Techniques and applications of digital watermarking and content protection /:
This unique easy-to-use software is an integration of tools and simulators that help you solve the most common feedforward predistorted amplifier design equations, including calculating gain and loop balance, optimum coupling ratios, and more. It includes the tools you need everyday, such as a micro...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston :
Artech House,
©2003.
|
Schriftenreihe: | Artech House computer security series.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | This unique easy-to-use software is an integration of tools and simulators that help you solve the most common feedforward predistorted amplifier design equations, including calculating gain and loop balance, optimum coupling ratios, and more. It includes the tools you need everyday, such as a microstrip calculator and parallel coupler designer, to relieve you of lengthy calculations and help you predict the performance of a complex amplifier before all the blocks are together. |
Beschreibung: | 1 online resource (xv, 274 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 1580536646 9781580536646 9781580531115 1580531113 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm53206644 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 031015s2003 maua ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d OCLCG |d OCLCQ |d TUU |d OCLCQ |d B24X7 |d TNF |d MERUC |d CCO |d E7B |d HNW |d NTG |d BMU |d REDDC |d DKDLA |d MHW |d FVL |d OCLCQ |d MNM |d OCLCO |d EBLCP |d OCLCQ |d OCLCF |d DEBSZ |d OCLCQ |d NLGGC |d OCLCQ |d LOA |d AZK |d AGLDB |d MOR |d PIFBR |d ZCU |d LIV |d OCLCQ |d JBG |d WY@ |d U3W |d OCLCA |d ROC |d LUE |d RCC |d BRL |d STF |d WRM |d VTS |d NRAMU |d ICG |d OCLCQ |d INT |d VT2 |d TOF |d CUY |d OCLCQ |d COO |d AU@ |d CNNOR |d OCLCQ |d WYU |d G3B |d TKN |d DKC |d OCLCQ |d UKAHL |d UMK |d OCLCQ |d UKCRE |d BRF |d UKEHC |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ | ||
015 | |a GBA3X4528 |2 bnb | ||
019 | |a 63166410 |a 70740530 |a 475186070 |a 475454060 |a 559838590 |a 646733197 |a 722363923 |a 728028074 |a 791310955 |a 793527963 |a 888729707 |a 960206934 |a 961630631 |a 961659362 |a 962573803 |a 962590451 |a 969884413 |a 988534638 |a 991957852 |a 992067794 |a 1020518107 |a 1037499118 |a 1038590272 |a 1045510462 |a 1053050559 |a 1055337017 |a 1058083480 |a 1062977664 |a 1153492307 |a 1200052704 | ||
020 | |a 1580536646 |q (electronic bk.) | ||
020 | |a 9781580536646 |q (electronic bk.) | ||
020 | |a 9781580531115 |q (alk. paper) | ||
020 | |a 1580531113 |q (alk. paper) | ||
035 | |a (OCoLC)53206644 |z (OCoLC)63166410 |z (OCoLC)70740530 |z (OCoLC)475186070 |z (OCoLC)475454060 |z (OCoLC)559838590 |z (OCoLC)646733197 |z (OCoLC)722363923 |z (OCoLC)728028074 |z (OCoLC)791310955 |z (OCoLC)793527963 |z (OCoLC)888729707 |z (OCoLC)960206934 |z (OCoLC)961630631 |z (OCoLC)961659362 |z (OCoLC)962573803 |z (OCoLC)962590451 |z (OCoLC)969884413 |z (OCoLC)988534638 |z (OCoLC)991957852 |z (OCoLC)992067794 |z (OCoLC)1020518107 |z (OCoLC)1037499118 |z (OCoLC)1038590272 |z (OCoLC)1045510462 |z (OCoLC)1053050559 |z (OCoLC)1055337017 |z (OCoLC)1058083480 |z (OCoLC)1062977664 |z (OCoLC)1153492307 |z (OCoLC)1200052704 | ||
050 | 4 | |a QA76.9.A25 |b A76 2003eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Arnold, Michael |q (Michael Konrad), |d 1964- |1 https://id.oclc.org/worldcat/entity/E39PBJjxtJrjWK467HT4w6YwYP |0 http://id.loc.gov/authorities/names/n2003002401 | |
245 | 1 | 0 | |a Techniques and applications of digital watermarking and content protection / |c Michael Arnold, Martin Schmucker, Stephen D. Wolthusen. |
246 | 3 | 0 | |a Digital watermarking and content protection |
260 | |a Boston : |b Artech House, |c ©2003. | ||
300 | |a 1 online resource (xv, 274 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
490 | 1 | |a Artech House computer security series | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Techniques and Applications of Digital Watermarking and Content Protection; Contents vii; Preface xiii; Acknowledgments xv; Chapter 1 Introduction 1; Chapter 2 Digital Watermarking 15; Chapter 3 Applications of digital watermarking 39; Chapter 4 Digital watermarking for still images 55; Chapter 5 Digital watermarking for audio data 75; Chapter 6 Digital watermarking for other media 115; Chapter 7 Attack and benchmarks of digital watermarking systems 147; Chapter 8 Other content protection mechanisms 193; Chapter 9 Integrated content protection solutions 211; Chapter 10 Conclusion 245. | |
