Digital watermarking and steganography

Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by lim...

Full description

Bibliographic Details
Other Authors: Cox, I. J.
Format: Electronic
Language:English
Published: Amsterdam ; Boston : Morgan Kaufmann Publishers, c2008.
Edition:2nd ed.
Series:Morgan Kaufmann series in multimedia information and systems.
Morgan Kaufmann series in computer security.
Subjects:
Online Access:ebrary
View fulltext via EzAccess
MyiLibrary
ScienceDirect
Books24x7
LEADER 04415cam a2200721Ia 4500
001 480
003 OCoLC
005 20130711000630.0
006 m o d
007 cr cnu---unuuu
008 080111s2008 ne a ob 001 0 eng d
019 # # |a 227968408  |a 259629025  |a 473204710  |a 647692085 
020 # # |a 9780080555805 (electronic bk.) 
020 # # |a 0080555802 (electronic bk.) 
020 # # |a 9780123725851 (casebound : alk. paper) 
020 # # |a 0123725852 (casebound : alk. paper) 
029 1 # |a IG#  |b 9780123725851 
029 1 # |a NZ1  |b 12479008 
029 1 # |a NZ1  |b 14540498 
029 1 # |a AU@  |b 000051561520 
035 # # |a (OCoLC)190760116 
040 # # |a N$T  |b eng  |c N$T  |d YDXCP  |d OCLCQ  |d OSU  |d DLC  |d IG#  |d IDEBK  |d OCLCQ  |d E7B  |d OCLCQ  |d UX0  |d MHW  |d DKDLA  |d OCLCQ  |d B24X7  |d OCLCO  |d OCLCQ 
049 # # |a MYTA 
050 # 4 |a QA76.9.A25  |b C68 2008eb 
072 # 7 |a COM  |x 060040  |2 bisacsh 
072 # 7 |a COM  |x 043050  |2 bisacsh 
072 # 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
245 0 0 |a Digital watermarking and steganography  |c Ingemar J. Cox ... [et al.].  |h [electronic resource] / 
250 # # |a 2nd ed. 
260 # # |a Amsterdam ;  |a Boston :  |b Morgan Kaufmann Publishers,  |c c2008. 
300 # # |a 1 online resource (xxviii, 593 p.) :  |b ill. 
490 1 # |a The Morgan Kaufmann series in multimedia information and systems 
490 1 # |a The Morgan kaufmann series in computer security 
500 # # |a Prev. ed. entered under Cox. 
504 # # |a Includes bibliographical references (p. 549-574) and index. 
505 0 # |a Front Cover; Digital Watermarking and Steganography; Copyright Page; Table of Contents; Preface to the First Edition; Preface to the Second Edition; Example Watermarking Systems; Chapter 1. Introduction; Chapter 2. Applications and Properties; Chapter 3. Models of Watermarking; Chapter 4. Basic Message Coding; Chapter 5. Watermarking with Side Information; Chapter 6. Practical Dirty-Paper Codes; Chapter 7. Analyzing Errors; Chapter 8. Using Perceptual Models; Chapter 9. Robust Watermarking; Chapter 10. Watermark Security; Chapter 11. Content Authentication; Chapter 12. Steganography. 
520 # # |a Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition. 
588 # # |a Description based on print version record. 
650 # 0 |a Computer security. 
650 # 0 |a Digital watermarking. 
650 # 0 |a Data protection. 
650 # 4 |a Electronic books. 
650 # 7 |a COMPUTERS  |x Security.  |x Internet  |2 bisacsh 
650 # 7 |a COMPUTERS  |x Security.  |x Networking  |2 bisacsh 
650 # 7 |a COMPUTERS  |x General.  |x Security  |2 bisacsh 
655 # 4 |a Electronic books. 
700 1 # |a Cox, I. J.  |q (Ingemar J.) 
776 0 8 |b 2nd ed.  |d Amsterdam ; Boston : Morgan Kaufmann Publishers, c2008  |i Print version:  |t Digital watermarking and steganography.  |w (OCoLC)173640977  |w (DLC) 2007040595  |z 0123725852  |z 9780123725851 
830 # 0 |a Morgan Kaufmann series in multimedia information and systems. 
830 # 0 |a Morgan Kaufmann series in computer security. 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://site.ebrary.com/id/10204371  |3 ebrary 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214764  |z View fulltext via EzAccess 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://www.myilibrary.com?id=109616  |3 MyiLibrary 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://www.sciencedirect.com/science/book/9780123725851  |3 ScienceDirect 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://www.books24x7.com/marc.asp?bookid=28225  |3 Books24x7 
938 # # |a YBP Library Services  |b YANK  |n 2754820 
938 # # |a Ingram  |b INGR  |n 9780123725851 
938 # # |a ebrary  |b EBRY  |n ebr10204371 
938 # # |a Books 24x7  |b B247  |n bks00028225 
938 # # |a EBSCOhost  |b EBSC  |n 214764 
999 # # |z 635090427471820035