|
|
|
|
LEADER |
02656nam a22005895i 4500 |
001 |
978-981-10-0506-0 |
003 |
DE-He213 |
005 |
20160621191814.0 |
007 |
cr nn 008mamaa |
008 |
160621s2016 si | s |||| 0|eng d |
020 |
|
|
|a 9789811005060
|9 978-981-10-0506-0
|
024 |
7 |
|
|a 10.1007/978-981-10-0506-0
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK5102.9
|
050 |
|
4 |
|a TA1637-1638
|
050 |
|
4 |
|a TK7882.S65
|
072 |
|
7 |
|a TTBM
|2 bicssc
|
072 |
|
7 |
|a UYS
|2 bicssc
|
072 |
|
7 |
|a TEC008000
|2 bisacsh
|
072 |
|
7 |
|a COM073000
|2 bisacsh
|
082 |
0 |
4 |
|a 621.382
|2 23
|
100 |
1 |
|
|a Bas, Patrick.
|e author.
|
245 |
1 |
0 |
|a Watermarking Security
|h [electronic resource] /
|c by Patrick Bas, Teddy Furon, François Cayre, Gwenaël Doërr, Benjamin Mathon.
|
264 |
|
1 |
|a Singapore :
|b Springer Singapore :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a IX, 125 p. 70 illus., 29 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a SpringerBriefs in Electrical and Computer Engineering,
|x 2191-8112
|
505 |
0 |
|
|a General Introduction -- A quick tour of watermarking techniques -- Fundamentals -- Secure Design -- Attacks -- Conclusions and Open Problems.
|
520 |
|
|
|a This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.
|
650 |
|
0 |
|a Engineering.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a System safety.
|
650 |
1 |
4 |
|a Engineering.
|
650 |
2 |
4 |
|a Signal, Image and Speech Processing.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Security Science and Technology.
|
650 |
2 |
4 |
|a Data Encryption.
|
700 |
1 |
|
|a Furon, Teddy.
|e author.
|
700 |
1 |
|
|a Cayre, François.
|e author.
|
700 |
1 |
|
|a Doërr, Gwenaël.
|e author.
|
700 |
1 |
|
|a Mathon, Benjamin.
|e author.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811005053
|
830 |
|
0 |
|a SpringerBriefs in Electrical and Computer Engineering,
|x 2191-8112
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-981-10-0506-0
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|