520 | |a This unique easy-to-use software is an integration of tools and simulators that help you solve the most common feedforward predistorted amplifier design equations, including calculating gain and loop balance, optimum coupling ratios, and more. It includes the tools you need everyday, such as a microstrip calculator and parallel coupler designer, to relieve you of lengthy calculations and help you predict the performance of a complex amplifier before all the blocks are together. | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Digital watermarking. |0 http://id.loc.gov/authorities/subjects/sh2002000575 | |
650 | 0 | |a Data protection. |0 http://id.loc.gov/authorities/subjects/sh85035859 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Tatouage numérique. | |
650 | 6 | |a Protection de l'information (Informatique) | |
650 | 7 | |a digital watermarking. |2 aat | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Digital watermarking |2 fast | |
700 | 1 | |a Schmucker, Martin. | |
700 | 1 | |a Wolthusen, Stephen D. | |
776 | 0 | 8 | |i Print version: |a Arnold, Michael (Michael Konrad), 1964- |t Techniques and applications of digital watermarking and content protection. |d Boston : Artech House, ©2003 |z 1580531113 |w (DLC) 2003049577 |w (OCoLC)52109682 |
830 | 0 | |a Artech House computer security series. |0 http://id.loc.gov/authorities/names/no00015115 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=98859 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH20050073 | ||
938 | |a Books 24x7 |b B247 |n bks00003512 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL227587 | ||
938 | |a EBSCOhost |b EBSC |n 98859 | ||
938 | |a IEEE |b IEEE |n 9100612 | ||
938 | |a YBP Library Services |b YANK |n 2358692 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm53206644 |
---|---|
_version_ | 1816881611914870784 |
adam_text | |
any_adam_object | |
author | Arnold, Michael (Michael Konrad), 1964- |
author2 | Schmucker, Martin Wolthusen, Stephen D. |
author2_role | |
author2_variant | m s ms s d w sd sdw |
author_GND | http://id.loc.gov/authorities/names/n2003002401 |
author_facet | Arnold, Michael (Michael Konrad), 1964- Schmucker, Martin Wolthusen, Stephen D. |
author_role | |
author_sort | Arnold, Michael 1964- |
author_variant | m a ma |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 A76 2003eb |
callnumber-search | QA76.9.A25 A76 2003eb |
callnumber-sort | QA 276.9 A25 A76 42003EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Techniques and Applications of Digital Watermarking and Content Protection; Contents vii; Preface xiii; Acknowledgments xv; Chapter 1 Introduction 1; Chapter 2 Digital Watermarking 15; Chapter 3 Applications of digital watermarking 39; Chapter 4 Digital watermarking for still images 55; Chapter 5 Digital watermarking for audio data 75; Chapter 6 Digital watermarking for other media 115; Chapter 7 Attack and benchmarks of digital watermarking systems 147; Chapter 8 Other content protection mechanisms 193; Chapter 9 Integrated content protection solutions 211; Chapter 10 Conclusion 245. |
ctrlnum | (OCoLC)53206644 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05515cam a2200745 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm53206644 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">031015s2003 maua ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TUU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">B24X7</subfield><subfield code="d">TNF</subfield><subfield code="d">MERUC</subfield><subfield code="d">CCO</subfield><subfield code="d">E7B</subfield><subfield code="d">HNW</subfield><subfield code="d">NTG</subfield><subfield code="d">BMU</subfield><subfield code="d">REDDC</subfield><subfield code="d">DKDLA</subfield><subfield code="d">MHW</subfield><subfield code="d">FVL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MNM</subfield><subfield code="d">OCLCO</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LOA</subfield><subfield code="d">AZK</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFBR</subfield><subfield code="d">ZCU</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">JBG</subfield><subfield code="d">WY@</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">ROC</subfield><subfield code="d">LUE</subfield><subfield code="d">RCC</subfield><subfield code="d">BRL</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">VTS</subfield><subfield code="d">NRAMU</subfield><subfield