Multimedia security: steganography and digital watermarking techniques for protection of intellectual property
Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained study towards an effective and practical system. This book explores th...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pa
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
c2005
|
Schlagworte: | |
Online-Zugang: | DE-898 DE-706 DE-1050 DE-1049 DE-83 URL des Erstveröffentlichers |
Zusammenfassung: | Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained study towards an effective and practical system. This book explores the myriad of issues regarding multimedia security, including perceptual fidelity analysis, image, audio, and 3D mesh object watermarking, medical watermarking, error detection (authentication) and concealment, fingerprinting, digital signature and digital right management |
Beschreibung: | Includes bibliographical references and index. - Title from ebook home page (viewed on July 7, 2010) |
Beschreibung: | 1 Online-Ressource (electronic texts (viii, 255 p. ill.)) digital files |
DOI: | 10.4018/978-1-59140-192-6 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047945171 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 220419s2005 |||| o||u| ||||||eng d | ||
024 | 7 | |a 10.4018/978-1-59140-192-6 |2 doi | |
035 | |a (ZDB-1-IGE)068999054 | ||
035 | |a (OCoLC)1312692138 | ||
035 | |a (DE-599)BVBBV047945171 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-898 |a DE-706 |a DE-1050 |a DE-1049 |a DE-83 | ||
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Multimedia security |b steganography and digital watermarking techniques for protection of intellectual property |c Chun-Shien Lu |
264 | 1 | |a Hershey, Pa |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |c c2005 | |
300 | |a 1 Online-Ressource (electronic texts (viii, 255 p. ill.)) |b digital files | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Title from ebook home page (viewed on July 7, 2010) | ||
520 | |a Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained study towards an effective and practical system. This book explores the myriad of issues regarding multimedia security, including perceptual fidelity analysis, image, audio, and 3D mesh object watermarking, medical watermarking, error detection (authentication) and concealment, fingerprinting, digital signature and digital right management | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Multimedia systems |x Security measures | |
650 | 4 | |a Intellectual property | |
700 | 1 | |a Lu, Chun-Shien |4 ctb | |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-59140-192-6 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-1-IGE |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-033326601 | |
966 | e | |u https://doi.org/10.4018/978-1-59140-192-6 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59140-192-6 |l DE-706 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59140-192-6 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59140-192-6 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59140-192-6 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1808138582529933312 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Lu, Chun-Shien |
author2_role | ctb |
author2_variant | c s l csl |
author_facet | Lu, Chun-Shien |
building | Verbundindex |
bvnumber | BV047945171 |
collection | ZDB-1-IGE ZDB-98-IGB |
ctrlnum | (ZDB-1-IGE)068999054 (OCoLC)1312692138 (DE-599)BVBBV047945171 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.4018/978-1-59140-192-6 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV047945171</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220419s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-59140-192-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-1-IGE)068999054</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1312692138</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047945171</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Multimedia security</subfield><subfield code="b">steganography and digital watermarking techniques for protection of intellectual property</subfield><subfield code="c">Chun-Shien Lu</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pa</subfield><subfield code="b">IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)</subfield><subfield code="c">c2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (electronic texts (viii, 255 p. ill.))</subfield><subfield code="b">digital files</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Title from ebook home page (viewed on July 7, 2010)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained study towards an effective and practical system. This book explores the myriad of issues regarding multimedia security, including perceptual fidelity analysis, image, audio, and 3D mesh object watermarking, medical watermarking, error detection (authentication) and concealment, fingerprinting, digital signature and digital right management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Multimedia systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intellectual property</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lu, Chun-Shien</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-59140-192-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033326601</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59140-192-6</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59140-192-6</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59140-192-6</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59140-192-6</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59140-192-6</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047945171 |
illustrated | Not Illustrated |
index_date | 2024-07-03T19:36:12Z |
indexdate | 2024-08-23T01:08:46Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033326601 |
oclc_num | 1312692138 |
open_access_boolean | |
owner | DE-898 DE-BY-UBR DE-706 DE-1050 DE-1049 DE-83 |
owner_facet | DE-898 DE-BY-UBR DE-706 DE-1050 DE-1049 DE-83 |
physical | 1 Online-Ressource (electronic texts (viii, 255 p. ill.)) digital files |
psigel | ZDB-1-IGE ZDB-98-IGB ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |
record_format | marc |
spelling | Multimedia security steganography and digital watermarking techniques for protection of intellectual property Chun-Shien Lu Hershey, Pa IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) c2005 1 Online-Ressource (electronic texts (viii, 255 p. ill.)) digital files txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index. - Title from ebook home page (viewed on July 7, 2010) Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained study towards an effective and practical system. This book explores the myriad of issues regarding multimedia security, including perceptual fidelity analysis, image, audio, and 3D mesh object watermarking, medical watermarking, error detection (authentication) and concealment, fingerprinting, digital signature and digital right management Computer security Multimedia systems Security measures Intellectual property Lu, Chun-Shien ctb https://doi.org/10.4018/978-1-59140-192-6 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Multimedia security steganography and digital watermarking techniques for protection of intellectual property Computer security Multimedia systems Security measures Intellectual property |
title | Multimedia security steganography and digital watermarking techniques for protection of intellectual property |
title_auth | Multimedia security steganography and digital watermarking techniques for protection of intellectual property |
title_exact_search | Multimedia security steganography and digital watermarking techniques for protection of intellectual property |
title_exact_search_txtP | Multimedia security steganography and digital watermarking techniques for protection of intellectual property |
title_full | Multimedia security steganography and digital watermarking techniques for protection of intellectual property Chun-Shien Lu |
title_fullStr | Multimedia security steganography and digital watermarking techniques for protection of intellectual property Chun-Shien Lu |
title_full_unstemmed | Multimedia security steganography and digital watermarking techniques for protection of intellectual property Chun-Shien Lu |
title_short | Multimedia security |
title_sort | multimedia security steganography and digital watermarking techniques for protection of intellectual property |
title_sub | steganography and digital watermarking techniques for protection of intellectual property |
topic | Computer security Multimedia systems Security measures Intellectual property |
topic_facet | Computer security Multimedia systems Security measures Intellectual property |
url | https://doi.org/10.4018/978-1-59140-192-6 |
work_keys_str_mv | AT luchunshien multimediasecuritysteganographyanddigitalwatermarkingtechniquesforprotectionofintellectualproperty |