Digital watermarking and steganography /:
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by lim...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Boston :
Morgan Kaufmann Publishers,
©2008.
|
Ausgabe: | 2nd ed. |
Schriftenreihe: | Morgan Kaufmann series in multimedia information and systems.
Morgan Kaufmann series in computer security. |
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 DE-862 DE-863 |
Zusammenfassung: | Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition. |
Beschreibung: | Prev. ed. entered under Cox. |
Beschreibung: | 1 online resource (xxviii, 593 pages :) |
Bibliographie: | Includes bibliographical references (pages 549-574) and index. |
ISBN: | 9780080555805 0080555802 9780123725851 0123725852 1281096164 9781281096166 9786611096168 6611096167 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn190760116 | ||
003 | OCoLC | ||
005 | 20240705115654.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 080111s2008 ne a ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d OCLCQ |d OSU |d DLC |d IG# |d IDEBK |d OCLCQ |d E7B |d OCLCQ |d UX0 |d MHW |d DKDLA |d OCLCQ |d B24X7 |d OCLCO |d OCLCQ |d OCLCF |d OCLCQ |d OPELS |d OTZ |d SFB |d NLGGC |d DEBSZ |d NNO |d OCLCQ |d AZK |d LOA |d JBG |d AGLDB |d MOR |d PIFAG |d ZCU |d MERUC |d OCLCQ |d U3W |d OCLCA |d STF |d WRM |d D6H |d OCLCQ |d VTS |d NRAMU |d ICG |d INT |d VT2 |d OCLCQ |d WYU |d YOU |d OCLCQ |d LEAUB |d DKC |d OCLCQ |d M8D |d UKCRE |d VLY |d OCLCQ |d OCLCO |d UAB |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d EZC | ||
019 | |a 227968408 |a 228148421 |a 259629025 |a 473204710 |a 647692085 |a 811614718 |a 961646589 |a 962678044 |a 966264703 |a 988433028 |a 992027148 |a 1034971300 |a 1037795566 |a 1038556185 |a 1045453793 |a 1055334056 |a 1065026188 |a 1077930711 |a 1081192116 |a 1153504375 |a 1161999289 |a 1228560321 |a 1256302362 |a 1417813783 | ||
020 | |a 9780080555805 |q (electronic bk.) | ||
020 | |a 0080555802 |q (electronic bk.) | ||
020 | |a 9780123725851 |q (casebound ; |q alk. paper) | ||
020 | |a 0123725852 |q (casebound ; |q alk. paper) | ||
020 | |a 1281096164 | ||
020 | |a 9781281096166 | ||
020 | |a 9786611096168 | ||
020 | |a 6611096167 | ||
035 | |a (OCoLC)190760116 |z (OCoLC)227968408 |z (OCoLC)228148421 |z (OCoLC)259629025 |z (OCoLC)473204710 |z (OCoLC)647692085 |z (OCoLC)811614718 |z (OCoLC)961646589 |z (OCoLC)962678044 |z (OCoLC)966264703 |z (OCoLC)988433028 |z (OCoLC)992027148 |z (OCoLC)1034971300 |z (OCoLC)1037795566 |z (OCoLC)1038556185 |z (OCoLC)1045453793 |z (OCoLC)1055334056 |z (OCoLC)1065026188 |z (OCoLC)1077930711 |z (OCoLC)1081192116 |z (OCoLC)1153504375 |z (OCoLC)1161999289 |z (OCoLC)1228560321 |z (OCoLC)1256302362 |z (OCoLC)1417813783 | ||
037 | |a 134566:134697 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a QA76.9.A25 |b C68 2008eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Digital watermarking and steganography / |c Ingemar J. Cox [and others]. |
250 | |a 2nd ed. | ||
260 | |a Amsterdam ; |a Boston : |b Morgan Kaufmann Publishers, |c ©2008. | ||
300 | |a 1 online resource (xxviii, 593 pages :) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a The Morgan Kaufmann series in multimedia information and systems | |
490 | 1 | |a The Morgan kaufmann series in computer security | |
500 | |a Prev. ed. entered under Cox. | ||
504 | |a Includes bibliographical references (pages 549-574) and index. | ||
505 | 0 | |a Front Cover; Digital Watermarking and Steganography; Copyright Page; Table of Contents; Preface to the First Edition; Preface to the Second Edition; Example Watermarking Systems; Chapter 1. Introduction; Chapter 2. Applications and Properties; Chapter 3. Models of Watermarking; Chapter 4. Basic Message Coding; Chapter 5. Watermarking with Side Information; Chapter 6. Practical Dirty-Paper Codes; Chapter 7. Analyzing Errors; Chapter 8. Using Perceptual Models; Chapter 9. Robust Watermarking; Chapter 10. Watermark Security; Chapter 11. Content Authentication; Chapter 12. Steganography. | |
520 | |a Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition. | ||
588 | 0 | |a Print version record. | |
546 | |a English. | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Digital watermarking. |0 http://id.loc.gov/authorities/subjects/sh2002000575 | |
