Color image watermarking :: algorithms and technologies /
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin ; Boston : [Beijing] :
De Gruyter ; Tsinghua University Press,
[2017]
|
Schriftenreihe: | Advances in computer science ;
v. 1. |
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | 1 online resource (xii, 185 pages) : illustrations (some color) |
Bibliographie: | Includes bibliographical references (pages 171-179) and index. |
ISBN: | 311048773X 9783110487732 9783110487763 3110487764 9783110487633 3110487632 |
Internformat
MARC
LEADER | 00000cam a2200000Ma 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn966391891 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 161216s2017 gw a ob 001 0 eng d | ||
040 | |a IDEBK |b eng |e pn |c IDEBK |d OCLCQ |d YDX |d MERUC |d EBLCP |d OCLCF |d N$T |d OCLCQ |d NAM |d COCUF |d CUY |d LOA |d K6U |d ICG |d ZCU |d STF |d CN8ML |d SNK |d INTCL |d MHW |d BTN |d AUW |d OCLCQ |d VTS |d U3W |d XPJ |d D6H |d WYU |d OCLCQ |d G3B |d LVT |d S8I |d S8J |d S9I |d DKC |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d UEJ |d OCLCO |d OCLCQ | ||
019 | |a 967843409 |a 967861638 |a 973019202 |a 978441269 | ||
020 | |a 311048773X |q (ebk) | ||
020 | |a 9783110487732 | ||
020 | |a 9783110487763 | ||
020 | |a 3110487764 | ||
020 | |a 9783110487633 | ||
020 | |a 3110487632 | ||
020 | |z 3110487578 | ||
020 | |z 3110487632 | ||
020 | |z 9783110487572 | ||
035 | |a (OCoLC)966391891 |z (OCoLC)967843409 |z (OCoLC)967861638 |z (OCoLC)973019202 |z (OCoLC)978441269 | ||
037 | |a 978218 |b MIL | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a COM |x 012050 |2 bisacsh | |
072 | 7 | |a COM |x 083000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Su, Qingtang. |1 https://id.oclc.org/worldcat/entity/E39PCjDHKdhXr8c7TDF3CxmwFq |0 http://id.loc.gov/authorities/names/n2016058041 | |
245 | 1 | 0 | |a Color image watermarking : |b algorithms and technologies / |c Qingtang Su. |
260 | |a Berlin ; |a Boston : |b De Gruyter ; |a [Beijing] : |b Tsinghua University Press, |c [2017] | ||
300 | |a 1 online resource (xii, 185 pages) : |b illustrations (some color) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Advances in Computer Science ; |v Volume 1 | |
588 | 0 | |a Print version record. | |
504 | |a Includes bibliographical references (pages 171-179) and index. | ||
505 | 0 | |a Preface ; Contents ; Acknowledgments ; 1 Introduction ; 1.1 The Introduction of Information Hiding Technology ; 1.1.1 The Basic Terminology of Information Hiding Technology ; 1.1.2 The Classification of Information Hiding Technology. | |
505 | 8 | |a 1.1.3 The Development of Information Hiding Technology 1.2 Digital Watermarking Technology ; 1.2.1 The Background of the Digital Watermarking Technology ; 1.2.2 The Basic Concept of Digital Watermarking ; 1.2.3 The Basic Framework of Digital Watermarking. | |
505 | 8 | |a 1.2.4 The Attack Methods of Digital Watermarking 1.2.5 Quality Evaluation of Digital Watermarking ; 1.3 The Research Status of Color Image Digital Watermarking Technology ; 1.3.1 Research Status of Color Image Watermarking Technology Based on Spatial Domain. | |
505 | 8 | |a 1.3.2 Research Status of Color Image Watermark Technology Based on Frequency Domain 1.3.3 Research Status of Color Image Watermarking Technology Based on Color Quantization ; 1.4 Conclusion ; 2 Common Mathematical Knowledge Used in Digital Watermarking ; 2.1 The Common Transforms of Image. | |
505 | 8 | |a 2.1.1 The Discrete Fourier Transform 2.1.2 The Discrete Cosine Transform ; 2.1.3 The Discrete Wavelet Transform ; 2.2 Common Matrix Decomposition ; 2.2.1 Singular Value Decomposition ; 2.2.2 Schur Decomposition ; 2.2.3 QR Decomposition ; 2.2.4 Hessenberg Decomposition. | |
650 | 0 | |a Digital images |x Watermarking. |0 http://id.loc.gov/authorities/subjects/sh2006002709 | |
650 | 0 | |a Data encryption (Computer science) |0 http://id.loc.gov/authorities/subjects/sh94001524 | |
650 | 6 | |a Tatouage d'images numériques. | |
650 | 6 | |a Chiffrement (Informatique) | |
650 | 7 | |a COMPUTERS |x Image Processing. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x Cryptography. |2 bisacsh | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
650 | 7 | |a Digital images |x Watermarking |2 fast | |
758 | |i has work: |a Color image watermarking (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGQfXKRrGGQQRhcvcYTMWC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |z 9783110487732 |
830 | 0 | |a Advances in computer science ; |v v. 1. |0 http://id.loc.gov/authorities/names/no2017049490 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1457251 |3 Volltext |
938 | |a EBL - Ebook Library |b EBLB |n EBL4790352 | ||
938 | |a EBSCOhost |b EBSC |n 1457251 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis37019565 | ||
938 | |a YBP Library Services |b YANK |n 13158632 | ||