code="d">ICG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">TOF</subfield><subfield code="d">CUY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">AU@</subfield><subfield code="d">CNNOR</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">G3B</subfield><subfield code="d">TKN</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKAHL</subfield><subfield code="d">UMK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKCRE</subfield><subfield code="d">BRF</subfield><subfield code="d">UKEHC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA3X4528</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">63166410</subfield><subfield code="a">70740530</subfield><subfield code="a">475186070</subfield><subfield code="a">475454060</subfield><subfield code="a">559838590</subfield><subfield code="a">646733197</subfield><subfield code="a">722363923</subfield><subfield code="a">728028074</subfield><subfield code="a">791310955</subfield><subfield code="a">793527963</subfield><subfield code="a">888729707</subfield><subfield code="a">960206934</subfield><subfield code="a">961630631</subfield><subfield code="a">961659362</subfield><subfield code="a">962573803</subfield><subfield code="a">962590451</subfield><subfield code="a">969884413</subfield><subfield code="a">988534638</subfield><subfield code="a">991957852</subfield><subfield code="a">992067794</subfield><subfield code="a">1020518107</subfield><subfield code="a">1037499118</subfield><subfield code="a">1038590272</subfield><subfield code="a">1045510462</subfield><subfield code="a">1053050559</subfield><subfield code="a">1055337017</subfield><subfield code="a">1058083480</subfield><subfield code="a">1062977664</subfield><subfield code="a">1153492307</subfield><subfield code="a">1200052704</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1580536646</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781580536646</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781580531115</subfield><subfield code="q">(alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1580531113</subfield><subfield code="q">(alk. paper)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)53206644</subfield><subfield code="z">(OCoLC)63166410</subfield><subfield code="z">(OCoLC)70740530</subfield><subfield code="z">(OCoLC)475186070</subfield><subfield code="z">(OCoLC)475454060</subfield><subfield code="z">(OCoLC)559838590</subfield><subfield code="z">(OCoLC)646733197</subfield><subfield code="z">(OCoLC)722363923</subfield><subfield code="z">(OCoLC)728028074</subfield><subfield code="z">(OCoLC)791310955</subfield><subfield code="z">(OCoLC)793527963</subfield><subfield code="z">(OCoLC)888729707</subfield><subfield code="z">(OCoLC)960206934</subfield><subfield code="z">(OCoLC)961630631</subfield><subfield code="z">(OCoLC)961659362</subfield><subfield code="z">(OCoLC)962573803</subfield><subfield code="z">(OCoLC)962590451</subfield><subfield code="z">(OCoLC)969884413</subfield><subfield code="z">(OCoLC)988534638</subfield><subfield code="z">(OCoLC)991957852</subfield><subfield code="z">(OCoLC)992067794</subfield><subfield code="z">(OCoLC)1020518107</subfield><subfield code="z">(OCoLC)1037499118</subfield><subfield code="z">(OCoLC)1038590272</subfield><subfield code="z">(OCoLC)1045510462</subfield><subfield code="z">(OCoLC)1053050559</subfield><subfield code="z">(OCoLC)1055337017</subfield><subfield code="z">(OCoLC)1058083480</subfield><subfield code="z">(OCoLC)1062977664</subfield><subfield code="z">(OCoLC)1153492307</subfield><subfield code="z">(OCoLC)1200052704</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">A76 2003eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Arnold, Michael</subfield><subfield code="q">(Michael Konrad),</subfield><subfield code="d">1964-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJjxtJrjWK467HT4w6YwYP</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2003002401</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Techniques and applications of digital watermarking and content protection /</subfield><subfield code="c">Michael Arnold, Martin Schmucker, Stephen D. Wolthusen.</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">Digital watermarking and content protection</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Boston :</subfield><subfield code="b">Artech House,</subfield><subfield code="c">©2003.