650 | 0 | |a Data protection. |0 http://id.loc.gov/authorities/subjects/sh85035859 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Tatouage numérique. | |
650 | 6 | |a Protection de l'information (Informatique) | |
650 | 7 | |a digital watermarking. |2 aat | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Digital watermarking |2 fast | |
655 | 7 | |a dissertations. |2 aat | |
655 | 7 | |a Academic theses |2 fast | |
655 | 7 | |a Academic theses. |2 lcgft |0 http://id.loc.gov/authorities/genreForms/gf2014026039 | |
655 | 7 | |a Thèses et écrits académiques. |2 rvmgf | |
700 | 1 | |a Cox, I. J. |q (Ingemar J.) |0 http://id.loc.gov/authorities/names/n88229583 | |
758 | |i has work: |a Digital watermarking and steganography (Text) |1 https://id.oclc.org/worldcat/entity/E39PCG4hY8xYtPvX7rYk8MKgTd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Digital watermarking and steganography. |b 2nd ed. |d Amsterdam ; Boston : Morgan Kaufmann Publishers, ©2008 |z 9780123725851 |z 0123725852 |w (DLC) 2007040595 |w (OCoLC)173640977 |
830 | 0 | |a Morgan Kaufmann series in multimedia information and systems. |0 http://id.loc.gov/authorities/names/no96029044 | |
830 | 0 | |a Morgan Kaufmann series in computer security. |0 http://id.loc.gov/authorities/names/no2007139011 | |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9780123725851 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9780123725851 |3 Volltext |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214764 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214764 |3 Volltext |
938 | |a Books 24x7 |b B247 |n bks00028225 | ||
938 | |a ebrary |b EBRY |n ebr10204371 | ||
938 | |a EBSCOhost |b EBSC |n 214764 | ||
938 | |a Ingram |b INGR |n 9780123725851 | ||
938 | |a YBP Library Services |b YANK |n 2754820 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn190760116 |
---|---|
_version_ | 1826941581441105921 |
adam_text | |
any_adam_object | |
author2 | Cox, I. J. (Ingemar J.) |
author2_role | |
author2_variant | i j c ij ijc |
author_GND | http://id.loc.gov/authorities/names/n88229583 |
author_facet | Cox, I. J. (Ingemar J.) |
author_sort | Cox, I. J. |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 C68 2008eb |
callnumber-search | QA76.9.A25 C68 2008eb |
callnumber-sort | QA 276.9 A25 C68 42008EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Front Cover; Digital Watermarking and Steganography; Copyright Page; Table of Contents; Preface to the First Edition; Preface to the Second Edition; Example Watermarking Systems; Chapter 1. Introduction; Chapter 2. Applications and Properties; Chapter 3. Models of Watermarking; Chapter 4. Basic Message Coding; Chapter 5. Watermarking with Side Information; Chapter 6. Practical Dirty-Paper Codes; Chapter 7. Analyzing Errors; Chapter 8. Using Perceptual Models; Chapter 9. Robust Watermarking; Chapter 10. Watermark Security; Chapter 11. Content Authentication; Chapter 12. Steganography. |
ctrlnum | (OCoLC)190760116 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06047cam a2200865 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn190760116</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240705115654.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">080111s2008 ne a ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OSU</subfield><subfield code="d">DLC</subfield><subfield code="d">IG#</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UX0</subfield><subfield code="d">MHW</subfield><subfield code="d">DKDLA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">B24X7</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OPELS</subfield><subfield code="d">OTZ</subfield><subfield code="d">SFB</subfield><subfield code="d">NLGGC</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">NNO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">LOA</subfield><subfield code="d">JBG</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFAG</subfield><subfield code="d">ZCU</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">NRAMU</subfield><subfield code="d">ICG</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">YOU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LEAUB</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">UKCRE</subfield><subfield