938 | |a YBP Library Services |b YANK |n 13158640 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn966391891 |
---|---|
_version_ | 1816882372666195968 |
adam_text | |
any_adam_object | |
author | Su, Qingtang |
author_GND | http://id.loc.gov/authorities/names/n2016058041 |
author_facet | Su, Qingtang |
author_role | |
author_sort | Su, Qingtang |
author_variant | q s qs |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Preface ; Contents ; Acknowledgments ; 1 Introduction ; 1.1 The Introduction of Information Hiding Technology ; 1.1.1 The Basic Terminology of Information Hiding Technology ; 1.1.2 The Classification of Information Hiding Technology. 1.1.3 The Development of Information Hiding Technology 1.2 Digital Watermarking Technology ; 1.2.1 The Background of the Digital Watermarking Technology ; 1.2.2 The Basic Concept of Digital Watermarking ; 1.2.3 The Basic Framework of Digital Watermarking. 1.2.4 The Attack Methods of Digital Watermarking 1.2.5 Quality Evaluation of Digital Watermarking ; 1.3 The Research Status of Color Image Digital Watermarking Technology ; 1.3.1 Research Status of Color Image Watermarking Technology Based on Spatial Domain. 1.3.2 Research Status of Color Image Watermark Technology Based on Frequency Domain 1.3.3 Research Status of Color Image Watermarking Technology Based on Color Quantization ; 1.4 Conclusion ; 2 Common Mathematical Knowledge Used in Digital Watermarking ; 2.1 The Common Transforms of Image. 2.1.1 The Discrete Fourier Transform 2.1.2 The Discrete Cosine Transform ; 2.1.3 The Discrete Wavelet Transform ; 2.2 Common Matrix Decomposition ; 2.2.1 Singular Value Decomposition ; 2.2.2 Schur Decomposition ; 2.2.3 QR Decomposition ; 2.2.4 Hessenberg Decomposition. |
ctrlnum | (OCoLC)966391891 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04431cam a2200709Ma 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn966391891</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|||||||||</controlfield><controlfield tag="008">161216s2017 gw a ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">IDEBK</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDX</subfield><subfield code="d">MERUC</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCF</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NAM</subfield><subfield code="d">COCUF</subfield><subfield code="d">CUY</subfield><subfield code="d">LOA</subfield><subfield code="d">K6U</subfield><subfield code="d">ICG</subfield><subfield code="d">ZCU</subfield><subfield code="d">STF</subfield><subfield code="d">CN8ML</subfield><subfield code="d">SNK</subfield><subfield code="d">INTCL</subfield><subfield code="d">MHW</subfield><subfield code="d">BTN</subfield><subfield code="d">AUW</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">U3W</subfield><subfield code="d">XPJ</subfield><subfield code="d">D6H</subfield><subfield code="d">WYU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">G3B</subfield><subfield code="d">LVT</subfield><subfield code="d">S8I</subfield><subfield code="d">S8J</subfield><subfield code="d">S9I</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">UEJ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">967843409</subfield><subfield code="a">967861638</subfield><subfield code="a">973019202</subfield><subfield code="a">978441269</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">311048773X</subfield><subfield code="q">(ebk)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110487732</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110487763</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3110487764</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110487633</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3110487632</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">3110487578</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">3110487632</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9783110487572</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)966391891</subfield><subfield code="z">(OCoLC)967843409</subfield><subfield code="z">(OCoLC)967861638</subfield><subfield code="z">(OCoLC)973019202</subfield><subfield code="z">(OCoLC)978441269</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">978218</subfield><subfield code="b">MIL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">012050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">083000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Su, Qingtang.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjDHKdhXr8c7TDF3CxmwFq</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2016058041</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Color image watermarking :</subfield><subfield code="b">algorithms and technologies /</subfield><subfield code="c">Qingtang Su.