|
|
|
|
LEADER |
03310nam a22004935i 4500 |
001 |
7242 |
003 |
DE-He213 |
005 |
20130725192303.0 |
007 |
cr nn 008mamaa |
008 |
100301s2009 gw | s |||| 0|eng d |
020 |
# |
# |
|a 9783642023354
|9 978-3-642-02335-4
|
024 |
7 |
# |
|a 10.1007/978-3-642-02335-4
|2 doi
|
050 |
# |
4 |
|a TA329-348
|
050 |
# |
4 |
|a TA640-643
|
072 |
# |
7 |
|a TBJ
|2 bicssc
|
072 |
# |
7 |
|a MAT003000
|2 bisacsh
|
082 |
0 |
4 |
|a 519
|2 23
|
100 |
1 |
# |
|a Pan, Jeng-Shyang.
|e editor.
|
245 |
1 |
0 |
|a Information Hiding and Applications
|c edited by Jeng-Shyang Pan, Hsiang-Cheh Huang, Lakhmi C. Jain.
|h [electronic resource] /
|
264 |
# |
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2009.
|
300 |
# |
# |
|b online resource.
|
336 |
# |
# |
|a text
|b txt
|2 rdacontent
|
337 |
# |
# |
|a computer
|b c
|2 rdamedia
|
338 |
# |
# |
|a online resource
|b cr
|2 rdacarrier
|
347 |
# |
# |
|a text file
|b PDF
|2 rda
|
490 |
1 |
# |
|a Studies in Computational Intelligence,
|v 227
|x 1860-949X ;
|
505 |
0 |
# |
|a The Optimized Copyright Protection System with Genetic Watermarking -- Dual-plane Correlation-based Video Watermarking for Immunity to Rotation, Scale, Translation, and Random Distortion -- Restoring Objects for Digital Inpainting -- A Secure Data Embedding Scheme Using Gray-code Computation and SMVQ Encoding -- Robust Image Watermarking Based on Scale-Space Feature Points -- Intelligent Perceptual Shaping in Digital Watermarking -- Semi-Fragile Image Authentication Method for Robust to JPEG, JPEG2000 Compressed and Scaled Images -- Genetic Fingerprinting for Copyright Protection of Multicast Media -- Lossless Data Hiding for Halftone Images -- Information Hiding by Digital Watermarking.
|
520 |
# |
# |
|a Information hiding is an area of great interest due to its applications in copyright protection of images, data, passport control, CDs, DVDs, videos and so on. This book presents a sample of recent research results from key researchers. The contributions include: Copyright protection system Video watermarking Restoring objects for digital inpainting Data embedding scheme Robust image watermarking Perceptual shaping in digital watermarking Image authentication method under JPEG Fingerprinting for copyright protection Data hiding for halftone images Information hiding for digital watermarking This book is directed to the application engineers, researchers, graduate students, professors and to those who are interested to investigate the information hiding techniques and use them in various applications such as copyright protection of images, data, passport control, CDs, DVDs, videos and so on.
|
650 |
# |
0 |
|a Engineering.
|
650 |
# |
0 |
|a Artificial intelligence.
|
650 |
# |
0 |
|a Engineering mathematics.
|
650 |
1 |
4 |
|a Engineering.
|
650 |
2 |
4 |
|a Appl.Mathematics/Computational Methods of Engineering.
|
650 |
2 |
4 |
|a Artificial Intelligence (incl. Robotics).
|
700 |
1 |
# |
|a Huang, Hsiang-Cheh.
|e editor.
|
700 |
1 |
# |
|a Jain, Lakhmi C.
|e editor.
|
710 |
2 |
# |
|a SpringerLink (Online service)
|
773 |
0 |
# |
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642023347
|
830 |
# |
0 |
|a Studies in Computational Intelligence,
|v 227
|x 1860-949X ;
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-02335-4
|
912 |
# |
# |
|a ZDB-2-ENG
|
950 |
# |
# |
|a Engineering (Springer-11647)
|