code="d">VLY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">UAB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">EZC</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">227968408</subfield><subfield code="a">228148421</subfield><subfield code="a">259629025</subfield><subfield code="a">473204710</subfield><subfield code="a">647692085</subfield><subfield code="a">811614718</subfield><subfield code="a">961646589</subfield><subfield code="a">962678044</subfield><subfield code="a">966264703</subfield><subfield code="a">988433028</subfield><subfield code="a">992027148</subfield><subfield code="a">1034971300</subfield><subfield code="a">1037795566</subfield><subfield code="a">1038556185</subfield><subfield code="a">1045453793</subfield><subfield code="a">1055334056</subfield><subfield code="a">1065026188</subfield><subfield code="a">1077930711</subfield><subfield code="a">1081192116</subfield><subfield code="a">1153504375</subfield><subfield code="a">1161999289</subfield><subfield code="a">1228560321</subfield><subfield code="a">1256302362</subfield><subfield code="a">1417813783</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080555805</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080555802</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780123725851</subfield><subfield code="q">(casebound ;</subfield><subfield code="q">alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0123725852</subfield><subfield code="q">(casebound ;</subfield><subfield code="q">alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281096164</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281096166</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611096168</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611096167</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)190760116</subfield><subfield code="z">(OCoLC)227968408</subfield><subfield code="z">(OCoLC)228148421</subfield><subfield code="z">(OCoLC)259629025</subfield><subfield code="z">(OCoLC)473204710</subfield><subfield code="z">(OCoLC)647692085</subfield><subfield code="z">(OCoLC)811614718</subfield><subfield code="z">(OCoLC)961646589</subfield><subfield code="z">(OCoLC)962678044</subfield><subfield code="z">(OCoLC)966264703</subfield><subfield code="z">(OCoLC)988433028</subfield><subfield code="z">(OCoLC)992027148</subfield><subfield code="z">(OCoLC)1034971300</subfield><subfield code="z">(OCoLC)1037795566</subfield><subfield code="z">(OCoLC)1038556185</subfield><subfield code="z">(OCoLC)1045453793</subfield><subfield code="z">(OCoLC)1055334056</subfield><subfield code="z">(OCoLC)1065026188</subfield><subfield code="z">(OCoLC)1077930711</subfield><subfield code="z">(OCoLC)1081192116</subfield><subfield code="z">(OCoLC)1153504375</subfield><subfield code="z">(OCoLC)1161999289</subfield><subfield code="z">(OCoLC)1228560321</subfield><subfield code="z">(OCoLC)1256302362</subfield><subfield code="z">(OCoLC)1417813783</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">134566:134697</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">C68 2008eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Digital watermarking and steganography /</subfield><subfield code="c">Ingemar J. Cox [and others].</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Boston :</subfield><subfield code="b">Morgan Kaufmann Publishers,</subfield><subfield code="c">©2008.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxviii, 593 pages :)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">The Morgan Kaufmann series in multimedia information and systems</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">The Morgan kaufmann series in computer security</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Prev. ed. entered under Cox.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 549-574) and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Front Cover; Digital Watermarking and Steganography; Copyright Page; Table of Contents; Preface to the First Edition; Preface to the Second Edition; Example Watermarking Systems; Chapter 1. Introduction; Chapter 2. Applications and Properties; Chapter 3. Models of Watermarking; Chapter 4. Basic Message Coding; Chapter 5. Watermarking with Side Information; Chapter 6. Practical Dirty-Paper Codes; Chapter 7. Analyzing Errors; Chapter 8. Using Perceptual Models; Chapter 9. Robust Watermarking; Chapter 10. Watermark Security; Chapter 11. Content Authentication; Chapter 12. Steganography.