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Berlin ;</subfield><subfield code="a">Boston :</subfield><subfield code="b">De Gruyter ;</subfield><subfield code="a">[Beijing] :</subfield><subfield code="b">Tsinghua University Press,</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xii, 185 pages) :</subfield><subfield code="b">illustrations (some color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in Computer Science ;</subfield><subfield code="v">Volume 1</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 171-179) and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Preface ; Contents ; Acknowledgments ; 1 Introduction ; 1.1 The Introduction of Information Hiding Technology ; 1.1.1 The Basic Terminology of Information Hiding Technology ; 1.1.2 The Classification of Information Hiding Technology.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1.1.3 The Development of Information Hiding Technology 1.2 Digital Watermarking Technology ; 1.2.1 The Background of the Digital Watermarking Technology ; 1.2.2 The Basic Concept of Digital Watermarking ; 1.2.3 The Basic Framework of Digital Watermarking.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1.2.4 The Attack Methods of Digital Watermarking 1.2.5 Quality Evaluation of Digital Watermarking ; 1.3 The Research Status of Color Image Digital Watermarking Technology ; 1.3.1 Research Status of Color Image Watermarking Technology Based on Spatial Domain.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1.3.2 Research Status of Color Image Watermark Technology Based on Frequency Domain 1.3.3 Research Status of Color Image Watermarking Technology Based on Color Quantization ; 1.4 Conclusion ; 2 Common Mathematical Knowledge Used in Digital Watermarking ; 2.1 The Common Transforms of Image.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.1.1 The Discrete Fourier Transform 2.1.2 The Discrete Cosine Transform ; 2.1.3 The Discrete Wavelet Transform ; 2.2 Common Matrix Decomposition ; 2.2.1 Singular Value Decomposition ; 2.2.2 Schur Decomposition ; 2.2.3 QR Decomposition ; 2.2.4 Hessenberg Decomposition.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Digital images</subfield><subfield code="x">Watermarking.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2006002709</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001524</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Tatouage d'images numériques.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Image Processing.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">Cryptography.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Digital images</subfield><subfield code="x">Watermarking</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Color image watermarking (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGQfXKRrGGQQRhcvcYTMWC</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">9783110487732</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in computer science ;</subfield><subfield code="v">v. 1.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2017049490</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1457251</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL4790352</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1457251</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis37019565</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">13158632</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">13158640</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn966391891 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:27:34Z |
institution | BVB |
isbn | 311048773X 9783110487732 9783110487763 3110487764 9783110487633 3110487632 |
language | English |
oclc_num | 966391891 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xii, 185 pages) : illustrations (some color) |
psigel | ZDB-4-EBA |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | De Gruyter ; Tsinghua University Press, |
record_format | marc |
series | Advances in computer science ; |
series2 | Advances in Computer Science ; |
spelling | Su, Qingtang. https://id.oclc.org/worldcat/entity/E39PCjDHKdhXr8c7TDF3CxmwFq http://id.loc.gov/authorities/names/n2016058041 Color image watermarking : algorithms and technologies / Qingtang Su. Berlin ; Boston : De Gruyter ; [Beijing] : Tsinghua University Press, [2017] 1 online resource (xii, 185 pages) : illustrations (some color) text txt rdacontent computer c rdamedia online resource cr rdacarrier Advances in Computer Science ; Volume 1 Print version record. Includes bibliographical references (pages 171-179) and index. Preface ; Contents ; Acknowledgments ; 1 Introduction ; 1.1 The Introduction of Information Hiding Technology ; 1.1.1 The Basic Terminology of Information Hiding Technology ; 1.1.2 The Classification of Information Hiding Technology. 