Information hiding techniques for steganography and digital watermarking / Stefan Katzenbeisser, Fabien A.P. Petitcolas, editors.
"Steganography, a means by which two or more parties may communicate using "invisible" or "subliminal" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to ill...
Saved in:
Online Access: |
Access E-Book |
---|---|
Access Note: | Access to electronic resources restricted to Simmons University students, faculty and staff. Access limited to one user at a time. |
Other Authors: | , |
Format: | eBook |
Language: | English |
Published: |
Boston :
Artech House,
2000.
|
Series: | Artech House computer security series.
|
Subjects: |
LEADER | 03836cam a2200589Ma 4500 | ||
---|---|---|---|
001 | b1263508 | ||
003 | CaEvIII | ||
005 | 20180331071817.3 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 001009s2000 maum ob x001 0 eng d | ||
019 | |a 47660780 |a 47924434 |a 50689463 |a 532753796 |a 612317578 |a 961617380 |a 962707808 |a 1024154671 | ||
020 | |a 1580530354 |q (electronic bk.) | ||
020 | |a 9781580530354 |q (electronic bk.) | ||
020 | |a 9781580534154 | ||
020 | |a 1580534155 | ||
035 | |a (OCoLC)45730960 |z (OCoLC)47660780 |z (OCoLC)47924434 |z (OCoLC)50689463 |z (OCoLC)532753796 |z (OCoLC)612317578 |z (OCoLC)961617380 |z (OCoLC)962707808 |z (OCoLC)1024154671 | ||
040 | |a N$T |b eng |e pn |c N$T |d OCL |d OCLCQ |d TUU |d OCLCQ |d TNF |d OCLCQ |d ZCU |d OCLCO |d OCLCF |d OCLCQ |d VVN |d BTCTA |d NLGGC |d OCLCQ |d INTCL |d JBG |d AGLDB |d SAV |d OCLCQ |d ICD |d QT7 |d OCLCA |d LUE |d YDX | ||
049 | |a SCLL | ||
050 | 4 | |a QA76.9.A25 I54144 2000eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
245 | 0 | 0 | |a Information hiding techniques for steganography and digital watermarking / |c Stefan Katzenbeisser, Fabien A.P. Petitcolas, editors. |
260 | |a Boston : |b Artech House, |c 2000. | ||
300 | |a 1 online resource (xviii, 220 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Artech House computer security series | |
500 | |a "Artech House computing library." | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | 0 | |g 1. |t Introduction to information hiding -- |g I. |t Secret writing and steganography. |g 2. |t Principles of steganography. |g 3. |t A survey of steganographic techniques. |g 4. |t Steganalysis -- |g II. |t Watermarking and copyright protection. |g 5. |t Introduction to watermarking techniques. |g 6. |t A survey of current watermarking techniques. |g 7. |t Robustness of copyright marking systems. |g 8. |t Fingerprinting. |g 9. |t Copyright on the Internet and watermarking. |
506 | |a Access to electronic resources restricted to Simmons University students, faculty and staff. | ||
506 | |a Access limited to one user at a time. | ||
520 | |a "Steganography, a means by which two or more parties may communicate using "invisible" or "subliminal" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use." "Inside, you get a thorough review of steganography, the history of this previously neglected element of cryptography, a description of possible applications, and a survey of methods you can use to hide information in modern media. Included is an overview of "steganalysis," methods that can be used to break steganographic communication."--Jacket. | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Data protection. | |
650 | 0 | |a Watermarks. | |
700 | 1 | |a Katzenbeisser, Stefan. | |
700 | 1 | |a Petitcolas, Fabien A. P. | |
776 | 0 | 8 | |i Print version: |t Information hiding techniques for steganography and digital watermarking. |d Boston : Artech House, 2000 |z 1580530354 |w (DLC) 99052317 |w (OCoLC)42733740 |
830 | 0 | |a Artech House computer security series. | |
856 | 4 | 0 | |3 EBSCOhost |u https://ezproxy.simmons.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=40326 |y Access E-Book |
907 | |a .b1263508x |b 010815 |c 200605 | ||
913 | |a - | ||
945 | |g 1 |j 0 |l elere |o - |p $0.00 |q |r 1 |s e |t 12 |u 0 |v 0 |w 0 |x 0 |y .i15000217 |z 110901 | ||
994 | |a 92 |b SCL | ||
998 | |a elere |b 160419 |c m |d x |e - |f eng |g mau |h 0 | ||
999 | f | f | |i 74ba3e38-a997-11ea-8da7-1466fadbd8b9 |s cf6dee03-2dd9-444d-97b5-e7a97326b643 |
852 | |b Online Resources |h QA76.9.A25 I54144 2000eb |0 a908b376-a99d-11ea-b550-3a67fadbd8b9 |