Techniques and applications of digital watermarking and content protection:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston
Artech House
©2003
|
Schriftenreihe: | Artech House computer security series
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references and index Techniques and Applications of Digital Watermarking and Content Protection; Contents vii; Preface xiii; Acknowledgments xv; Chapter 1 Introduction 1; Chapter 2 Digital Watermarking 15; Chapter 3 Applications of digital watermarking 39; Chapter 4 Digital watermarking for still images 55; Chapter 5 Digital watermarking for audio data 75; Chapter 6 Digital watermarking for other media 115; Chapter 7 Attack and benchmarks of digital watermarking systems 147; Chapter 8 Other content protection mechanisms 193; Chapter 9 Integrated content protection solutions 211; Chapter 10 Conclusion 245 This unique easy-to-use software is an integration of tools and simulators that help you solve the most common feedforward predistorted amplifier design equations, including calculating gain and loop balance, optimum coupling ratios, and more. It includes the tools you need everyday, such as a microstrip calculator and parallel coupler designer, to relieve you of lengthy calculations and help you predict the performance of a complex amplifier before all the blocks are together |
Beschreibung: | 1 Online-Ressource (xv, 274 pages) |
ISBN: | 1580531113 1580536646 9781580531115 9781580536646 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043100466 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2003 |||| o||u| ||||||eng d | ||
020 | |a 1580531113 |c alk. paper |9 1-58053-111-3 | ||
020 | |a 1580536646 |c electronic bk. |9 1-58053-664-6 | ||
020 | |a 9781580531115 |c alk. paper |9 978-1-58053-111-5 | ||
020 | |a 9781580536646 |c electronic bk. |9 978-1-58053-664-6 | ||
035 | |a (OCoLC)53206644 | ||
035 | |a (DE-599)BVBBV043100466 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Arnold, Michael, (Michael Konrad) |e Verfasser |4 aut | |
245 | 1 | 0 | |a Techniques and applications of digital watermarking and content protection |c Michael Arnold, Martin Schmucker, Stephen D. Wolthusen |
246 | 1 | 3 | |a Digital watermarking and content protection |
264 | 1 | |a Boston |b Artech House |c ©2003 | |
300 | |a 1 Online-Ressource (xv, 274 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Artech House computer security series | |
500 | |a Includes bibliographical references and index | ||
500 | |a Techniques and Applications of Digital Watermarking and Content Protection; Contents vii; Preface xiii; Acknowledgments xv; Chapter 1 Introduction 1; Chapter 2 Digital Watermarking 15; Chapter 3 Applications of digital watermarking 39; Chapter 4 Digital watermarking for still images 55; Chapter 5 Digital watermarking for audio data 75; Chapter 6 Digital watermarking for other media 115; Chapter 7 Attack and benchmarks of digital watermarking systems 147; Chapter 8 Other content protection mechanisms 193; Chapter 9 Integrated content protection solutions 211; Chapter 10 Conclusion 245 | ||
500 | |a This unique easy-to-use software is an integration of tools and simulators that help you solve the most common feedforward predistorted amplifier design equations, including calculating gain and loop balance, optimum coupling ratios, and more. It includes the tools you need everyday, such as a microstrip calculator and parallel coupler designer, to relieve you of lengthy calculations and help you predict the performance of a complex amplifier before all the blocks are together | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Digital watermarking |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Digital watermarking | |
650 | 4 | |a Data protection | |
700 | 1 | |a Schmucker, Martin |e Sonstige |4 oth | |
700 | 1 | |a Wolthusen, Stephen D. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=98859 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028524658 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=98859 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=98859 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175509951610880 |
---|---|
any_adam_object | |
author | Arnold, Michael, (Michael Konrad) |
author_facet | Arnold, Michael, (Michael Konrad) |
author_role | aut |
author_sort | Arnold, Michael, (Michael Konrad) |
author_variant | m m k a mmk mmka |
building | Verbundindex |
bvnumber | BV043100466 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)53206644 (DE-599)BVBBV043100466 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03301nmm a2200541zc 4500</leader><controlfield tag="001">BV043100466</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2003 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1580531113</subfield><subfield code="c">alk. paper</subfield><subfield code="9">1-58053-111-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1580536646</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-58053-664-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781580531115</subfield><subfield code="c">alk. paper</subfield><subfield code="9">978-1-58053-111-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781580536646</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-58053-664-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)53206644</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043100466</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Arnold, Michael, (Michael Konrad)</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Techniques and applications of digital watermarking and content protection</subfield><subfield code="c">Michael Arnold, Martin Schmucker, Stephen D. Wolthusen</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Digital watermarking and content protection</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Artech House</subfield><subfield code="c">©2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xv, 274 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Artech House computer