource (xxviii, 593 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a The Morgan Kaufmann series in multimedia information and systems | |
490 | 1 | |a The Morgan kaufmann series in computer security | |
500 | |a Prev. ed. entered under Cox. | ||
504 | |a Includes bibliographical references (pages 549-574) and index. | ||
505 | 0 | |a Front Cover; Digital Watermarking and Steganography; Copyright Page; Table of Contents; Preface to the First Edition; Preface to the Second Edition; Example Watermarking Systems; Chapter 1. Introduction; Chapter 2. Applications and Properties; Chapter 3. Models of Watermarking; Chapter 4. Basic Message Coding; Chapter 5. Watermarking with Side Information; Chapter 6. Practical Dirty-Paper Codes; Chapter 7. Analyzing Errors; Chapter 8. Using Perceptual Models; Chapter 9. Robust Watermarking; Chapter 10. Watermark Security; Chapter 11. Content Authentication; Chapter 12. Steganography. | |
520 | |a Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition. | ||
588 | 0 | |a Print version record. | |
546 | |a English. | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Digital watermarking. | |
650 | 0 | |a Data protection. | |
650 | 2 | |a Computer Security | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Tatouage numérique. | |
650 | 6 | |a Protection de l'information (Informatique) | |
650 | 7 | |a digital watermarking. |2 aat | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Digital watermarking |2 fast | |
655 | 7 | |a dissertations. |2 aat | |
655 | 7 | |a Academic theses |2 fast | |
655 | 7 | |a Academic theses. |2 lcgft | |
655 | 7 | |a Thèses et écrits académiques. |2 rvmgf | |
700 | 1 | |a Cox, I. J. |q (Ingemar J.) | |
758 | |i has work: |a Digital watermarking and steganography (Text) |1 https://id.oclc.org/worldcat/entity/E39PCG4hY8xYtPvX7rYk8MKgTd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Digital watermarking and steganography. |b 2nd ed. |d Amsterdam ; Boston : Morgan Kaufmann Publishers, ©2008 |z 9780123725851 |z 0123725852 |w (DLC) 2007040595 |w (OCoLC)173640977 |
830 | 0 | |a Morgan Kaufmann series in multimedia information and systems. | |
830 | 0 | |a Morgan Kaufmann series in computer security. | |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=328311 |z Texto completo |
938 | |a Books 24x7 |b B247 |n bks00028225 | ||
938 | |a ebrary |b EBRY |n ebr10204371 | ||
938 | |a EBSCOhost |b EBSC |n 214764 | ||
938 | |a Ingram |b INGR |n 9780123725851 | ||
938 | |a YBP Library Services |b YANK |n 2754820 | ||
994 | |a 92 |b IZTAP |