Digital watermarking and steganography
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by lim...
Other Authors: | |
---|---|
Format: | Electronic |
Language: | English |
Published: |
Amsterdam ; Boston :
Morgan Kaufmann Publishers,
c2008.
|
Edition: | 2nd ed. |
Series: | Morgan Kaufmann series in multimedia information and systems.
Morgan Kaufmann series in computer security. |
Subjects: | |
Online Access: | ebrary View fulltext via EzAccess MyiLibrary ScienceDirect Books24x7 |
LEADER | 04415cam a2200721Ia 4500 | ||
---|---|---|---|
001 | 480 | ||
003 | OCoLC | ||
005 | 20130711000630.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 080111s2008 ne a ob 001 0 eng d | ||
019 | # | # | |a 227968408 |a 259629025 |a 473204710 |a 647692085 |
020 | # | # | |a 9780080555805 (electronic bk.) |
020 | # | # | |a 0080555802 (electronic bk.) |
020 | # | # | |a 9780123725851 (casebound : alk. paper) |
020 | # | # | |a 0123725852 (casebound : alk. paper) |
029 | 1 | # | |a IG# |b 9780123725851 |
029 | 1 | # | |a NZ1 |b 12479008 |
029 | 1 | # | |a NZ1 |b 14540498 |
029 | 1 | # | |a AU@ |b 000051561520 |
035 | # | # | |a (OCoLC)190760116 |
040 | # | # | |a N$T |b eng |c N$T |d YDXCP |d OCLCQ |d OSU |d DLC |d IG# |d IDEBK |d OCLCQ |d E7B |d OCLCQ |d UX0 |d MHW |d DKDLA |d OCLCQ |d B24X7 |d OCLCO |d OCLCQ |
049 | # | # | |a MYTA |
050 | # | 4 | |a QA76.9.A25 |b C68 2008eb |
072 | # | 7 | |a COM |x 060040 |2 bisacsh |
072 | # | 7 | |a COM |x 043050 |2 bisacsh |
072 | # | 7 | |a COM |x 053000 |2 bisacsh |
082 | 0 | 4 | |a 005.8 |2 22 |
245 | 0 | 0 | |a Digital watermarking and steganography |c Ingemar J. Cox ... [et al.]. |h [electronic resource] / |
250 | # | # | |a 2nd ed. |
260 | # | # | |a Amsterdam ; |a Boston : |b Morgan Kaufmann Publishers, |c c2008. |
300 | # | # | |a 1 online resource (xxviii, 593 p.) : |b ill. |
490 | 1 | # | |a The Morgan Kaufmann series in multimedia information and systems |
490 | 1 | # | |a The Morgan kaufmann series in computer security |
500 | # | # | |a Prev. ed. entered under Cox. |
504 | # | # | |a Includes bibliographical references (p. 549-574) and index. |
505 | 0 | # | |a Front Cover; Digital Watermarking and Steganography; Copyright Page; Table of Contents; Preface to the First Edition; Preface to the Second Edition; Example Watermarking Systems; Chapter 1. Introduction; Chapter 2. Applications and Properties; Chapter 3. Models of Watermarking; Chapter 4. Basic Message Coding; Chapter 5. Watermarking with Side Information; Chapter 6. Practical Dirty-Paper Codes; Chapter 7. Analyzing Errors; Chapter 8. Using Perceptual Models; Chapter 9. Robust Watermarking; Chapter 10. Watermark Security; Chapter 11. Content Authentication; Chapter 12. Steganography. |
520 | # | # | |a Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition. |
588 | # | # | |a Description based on print version record. |
650 | # | 0 | |a Computer security. |
650 | # | 0 | |a Digital watermarking. |
650 | # | 0 | |a Data protection. |
650 | # | 4 | |a Electronic books. |
650 | # | 7 | |a COMPUTERS |x Security. |x Internet |2 bisacsh |
650 | # | 7 | |a COMPUTERS |x Security. |x Networking |2 bisacsh |
650 | # | 7 | |a COMPUTERS |x General. |x Security |2 bisacsh |
655 | # | 4 | |a Electronic books. |
700 | 1 | # | |a Cox, I. J. |q (Ingemar J.) |
776 | 0 | 8 | |b 2nd ed. |d Amsterdam ; Boston : Morgan Kaufmann Publishers, c2008 |i Print version: |t Digital watermarking and steganography. |w (OCoLC)173640977 |w (DLC) 2007040595 |z 0123725852 |z 9780123725851 |
830 | # | 0 | |a Morgan Kaufmann series in multimedia information and systems. |
830 | # | 0 | |a Morgan Kaufmann series in computer security. |
856 | 4 | 0 | |u https://ezaccess.library.uitm.edu.my/login?url=http://site.ebrary.com/id/10204371 |3 ebrary |
856 | 4 | 0 | |u https://ezaccess.library.uitm.edu.my/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214764 |z View fulltext via EzAccess |
856 | 4 | 0 | |u https://ezaccess.library.uitm.edu.my/login?url=http://www.myilibrary.com?id=109616 |3 MyiLibrary |
856 | 4 | 0 | |u https://ezaccess.library.uitm.edu.my/login?url=http://www.sciencedirect.com/science/book/9780123725851 |3 ScienceDirect |
856 | 4 | 0 | |u https://ezaccess.library.uitm.edu.my/login?url=http://www.books24x7.com/marc.asp?bookid=28225 |3 Books24x7 |
938 | # | # | |a YBP Library Services |b YANK |n 2754820 |
938 | # | # | |a Ingram |b INGR |n 9780123725851 |
938 | # | # | |a ebrary |b EBRY |n ebr10204371 |
938 | # | # | |a Books 24x7 |b B247 |n bks00028225 |
938 | # | # | |a EBSCOhost |b EBSC |n 214764 |
999 | # | # | |z 635090427471820035 |