|
|
|
|
LEADER |
03273nam a22005415i 4500 |
001 |
978-3-642-03187-8 |
003 |
DE-He213 |
005 |
20151204185540.0 |
007 |
cr nn 008mamaa |
008 |
100301s2009 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642031878
|9 978-3-642-03187-8
|
024 |
7 |
|
|a 10.1007/978-3-642-03187-8
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.82
|2 23
|
100 |
1 |
|
|a Wang, Feng-Hsing.
|e author.
|
245 |
1 |
0 |
|a Innovations in Digital Watermarking Techniques
|h [electronic resource] /
|c by Feng-Hsing Wang, Jeng-Shyang Pan, Lakhmi C. Jain.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2009.
|
300 |
|
|
|a XIV, 186 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Studies in Computational Intelligence,
|x 1860-949X ;
|v 232
|
505 |
0 |
|
|a and Background -- Digital Watermarking Techniques -- Intelligent Techniques -- Intelligent Watermarking -- Spatial-Based Watermarking Schemes and Pixel Selection -- Discrete Cosine Transform Based Watermarking Scheme and Band Selection -- Vector Quantisation Based Watermarking Schemes and Codebook Partition -- Genetic Index Assignment -- Genetic Watermark Modification -- Hybrid Systems of Digital Watermarking -- Watermarking Based on Multiple Description VQ -- Fake Watermark Embedding Scheme Based on Multi-Stage VQ -- Watermarking with Visual Cryptography and Gain-Shape VQ -- Summary -- Conclusions and Future Directions.
|
520 |
|
|
|a Information security and copyright protection are more important today than before. Digital watermarking is one of the widely used techniques used in the world in the area of information security. This book introduces a number of digital watermarking techniques and is divided into four parts. The first part introduces the importance of watermarking techniques and intelligent technology. The second part includes a number of watermarking techniques. The third part includes the hybrid watermarking techniques and the final part presents conclusions. This book is directed to students, professors, researchers and application engineers who are interested in the area of information security.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
0 |
|a Applied mathematics.
|
650 |
|
0 |
|a Engineering mathematics.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Appl.Mathematics/Computational Methods of Engineering.
|
650 |
2 |
4 |
|a Artificial Intelligence (incl. Robotics).
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
700 |
1 |
|
|a Pan, Jeng-Shyang.
|e author.
|
700 |
1 |
|
|a Jain, Lakhmi C.
|e author.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642031861
|
830 |
|
0 |
|a Studies in Computational Intelligence,
|x 1860-949X ;
|v 232
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-03187-8
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|