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Digital watermarking.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2002000575</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85035859</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Tatouage numérique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">digital watermarking.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Digital watermarking</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">dissertations.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Academic theses</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Academic theses.</subfield><subfield code="2">lcgft</subfield><subfield code="0">http://id.loc.gov/authorities/genreForms/gf2014026039</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Thèses et écrits académiques.</subfield><subfield code="2">rvmgf</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cox, I. J.</subfield><subfield code="q">(Ingemar J.)</subfield><subfield code="0">http://id.loc.gov/authorities/names/n88229583</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Digital watermarking and steganography (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCG4hY8xYtPvX7rYk8MKgTd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Digital watermarking and steganography.</subfield><subfield code="b">2nd ed.</subfield><subfield code="d">Amsterdam ; Boston : Morgan Kaufmann Publishers, ©2008</subfield><subfield code="z">9780123725851</subfield><subfield code="z">0123725852</subfield><subfield code="w">(DLC) 2007040595</subfield><subfield code="w">(OCoLC)173640977</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Morgan Kaufmann series in multimedia information and systems.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no96029044</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Morgan Kaufmann series in computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007139011</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9780123725851</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9780123725851</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214764</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214764</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00028225</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10204371</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">214764</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Ingram</subfield><subfield code="b">INGR</subfield><subfield code="n">9780123725851</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2754820</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | dissertations. aat Academic theses fast Academic theses. lcgft http://id.loc.gov/authorities/genreForms/gf2014026039 Thèses et écrits académiques. rvmgf |
genre_facet | dissertations. Academic theses Academic theses. Thèses et écrits académiques. |
id | ZDB-4-EBA-ocn190760116 |
illustrated | Illustrated |
indexdate | 2025-03-18T14:14:23Z |
institution | BVB |
isbn | 9780080555805 0080555802 9780123725851 0123725852 1281096164 9781281096166 9786611096168 6611096167 |
language | English |
oclc_num | 190760116 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource (xxviii, 593 pages :) |
psigel | ZDB-4-EBA FWS_PDA_EBA ZDB-4-EBA |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Morgan Kaufmann Publishers, |
record_format | marc |
series | Morgan Kaufmann series in multimedia information and systems. Morgan Kaufmann series in computer security. |
series2 | The Morgan Kaufmann series in multimedia information and systems The Morgan kaufmann series in computer security |