security series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Techniques and Applications of Digital Watermarking and Content Protection; Contents vii; Preface xiii; Acknowledgments xv; Chapter 1 Introduction 1; Chapter 2 Digital Watermarking 15; Chapter 3 Applications of digital watermarking 39; Chapter 4 Digital watermarking for still images 55; Chapter 5 Digital watermarking for audio data 75; Chapter 6 Digital watermarking for other media 115; Chapter 7 Attack and benchmarks of digital watermarking systems 147; Chapter 8 Other content protection mechanisms 193; Chapter 9 Integrated content protection solutions 211; Chapter 10 Conclusion 245</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This unique easy-to-use software is an integration of tools and simulators that help you solve the most common feedforward predistorted amplifier design equations, including calculating gain and loop balance, optimum coupling ratios, and more. It includes the tools you need everyday, such as a microstrip calculator and parallel coupler designer, to relieve you of lengthy calculations and help you predict the performance of a complex amplifier before all the blocks are together</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Digital watermarking</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Digital watermarking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schmucker, Martin</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wolthusen, Stephen D.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=98859</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028524658</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=98859</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=98859</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043100466 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:26Z |
institution | BVB |
isbn | 1580531113 1580536646 9781580531115 9781580536646 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028524658 |
oclc_num | 53206644 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xv, 274 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Artech House |
record_format | marc |
series2 | Artech House computer security series |
spelling | Arnold, Michael, (Michael Konrad) Verfasser aut Techniques and applications of digital watermarking and content protection Michael Arnold, Martin Schmucker, Stephen D. Wolthusen Digital watermarking and content protection Boston Artech House ©2003 1 Online-Ressource (xv, 274 pages) txt rdacontent c rdamedia cr rdacarrier Artech House computer security series Includes bibliographical references and index Techniques and Applications of Digital Watermarking and Content Protection; Contents vii; Preface xiii; Acknowledgments xv; Chapter 1 Introduction 1; Chapter 2 Digital Watermarking 15; Chapter 3 Applications of digital watermarking 39; Chapter 4 Digital watermarking for still images 55; Chapter 5 Digital watermarking for audio data 75; Chapter 6 Digital watermarking for other media 115; Chapter 7 Attack and benchmarks of digital watermarking systems 147; Chapter 8 Other content protection mechanisms 193; Chapter 9 Integrated content protection solutions 211; Chapter 10 Conclusion 245 This unique easy-to-use software is an integration of tools and simulators that help you solve the most common feedforward predistorted amplifier design equations, including calculating gain and loop balance, optimum coupling ratios, and more. It includes the tools you need everyday, such as a microstrip calculator and parallel coupler designer, to relieve you of lengthy calculations and help you predict the performance of a complex amplifier before all the blocks are together COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Data protection fast Digital watermarking fast Computer security Digital watermarking Data protection Schmucker, Martin Sonstige oth Wolthusen, Stephen D. Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=98859 Aggregator Volltext |
spellingShingle | Arnold, Michael, (Michael Konrad) Techniques and applications of digital watermarking and content protection COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Data protection fast Digital watermarking fast Computer security Digital watermarking Data protection |
title | Techniques and applications of digital watermarking and content protection |
title_alt | Digital watermarking and content protection |
title_auth | Techniques and applications of digital watermarking and content protection |
title_exact_search | Techniques and applications of digital watermarking and content protection |
title_full | Techniques and applications of digital watermarking and content protection Michael Arnold, Martin Schmucker, Stephen D. Wolthusen |
title_fullStr | Techniques and applications of digital watermarking and content protection Michael Arnold, Martin Schmucker, Stephen D. Wolthusen |
title_full_unstemmed | Techniques and applications of digital watermarking and content protection Michael Arnold, Martin Schmucker, Stephen D. Wolthusen |
title_short | Techniques and applications of digital watermarking and content protection |
title_sort | techniques and applications of digital watermarking and content protection |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Data protection fast Digital watermarking fast Computer security Digital watermarking Data protection |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security Data protection Digital watermarking |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=98859 |
work_keys_str_mv | AT arnoldmichaelmichaelkonrad techniquesandapplicationsofdigitalwatermarkingandcontentprotection AT schmuckermartin techniquesandapplicationsofdigitalwatermarkingandcontentprotection AT wolthusenstephend techniquesandapplicationsofdigitalwatermarkingandcontentprotection AT arnoldmichaelmichaelkonrad digitalwatermarkingandcontentprotection AT schmuckermartin digitalwatermarkingandcontentprotection AT wolthusenstephend digitalwatermarkingandcontentprotection |