Digital watermarking and steganography:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Amsterdam
Morgan Kaufmann Publishers
© 2008
|
Ausgabe: | 2nd ed |
Schriftenreihe: | Morgan Kaufmann series in multimedia information and systems
|
Schlagworte: | |
Online-Zugang: | UER01 Volltext |
Beschreibung: | Prev. ed. entered under Cox Includes bibliographical references (pages 549-574) and index Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition |
Beschreibung: | 1 Online-Ressource (xxviii, 593 pages) |
ISBN: | 9780080555805 9780123725851 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042305683 | ||
003 | DE-604 | ||
005 | 20191119 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2008 |||| o||u| ||||||eng d | ||
020 | |a 9780080555805 |c electronic bk. |9 978-0-08-055580-5 | ||
020 | |a 9780123725851 |c casebound : alk. paper |9 978-0-12-372585-1 | ||
035 | |a (ZDB-33-EBS)ocn190760116 | ||
035 | |a (OCoLC)190760116 | ||
035 | |a (DE-599)BVBBV042305683 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-29 | ||
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Digital watermarking and steganography |c Ingemar J. Cox [and others] |
250 | |a 2nd ed | ||
264 | 1 | |a Amsterdam |b Morgan Kaufmann Publishers |c © 2008 | |
300 | |a 1 Online-Ressource (xxviii, 593 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Morgan Kaufmann series in multimedia information and systems | |
500 | |a Prev. ed. entered under Cox | ||
500 | |a Includes bibliographical references (pages 549-574) and index | ||
500 | |a Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Digital watermarking |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Digital watermarking | |
650 | 4 | |a Data protection | |
700 | 1 | |a Cox, I. J. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780123725851 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027742675 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9780123725851 |l UER01 |p ZDB-33-EBS |q UER_PDA_EBS_Kauf |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152889071894528 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV042305683 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-EBS)ocn190760116 (OCoLC)190760116 (DE-599)BVBBV042305683 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02475nmm a2200517zc 4500</leader><controlfield tag="001">BV042305683</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20191119 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080555805</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-055580-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780123725851</subfield><subfield code="c">casebound : alk. paper</subfield><subfield code="9">978-0-12-372585-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn190760116</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)190760116</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042305683</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-29</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital watermarking and steganography</subfield><subfield code="c">Ingemar J. Cox [and others]</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Morgan Kaufmann Publishers</subfield><subfield code="c">© 2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxviii, 593 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Morgan Kaufmann series in multimedia information and systems</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Prev. ed. entered under Cox</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 549-574) and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Digital watermarking</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Digital watermarking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cox, I. J.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780123725851</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027742675</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780123725851</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-33-EBS</subfield><subfield code="q">UER_PDA_EBS_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042305683 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:53Z |
institution | BVB |
isbn | 9780080555805 9780123725851 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027742675 |
oclc_num | 190760116 |
open_access_boolean | |
owner | DE-1046 DE-29 |
owner_facet | DE-1046 DE-29 |
physical | 1 Online-Ressource (xxviii, 593 pages) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD ZDB-33-EBS UER_PDA_EBS_Kauf |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Morgan Kaufmann Publishers |
record_format | marc |
series2 | Morgan Kaufmann series in multimedia information and systems |
spelling | Digital watermarking and steganography Ingemar J. Cox [and others] 2nd ed Amsterdam Morgan Kaufmann Publishers © 2008 1 Online-Ressource (xxviii, 593 pages) txt rdacontent c rdamedia cr rdacarrier Morgan Kaufmann series in multimedia information and systems Prev. ed. entered under Cox Includes bibliographical references (pages 549-574) and index Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Data protection fast Digital watermarking fast Computer security Digital watermarking Data protection Cox, I. J. Sonstige oth http://www.sciencedirect.com/science/book/9780123725851 Verlag Volltext |
spellingShingle | Digital watermarking and steganography COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Data protection fast Digital watermarking fast Computer security Digital watermarking Data protection |
title | Digital watermarking and steganography |
title_auth | Digital watermarking and steganography |
title_exact_search | Digital watermarking and steganography |
title_full | Digital watermarking and steganography Ingemar J. Cox [and others] |
title_fullStr | Digital watermarking and steganography Ingemar J. Cox [and others] |
title_full_unstemmed | Digital watermarking and steganography Ingemar J. Cox [and others] |
title_short | Digital watermarking and steganography |
title_sort | digital watermarking and steganography |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Data protection fast Digital watermarking fast Computer security Digital watermarking Data protection |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security Data protection Digital watermarking |
url | http://www.sciencedirect.com/science/book/9780123725851 |
work_keys_str_mv | AT coxij digitalwatermarkingandsteganography |