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xv, 274 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Artech House computer security series</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Techniques and Applications of Digital Watermarking and Content Protection; Contents vii; Preface xiii; Acknowledgments xv; Chapter 1 Introduction 1; Chapter 2 Digital Watermarking 15; Chapter 3 Applications of digital watermarking 39; Chapter 4 Digital watermarking for still images 55; Chapter 5 Digital watermarking for audio data 75; Chapter 6 Digital watermarking for other media 115; Chapter 7 Attack and benchmarks of digital watermarking systems 147; Chapter 8 Other content protection mechanisms 193; Chapter 9 Integrated content protection solutions 211; Chapter 10 Conclusion 245.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This unique easy-to-use software is an integration of tools and simulators that help you solve the most common feedforward predistorted amplifier design equations, including calculating gain and loop balance, optimum coupling ratios, and more. It includes the tools you need everyday, such as a microstrip calculator and parallel coupler designer, to relieve you of lengthy calculations and help you predict the performance of a complex amplifier before all the blocks are together.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Digital watermarking.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2002000575</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85035859</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Tatouage numérique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">digital watermarking.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Digital watermarking</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schmucker, Martin.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wolthusen, Stephen D.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Arnold, Michael (Michael Konrad), 1964-</subfield><subfield code="t">Techniques and applications of digital watermarking and content protection.</subfield><subfield code="d">Boston : Artech House, ©2003</subfield><subfield code="z">1580531113</subfield><subfield code="w">(DLC) 2003049577</subfield><subfield code="w">(OCoLC)52109682</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Artech House computer security series.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no00015115</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=98859</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH20050073</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00003512</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL227587</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">98859</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">IEEE</subfield><subfield code="b">IEEE</subfield><subfield code="n">9100612</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2358692</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm53206644 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:15:29Z |
institution | BVB |
isbn | 1580536646 9781580536646 9781580531115 1580531113 |
language | English |
oclc_num | 53206644 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xv, 274 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Artech House, |
record_format | marc |
series | Artech House computer security series. |
series2 | Artech House computer security series |
spelling | Arnold, Michael (Michael Konrad), 1964- https://id.oclc.org/worldcat/entity/E39PBJjxtJrjWK467HT4w6YwYP http://id.loc.gov/authorities/names/n2003002401 Techniques and applications of digital watermarking and content protection / Michael Arnold, Martin Schmucker, Stephen D. Wolthusen. Digital watermarking and content protection Boston : Artech House, ©2003. 1 online resource (xv, 274 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier data file Artech House computer security series Includes bibliographical references and index. Techniques and Applications of Digital Watermarking and Content Protection; Contents vii; Preface xiii; Acknowledgments xv; Chapter 1 Introduction 1; Chapter 2 Digital Watermarking 15; Chapter 3 Applications of digital watermarking 39; Chapter 4 Digital watermarking for still images 55; Chapter 5 Digital watermarking for audio data 75; Chapter 6 Digital watermarking for other media 115; Chapter 7 Attack and benchmarks of digital watermarking systems 147; Chapter 8 Other content protection mechanisms 193; Chapter 9 Integrated content protection solutions 211; Chapter 10 Conclusion 245. This unique easy-to-use software is an integration of tools and simulators that help you solve the most common