語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Digital watermarking and steganography
~
Cox, I. J.
Digital watermarking and steganography
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Digital watermarking and steganographyIngemar J. Cox ... [et al.].
其他作者:
Cox, I. J.
出版者:
Amsterdam ;Morgan Kaufmann Publishers,c2008.
面頁冊數:
xxviii, 593 p. :ill. ;25 cm.
附註:
Prev. ed. entered under Cox.
叢書名:
The Morgan Kaufmann series in multimedia information and systems
標題:
Computer security.
電子資源:
An electronic book accessible through the World Wide Web; click for information
電子資源:
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9780123725851
電子資源:
http://www.loc.gov/catdir/enhancements/fy0808/2007040595-d.html
ISBN:
9780123725851
Digital watermarking and steganography
Digital watermarking and steganography
[electronic resource] /Ingemar J. Cox ... [et al.]. - 2nd ed. - Amsterdam ;Morgan Kaufmann Publishers,c2008. - xxviii, 593 p. :ill. ;25 cm. - The Morgan Kaufmann series in multimedia information and systems.
Prev. ed. entered under Cox.
Includes bibliographical references (p. 549-574) and index.
Chapter One: Introduction -- Chapter Two: Applications and Properties -- Chapter Three: Models of Watermarking -- Chapter Four: Message Coding -- Chapter Five: Watermarking with Side Information -- Chapter Six: Structured Dirty-Paper Codes -- Chapter Seven: Analyzing Errors -- Chapter Eight: Using Perceptual Models -- Chapter Nine: Robust Watermarking -- Chapter Ten: Watermark Security -- Chapter Eleven: Content Authentication -- Chapter Twelve: Steganography and Steganalysis.
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession. *This new edition now contains essential information on steganalysis and steganography *New concepts and new applications including QIM introduced *Digital watermark embedding is given a complete update with new processes and applications.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2008.
Mode of access: World Wide Web.
ISBN: 9780123725851
Source: 134566:134697Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
184416
Computer security.
Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: QA76.9.A25 / C68 2008eb
Dewey Class. No.: 005.8
Digital watermarking and steganography
LDR
:03720nmm 2200385Ia 4500
001
214290
003
OCoLC
005
20090612093507.0
006
m d
007
cr cn|||||||||
008
090907s2008 ne a sb 001 0 eng d
020
$a
9780123725851
020
$a
0123725852
029
1
$a
AU@
$b
000043178396
035
$a
(OCoLC)228148421
035
$a
ocn228148421
037
$a
134566:134697
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$c
OPELS
049
$a
TEFA
050
1 4
$a
QA76.9.A25
$b
C68 2008eb
082
0 4
$a
005.8
$2
22
245
0 0
$a
Digital watermarking and steganography
$h
[electronic resource] /
$c
Ingemar J. Cox ... [et al.].
250
$a
2nd ed.
260
$a
Amsterdam ;
$a
Boston :
$c
c2008.
$b
Morgan Kaufmann Publishers,
300
$a
xxviii, 593 p. :
$b
ill. ;
$c
25 cm.
440
4
$a
The Morgan Kaufmann series in multimedia information and systems
440
4
$a
The Morgan kaufmann series in computer security
500
$a
Prev. ed. entered under Cox.
504
$a
Includes bibliographical references (p. 549-574) and index.
505
0
$a
Chapter One: Introduction -- Chapter Two: Applications and Properties -- Chapter Three: Models of Watermarking -- Chapter Four: Message Coding -- Chapter Five: Watermarking with Side Information -- Chapter Six: Structured Dirty-Paper Codes -- Chapter Seven: Analyzing Errors -- Chapter Eight: Using Perceptual Models -- Chapter Nine: Robust Watermarking -- Chapter Ten: Watermark Security -- Chapter Eleven: Content Authentication -- Chapter Twelve: Steganography and Steganalysis.
520
$a
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession. *This new edition now contains essential information on steganalysis and steganography *New concepts and new applications including QIM introduced *Digital watermark embedding is given a complete update with new processes and applications.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2008.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on May 14, 2008).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Computer security.
$3
184416
650
0
$a
Digital watermarking.
$3
237825
650
0
$a
Data protection.
$3
202312
655
7
$a
Electronic books.
$2
local.
$3
214472
700
1
$a
Cox, I. J.
$q
(Ingemar J.)
$3
438027
710
2
$a
ScienceDirect (Online service)
$3
307425
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9780123725851
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9780123725851
$z
An electronic book accessible through the World Wide Web; click for information
856
4 2
$3
Publisher description
$u
http://www.loc.gov/catdir/enhancements/fy0808/2007040595-d.html
994
$a
C0
$b
TEF
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000028847
電子館藏
1圖書
電子書
EB QA76.9.A25 C877 2008
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://www.sciencedirect.com/science/book/9780123725851
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9780123725851
http://www.loc.gov/catdir/enhancements/fy0808/2007040595-d.html
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入