1.1.3 The Development of Information Hiding Technology 1.2 Digital Watermarking Technology ; 1.2.1 The Background of the Digital Watermarking Technology ; 1.2.2 The Basic Concept of Digital Watermarking ; 1.2.3 The Basic Framework of Digital Watermarking. 1.2.4 The Attack Methods of Digital Watermarking 1.2.5 Quality Evaluation of Digital Watermarking ; 1.3 The Research Status of Color Image Digital Watermarking Technology ; 1.3.1 Research Status of Color Image Watermarking Technology Based on Spatial Domain. 1.3.2 Research Status of Color Image Watermark Technology Based on Frequency Domain 1.3.3 Research Status of Color Image Watermarking Technology Based on Color Quantization ; 1.4 Conclusion ; 2 Common Mathematical Knowledge Used in Digital Watermarking ; 2.1 The Common Transforms of Image. 2.1.1 The Discrete Fourier Transform 2.1.2 The Discrete Cosine Transform ; 2.1.3 The Discrete Wavelet Transform ; 2.2 Common Matrix Decomposition ; 2.2.1 Singular Value Decomposition ; 2.2.2 Schur Decomposition ; 2.2.3 QR Decomposition ; 2.2.4 Hessenberg Decomposition. Digital images Watermarking. http://id.loc.gov/authorities/subjects/sh2006002709 Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Tatouage d'images numériques. Chiffrement (Informatique) COMPUTERS Image Processing. bisacsh COMPUTERS Security Cryptography. bisacsh Data encryption (Computer science) fast Digital images Watermarking fast has work: Color image watermarking (Text) https://id.oclc.org/worldcat/entity/E39PCGQfXKRrGGQQRhcvcYTMWC https://id.oclc.org/worldcat/ontology/hasWork Print version: 9783110487732 Advances in computer science ; v. 1. http://id.loc.gov/authorities/names/no2017049490 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1457251 Volltext |
spellingShingle | Su, Qingtang Color image watermarking : algorithms and technologies / Advances in computer science ; Preface ; Contents ; Acknowledgments ; 1 Introduction ; 1.1 The Introduction of Information Hiding Technology ; 1.1.1 The Basic Terminology of Information Hiding Technology ; 1.1.2 The Classification of Information Hiding Technology. 1.1.3 The Development of Information Hiding Technology 1.2 Digital Watermarking Technology ; 1.2.1 The Background of the Digital Watermarking Technology ; 1.2.2 The Basic Concept of Digital Watermarking ; 1.2.3 The Basic Framework of Digital Watermarking. 1.2.4 The Attack Methods of Digital Watermarking 1.2.5 Quality Evaluation of Digital Watermarking ; 1.3 The Research Status of Color Image Digital Watermarking Technology ; 1.3.1 Research Status of Color Image Watermarking Technology Based on Spatial Domain. 1.3.2 Research Status of Color Image Watermark Technology Based on Frequency Domain 1.3.3 Research Status of Color Image Watermarking Technology Based on Color Quantization ; 1.4 Conclusion ; 2 Common Mathematical Knowledge Used in Digital Watermarking ; 2.1 The Common Transforms of Image. 2.1.1 The Discrete Fourier Transform 2.1.2 The Discrete Cosine Transform ; 2.1.3 The Discrete Wavelet Transform ; 2.2 Common Matrix Decomposition ; 2.2.1 Singular Value Decomposition ; 2.2.2 Schur Decomposition ; 2.2.3 QR Decomposition ; 2.2.4 Hessenberg Decomposition. Digital images Watermarking. http://id.loc.gov/authorities/subjects/sh2006002709 Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Tatouage d'images numériques. Chiffrement (Informatique) COMPUTERS Image Processing. bisacsh COMPUTERS Security Cryptography. bisacsh Data encryption (Computer science) fast Digital images Watermarking fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2006002709 http://id.loc.gov/authorities/subjects/sh94001524 |
title | Color image watermarking : algorithms and technologies / |
title_auth | Color image watermarking : algorithms and technologies / |
title_exact_search | Color image watermarking : algorithms and technologies / |
title_full | Color image watermarking : algorithms and technologies / Qingtang Su. |
title_fullStr | Color image watermarking : algorithms and technologies / Qingtang Su. |
title_full_unstemmed | Color image watermarking : algorithms and technologies / Qingtang Su. |
title_short | Color image watermarking : |
title_sort | color image watermarking algorithms and technologies |
title_sub | algorithms and technologies / |
topic | Digital images Watermarking. http://id.loc.gov/authorities/subjects/sh2006002709 Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Tatouage d'images numériques. Chiffrement (Informatique) COMPUTERS Image Processing. bisacsh COMPUTERS Security Cryptography. bisacsh Data encryption (Computer science) fast Digital images Watermarking fast |
topic_facet | Digital images Watermarking. Data encryption (Computer science) Tatouage d'images numériques. Chiffrement (Informatique) COMPUTERS Image Processing. COMPUTERS Security Cryptography. Digital images Watermarking |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1457251 |
work_keys_str_mv | AT suqingtang colorimagewatermarkingalgorithmsandtechnologies |