feedforward predistorted amplifier design equations, including calculating gain and loop balance, optimum coupling ratios, and more. It includes the tools you need everyday, such as a microstrip calculator and parallel coupler designer, to relieve you of lengthy calculations and help you predict the performance of a complex amplifier before all the blocks are together. Print version record. Computer security. Digital watermarking. http://id.loc.gov/authorities/subjects/sh2002000575 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Tatouage numérique. Protection de l'information (Informatique) digital watermarking. aat COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Data protection fast Digital watermarking fast Schmucker, Martin. Wolthusen, Stephen D. Print version: Arnold, Michael (Michael Konrad), 1964- Techniques and applications of digital watermarking and content protection. Boston : Artech House, ©2003 1580531113 (DLC) 2003049577 (OCoLC)52109682 Artech House computer security series. http://id.loc.gov/authorities/names/no00015115 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=98859 Volltext |
spellingShingle | Arnold, Michael (Michael Konrad), 1964- Techniques and applications of digital watermarking and content protection / Artech House computer security series. Techniques and Applications of Digital Watermarking and Content Protection; Contents vii; Preface xiii; Acknowledgments xv; Chapter 1 Introduction 1; Chapter 2 Digital Watermarking 15; Chapter 3 Applications of digital watermarking 39; Chapter 4 Digital watermarking for still images 55; Chapter 5 Digital watermarking for audio data 75; Chapter 6 Digital watermarking for other media 115; Chapter 7 Attack and benchmarks of digital watermarking systems 147; Chapter 8 Other content protection mechanisms 193; Chapter 9 Integrated content protection solutions 211; Chapter 10 Conclusion 245. Computer security. Digital watermarking. http://id.loc.gov/authorities/subjects/sh2002000575 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Tatouage numérique. Protection de l'information (Informatique) digital watermarking. aat COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Data protection fast Digital watermarking fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2002000575 http://id.loc.gov/authorities/subjects/sh85035859 https://id.nlm.nih.gov/mesh/D016494 |
title | Techniques and applications of digital watermarking and content protection / |
title_alt | Digital watermarking and content protection |
title_auth | Techniques and applications of digital watermarking and content protection / |
title_exact_search | Techniques and applications of digital watermarking and content protection / |
title_full | Techniques and applications of digital watermarking and content protection / Michael Arnold, Martin Schmucker, Stephen D. Wolthusen. |
title_fullStr | Techniques and applications of digital watermarking and content protection / Michael Arnold, Martin Schmucker, Stephen D. Wolthusen. |
title_full_unstemmed | Techniques and applications of digital watermarking and content protection / Michael Arnold, Martin Schmucker, Stephen D. Wolthusen. |
title_short | Techniques and applications of digital watermarking and content protection / |
title_sort | techniques and applications of digital watermarking and content protection |
topic | Computer security. Digital watermarking. http://id.loc.gov/authorities/subjects/sh2002000575 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Tatouage numérique. Protection de l'information (Informatique) digital watermarking. aat COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Data protection fast Digital watermarking fast |
topic_facet | Computer security. Digital watermarking. Data protection. Computer Security Sécurité informatique. Tatouage numérique. Protection de l'information (Informatique) digital watermarking. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer security Data protection Digital watermarking |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=98859 |
work_keys_str_mv | AT arnoldmichael techniquesandapplicationsofdigitalwatermarkingandcontentprotection AT schmuckermartin techniquesandapplicationsofdigitalwatermarkingandcontentprotection AT wolthusenstephend techniquesandapplicationsofdigitalwatermarkingandcontentprotection AT arnoldmichael digitalwatermarkingandcontentprotection AT schmuckermartin digitalwatermarkingandcontentprotection AT wolthusenstephend digitalwatermarkingandcontentprotection |