語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Digital watermarking and steganography
~
Cox, I. J.
FindBook
Google Book
Amazon
博客來
Digital watermarking and steganography
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Digital watermarking and steganography/ Ingemar J. Cox ... [et al.].
其他作者:
Cox, I. J.
出版者:
Amsterdam ;Morgan Kaufmann Publishers, : c2008.,
面頁冊數:
xxviii, 593 p. :ill. ;25 cm.
附註:
Prev. ed. entered under Cox.
叢書名:
The Morgan kaufmann series in computer security
內容註:
Chapter One: Introduction -- Chapter Two: Applications and Properties -- Chapter Three: Models of Watermarking -- Chapter Four: Message Coding -- Chapter Five: Watermarking with Side Information -- Chapter Six: Structured Dirty-Paper Codes -- Chapter Seven: Analyzing Errors -- Chapter Eight: Using Perceptual Models -- Chapter Nine: Robust Watermarking -- Chapter Ten: Watermark Security -- Chapter Eleven: Content Authentication -- Chapter Twelve: Steganography and Steganalysis.
標題:
Computer security. -
電子資源:
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9780123725851An electronic book accessible through the World Wide Web; click for information
電子資源:
http://www.sciencedirect.com/science/book/9780123725851An electronic book accessible through the World Wide Web; click for information
電子資源:
http://www.loc.gov/catdir/enhancements/fy0808/2007040595-d.html
ISBN:
0123725852
Digital watermarking and steganography
Digital watermarking and steganography
[electronic resource] /Ingemar J. Cox ... [et al.]. - 2nd ed. - Amsterdam ;Morgan Kaufmann Publishers,c2008. - xxviii, 593 p. :ill. ;25 cm. - The Morgan kaufmann series in computer security.
Prev. ed. entered under Cox.
Includes bibliographical references (p. 549-574) and index.
Chapter One: Introduction -- Chapter Two: Applications and Properties -- Chapter Three: Models of Watermarking -- Chapter Four: Message Coding -- Chapter Five: Watermarking with Side Information -- Chapter Six: Structured Dirty-Paper Codes -- Chapter Seven: Analyzing Errors -- Chapter Eight: Using Perceptual Models -- Chapter Nine: Robust Watermarking -- Chapter Ten: Watermark Security -- Chapter Eleven: Content Authentication -- Chapter Twelve: Steganography and Steganalysis.
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession. *This new edition now contains essential information on steganalysis and steganography *New concepts and new applications including QIM introduced *Digital watermark embedding is given a complete update with new processes and applications.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2008.
Mode of access: World Wide Web.
ISBN: 0123725852
Source: 134566:134697Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
540555
Computer security.
Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: QA76.9.A25 / C68 2008eb
Dewey Class. No.: 005.8
Digital watermarking and steganography
LDR
:03704nam 2200385 a 45
001
841330
003
OCoLC
005
20100601
006
m d
007
cr cn|||||||||
008
100601s2008 ne a sb 001 0 eng d
020
$a
0123725852
020
$a
9780123725851
029
1
$a
AU@
$b
000043178396
035
$a
(OCoLC)228148421
035
$a
ocn228148421
037
$a
134566:134697
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$c
OPELS
049
$a
TEFA
050
1 4
$a
QA76.9.A25
$b
C68 2008eb
082
0 4
$a
005.8
$2
22
245
0 0
$a
Digital watermarking and steganography
$h
[electronic resource] /
$c
Ingemar J. Cox ... [et al.].
250
$a
2nd ed.
260
$a
Amsterdam ;
$a
Boston :
$c
c2008.
$b
Morgan Kaufmann Publishers,
300
$a
xxviii, 593 p. :
$b
ill. ;
$c
25 cm.
440
4
$a
The Morgan kaufmann series in computer security
440
4
$a
The Morgan Kaufmann series in multimedia information and systems
500
$a
Prev. ed. entered under Cox.
504
$a
Includes bibliographical references (p. 549-574) and index.
505
0
$a
Chapter One: Introduction -- Chapter Two: Applications and Properties -- Chapter Three: Models of Watermarking -- Chapter Four: Message Coding -- Chapter Five: Watermarking with Side Information -- Chapter Six: Structured Dirty-Paper Codes -- Chapter Seven: Analyzing Errors -- Chapter Eight: Using Perceptual Models -- Chapter Nine: Robust Watermarking -- Chapter Ten: Watermark Security -- Chapter Eleven: Content Authentication -- Chapter Twelve: Steganography and Steganalysis.
520
$a
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession. *This new edition now contains essential information on steganalysis and steganography *New concepts and new applications including QIM introduced *Digital watermark embedding is given a complete update with new processes and applications.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2008.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on May 14, 2008).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Computer security.
$3
540555
650
0
$a
Data protection.
$3
590548
650
0
$a
Digital watermarking.
$3
629095
655
7
$a
Electronic books.
$2
lcsh
$3
542853
700
1
$a
Cox, I. J.
$q
(Ingemar J.)
$3
629094
710
2
$a
ScienceDirect (Online service)
$3
848416
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9780123725851
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9780123725851
$z
An electronic book accessible through the World Wide Web; click for information
856
4 2
$3
Publisher description
$u
http://www.loc.gov/catdir/enhancements/fy0808/2007040595-d.html
994
$a
C0
$b
TEF
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9061202
電子資源
11.線上閱覽_V
電子書
EB W9061202
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入