spelling | Digital watermarking and steganography / Ingemar J. Cox [and others]. 2nd ed. Amsterdam ; Boston : Morgan Kaufmann Publishers, ©2008. 1 online resource (xxviii, 593 pages :) text txt rdacontent computer c rdamedia online resource cr rdacarrier The Morgan Kaufmann series in multimedia information and systems The Morgan kaufmann series in computer security Prev. ed. entered under Cox. Includes bibliographical references (pages 549-574) and index. Front Cover; Digital Watermarking and Steganography; Copyright Page; Table of Contents; Preface to the First Edition; Preface to the Second Edition; Example Watermarking Systems; Chapter 1. Introduction; Chapter 2. Applications and Properties; Chapter 3. Models of Watermarking; Chapter 4. Basic Message Coding; Chapter 5. Watermarking with Side Information; Chapter 6. Practical Dirty-Paper Codes; Chapter 7. Analyzing Errors; Chapter 8. Using Perceptual Models; Chapter 9. Robust Watermarking; Chapter 10. Watermark Security; Chapter 11. Content Authentication; Chapter 12. Steganography. Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition. Print version record. English. Computer security. Digital watermarking. http://id.loc.gov/authorities/subjects/sh2002000575 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Tatouage numérique. Protection de l'information (Informatique) digital watermarking. aat COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Data protection fast Digital watermarking fast dissertations. aat Academic theses fast Academic theses. lcgft http://id.loc.gov/authorities/genreForms/gf2014026039 Thèses et écrits académiques. rvmgf Cox, I. J. (Ingemar J.) http://id.loc.gov/authorities/names/n88229583 has work: Digital watermarking and steganography (Text) https://id.oclc.org/worldcat/entity/E39PCG4hY8xYtPvX7rYk8MKgTd https://id.oclc.org/worldcat/ontology/hasWork Print version: Digital watermarking and steganography. 2nd ed. Amsterdam ; Boston : Morgan Kaufmann Publishers, ©2008 9780123725851 0123725852 (DLC) 2007040595 (OCoLC)173640977 Morgan Kaufmann series in multimedia information and systems. http://id.loc.gov/authorities/names/no96029044 Morgan Kaufmann series in computer security. http://id.loc.gov/authorities/names/no2007139011 |
spellingShingle | Digital watermarking and steganography / Morgan Kaufmann series in multimedia information and systems. Morgan Kaufmann series in computer security. Front Cover; Digital Watermarking and Steganography; Copyright Page; Table of Contents; Preface to the First Edition; Preface to the Second Edition; Example Watermarking Systems; Chapter 1. Introduction; Chapter 2. Applications and Properties; Chapter 3. Models of Watermarking; Chapter 4. Basic Message Coding; Chapter 5. Watermarking with Side Information; Chapter 6. Practical Dirty-Paper Codes; Chapter 7. Analyzing Errors; Chapter 8. Using Perceptual Models; Chapter 9. Robust Watermarking; Chapter 10. Watermark Security; Chapter 11. Content Authentication; Chapter 12. Steganography. Computer security. Digital watermarking. http://id.loc.gov/authorities/subjects/sh2002000575 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Tatouage numérique. Protection de l'information (Informatique) digital watermarking. aat COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Data protection fast Digital watermarking fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2002000575 http://id.loc.gov/authorities/subjects/sh85035859 https://id.nlm.nih.gov/mesh/D016494 http://id.loc.gov/authorities/genreForms/gf2014026039 |
title | Digital watermarking and steganography / |
title_auth | Digital watermarking and steganography / |
title_exact_search | Digital watermarking and steganography / |
title_full | Digital watermarking and steganography / Ingemar J. Cox [and others]. |
title_fullStr | Digital watermarking and steganography / Ingemar J. Cox [and others]. |
title_full_unstemmed | Digital watermarking and steganography / Ingemar J. Cox [and others]. |
title_short | Digital watermarking and steganography / |
title_sort | digital watermarking and steganography |
topic | Computer security. Digital watermarking. http://id.loc.gov/authorities/subjects/sh2002000575 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Tatouage numérique. Protection de l'information (Informatique) digital watermarking. aat COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Data protection fast Digital watermarking fast |
topic_facet | Computer security. Digital watermarking. Data protection. Computer Security Sécurité informatique. Tatouage numérique. Protection de l'information (Informatique) digital watermarking. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer security Data protection Digital watermarking dissertations. Academic theses Academic theses. Thèses et écrits académiques. |
work_keys_str_mv | AT coxij digitalwatermarkingandsteganography |