Intelligent watermarking techniques:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
River Edge, N.J.
World Scientific
2004
|
Schriftenreihe: | Series on innovative intelligence
v. 7 |
Schlagworte: | |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (1 volume (various pagings)) illustrations |
ISBN: | 9812562524 9789812562524 9789812389558 9812389555 9789812387578 9812387579 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV045341253 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181206s2004 |||| o||u| ||||||eng d | ||
020 | |a 9812562524 |9 981-256-252-4 | ||
020 | |a 9789812562524 |9 978-981-256-252-4 | ||
020 | |a 9789812389558 |9 978-981-238-955-8 | ||
020 | |a 9812389555 |9 981-238-955-5 | ||
020 | |a 9789812387578 |9 978-981-238-757-8 | ||
020 | |a 9812387579 |9 981-238-757-9 | ||
035 | |a (ZDB-4-ENC)ocm60410418 | ||
035 | |a (OCoLC)60410418 | ||
035 | |a (DE-599)BVBBV045341253 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8/2 |2 22 | |
245 | 1 | 0 | |a Intelligent watermarking techniques |c editors, Jeng-Shyang Pan, Hsiang-Cheh Huang, Lakhmi C. Jain |
264 | 1 | |a River Edge, N.J. |b World Scientific |c 2004 | |
300 | |a 1 online resource (1 volume (various pagings)) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Series on innovative intelligence |v v. 7 | |
500 | |a Print version record | ||
505 | 8 | |a Watermarking techniques involve the concealment of information withina text or images and the transmission of this information to thereceiver with minimum distortion. This is a very new area ofresearch. The techniques will have a significant effect on defence, business, copyright protection and other fields where informationneeds to be protected at all costs from attackers. This book presents the recent advances in the theory andimplementation of watermarking techniques. It brings together, for thefirst time, the successful applications of intelligent paradigms(including comparisons with convent | |
600 | 1 | 7 | |a Kogan, Jan I. |d 1958-2003 |0 (DE-588)130568600 |2 gnd |9 rswk-swf |
650 | 7 | |a COMPUTERS / Security / Cryptography |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Cryptography |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Digital watermarking |2 fast | |
650 | 4 | |a Digital watermarking |a Watermarks |x Data processing |a Cryptography |a Computer security |a Data protection | |
650 | 0 | 7 | |a Feldtheorie |0 (DE-588)4016698-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Stringtheorie |0 (DE-588)4224278-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Kogan, Jan I. |d 1958-2003 |0 (DE-588)130568600 |D p |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Stringtheorie |0 (DE-588)4224278-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Feldtheorie |0 (DE-588)4016698-3 |D s |
689 | 2 | |5 DE-604 | |
700 | 1 | |a Pan, Jeng-Shyang |e Sonstige |4 oth | |
700 | 1 | |a Huang, Hsiang-Cheh |e Sonstige |4 oth | |
700 | 1 | |a Jain, L. C. |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |t Intelligent watermarking techniques |d River Edge, N.J. : World Scientific, 2004 |z 9812389555 |z 9812387579 |
912 | |a ZDB-4-ENC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030727956 |
Datensatz im Suchindex
_version_ | 1804179157756674048 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV045341253 |
collection | ZDB-4-ENC |
contents | Watermarking techniques involve the concealment of information withina text or images and the transmission of this information to thereceiver with minimum distortion. This is a very new area ofresearch. The techniques will have a significant effect on defence, business, copyright protection and other fields where informationneeds to be protected at all costs from attackers. This book presents the recent advances in the theory andimplementation of watermarking techniques. It brings together, for thefirst time, the successful applications of intelligent paradigms(including comparisons with convent |
ctrlnum | (ZDB-4-ENC)ocm60410418 (OCoLC)60410418 (DE-599)BVBBV045341253 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02899nmm a2200601zcb4500</leader><controlfield tag="001">BV045341253</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181206s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9812562524</subfield><subfield code="9">981-256-252-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789812562524</subfield><subfield code="9">978-981-256-252-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789812389558</subfield><subfield code="9">978-981-238-955-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9812389555</subfield><subfield code="9">981-238-955-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789812387578</subfield><subfield code="9">978-981-238-757-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9812387579</subfield><subfield code="9">981-238-757-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ENC)ocm60410418</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)60410418</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045341253</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Intelligent watermarking techniques</subfield><subfield code="c">editors, Jeng-Shyang Pan, Hsiang-Cheh Huang, Lakhmi C. Jain</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">River Edge, N.J.</subfield><subfield code="b">World Scientific</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume (various pagings))</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Series on innovative intelligence</subfield><subfield code="v">v. 7</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Watermarking techniques involve the concealment of information withina text or images and the transmission of this information to thereceiver with minimum distortion. This is a very new area ofresearch. The techniques will have a significant effect on defence, business, copyright protection and other fields where informationneeds to be protected at all costs from attackers. This book presents the recent advances in the theory andimplementation of watermarking techniques. It brings together, for thefirst time, the successful applications of intelligent paradigms(including comparisons with convent</subfield></datafield><datafield tag="600" ind1="1" ind2="7"><subfield code="a">Kogan, Jan I.</subfield><subfield code="d">1958-2003</subfield><subfield code="0">(DE-588)130568600</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Cryptography</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Digital watermarking</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Digital watermarking</subfield><subfield code="a">Watermarks</subfield><subfield code="x">Data processing</subfield><subfield code="a">Cryptography</subfield><subfield code="a">Computer security</subfield><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Feldtheorie</subfield><subfield code="0">(DE-588)4016698-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Stringtheorie</subfield><subfield code="0">(DE-588)4224278-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kogan, Jan I.</subfield><subfield code="d">1958-2003</subfield><subfield code="0">(DE-588)130568600</subfield><subfield code="D">p</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Stringtheorie</subfield><subfield code="0">(DE-588)4224278-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Feldtheorie</subfield><subfield code="0">(DE-588)4016698-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pan, Jeng-Shyang</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Huang, Hsiang-Cheh</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jain, L. C.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="t">Intelligent watermarking techniques</subfield><subfield code="d">River Edge, N.J. : World Scientific, 2004</subfield><subfield code="z">9812389555</subfield><subfield code="z">9812387579</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ENC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030727956</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV045341253 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:24Z |
institution | BVB |
isbn | 9812562524 9789812562524 9789812389558 9812389555 9789812387578 9812387579 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030727956 |
oclc_num | 60410418 |
open_access_boolean | |
physical | 1 online resource (1 volume (various pagings)) illustrations |
psigel | ZDB-4-ENC |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | World Scientific |
record_format | marc |
series2 | Series on innovative intelligence |
spelling | Intelligent watermarking techniques editors, Jeng-Shyang Pan, Hsiang-Cheh Huang, Lakhmi C. Jain River Edge, N.J. World Scientific 2004 1 online resource (1 volume (various pagings)) illustrations txt rdacontent c rdamedia cr rdacarrier Series on innovative intelligence v. 7 Print version record Watermarking techniques involve the concealment of information withina text or images and the transmission of this information to thereceiver with minimum distortion. This is a very new area ofresearch. The techniques will have a significant effect on defence, business, copyright protection and other fields where informationneeds to be protected at all costs from attackers. This book presents the recent advances in the theory andimplementation of watermarking techniques. It brings together, for thefirst time, the successful applications of intelligent paradigms(including comparisons with convent Kogan, Jan I. 1958-2003 (DE-588)130568600 gnd rswk-swf COMPUTERS / Security / Cryptography bisacsh Computer security fast Cryptography fast Data protection fast Digital watermarking fast Digital watermarking Watermarks Data processing Cryptography Computer security Data protection Feldtheorie (DE-588)4016698-3 gnd rswk-swf Stringtheorie (DE-588)4224278-2 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Kogan, Jan I. 1958-2003 (DE-588)130568600 p DE-604 Stringtheorie (DE-588)4224278-2 s Feldtheorie (DE-588)4016698-3 s Pan, Jeng-Shyang Sonstige oth Huang, Hsiang-Cheh Sonstige oth Jain, L. C. Sonstige oth Erscheint auch als Druck-Ausgabe Intelligent watermarking techniques River Edge, N.J. : World Scientific, 2004 9812389555 9812387579 |
spellingShingle | Intelligent watermarking techniques Watermarking techniques involve the concealment of information withina text or images and the transmission of this information to thereceiver with minimum distortion. This is a very new area ofresearch. The techniques will have a significant effect on defence, business, copyright protection and other fields where informationneeds to be protected at all costs from attackers. This book presents the recent advances in the theory andimplementation of watermarking techniques. It brings together, for thefirst time, the successful applications of intelligent paradigms(including comparisons with convent Kogan, Jan I. 1958-2003 (DE-588)130568600 gnd COMPUTERS / Security / Cryptography bisacsh Computer security fast Cryptography fast Data protection fast Digital watermarking fast Digital watermarking Watermarks Data processing Cryptography Computer security Data protection Feldtheorie (DE-588)4016698-3 gnd Stringtheorie (DE-588)4224278-2 gnd |
subject_GND | (DE-588)130568600 (DE-588)4016698-3 (DE-588)4224278-2 (DE-588)4143413-4 |
title | Intelligent watermarking techniques |
title_auth | Intelligent watermarking techniques |
title_exact_search | Intelligent watermarking techniques |
title_full | Intelligent watermarking techniques editors, Jeng-Shyang Pan, Hsiang-Cheh Huang, Lakhmi C. Jain |
title_fullStr | Intelligent watermarking techniques editors, Jeng-Shyang Pan, Hsiang-Cheh Huang, Lakhmi C. Jain |
title_full_unstemmed | Intelligent watermarking techniques editors, Jeng-Shyang Pan, Hsiang-Cheh Huang, Lakhmi C. Jain |
title_short | Intelligent watermarking techniques |
title_sort | intelligent watermarking techniques |
topic | Kogan, Jan I. 1958-2003 (DE-588)130568600 gnd COMPUTERS / Security / Cryptography bisacsh Computer security fast Cryptography fast Data protection fast Digital watermarking fast Digital watermarking Watermarks Data processing Cryptography Computer security Data protection Feldtheorie (DE-588)4016698-3 gnd Stringtheorie (DE-588)4224278-2 gnd |
topic_facet | Kogan, Jan I. 1958-2003 COMPUTERS / Security / Cryptography Computer security Cryptography Data protection Digital watermarking Digital watermarking Watermarks Data processing Cryptography Computer security Data protection Feldtheorie Stringtheorie Aufsatzsammlung |
work_keys_str_mv | AT panjengshyang intelligentwatermarkingtechniques AT huanghsiangcheh intelligentwatermarkingtechniques AT jainlc intelligentwatermarkingtechniques |