000 | 03117nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-981-10-0506-0 | ||
003 | DE-He213 | ||
005 | 20220801222440.0 | ||
007 | cr nn 008mamaa | ||
008 | 160621s2016 si | s |||| 0|eng d | ||
020 |
_a9789811005060 _9978-981-10-0506-0 |
||
024 | 7 |
_a10.1007/978-981-10-0506-0 _2doi |
|
050 | 4 | _aTK5102.9 | |
072 | 7 |
_aTJF _2bicssc |
|
072 | 7 |
_aUYS _2bicssc |
|
072 | 7 |
_aTEC008000 _2bisacsh |
|
072 | 7 |
_aTJF _2thema |
|
072 | 7 |
_aUYS _2thema |
|
082 | 0 | 4 |
_a621.382 _223 |
100 | 1 |
_aBas, Patrick. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _961540 |
|
245 | 1 | 0 |
_aWatermarking Security _h[electronic resource] / _cby Patrick Bas, Teddy Furon, François Cayre, Gwenaël Doërr, Benjamin Mathon. |
250 | _a1st ed. 2016. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2016. |
|
300 |
_aIX, 125 p. 70 illus., 29 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSpringerBriefs in Signal Processing, _x2196-4084 |
|
505 | 0 | _aGeneral Introduction -- A quick tour of watermarking techniques -- Fundamentals -- Secure Design -- Attacks -- Conclusions and Open Problems. | |
520 | _aThis book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain. | ||
650 | 0 |
_aSignal processing. _94052 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aSecurity systems. _931879 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 1 | 4 |
_aSignal, Speech and Image Processing . _931566 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aSecurity Science and Technology. _931884 |
650 | 2 | 4 |
_aCryptology. _931769 |
700 | 1 |
_aFuron, Teddy. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _961541 |
|
700 | 1 |
_aCayre, François. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _961542 |
|
700 | 1 |
_aDoërr, Gwenaël. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _961543 |
|
700 | 1 |
_aMathon, Benjamin. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _961544 |
|
710 | 2 |
_aSpringerLink (Online service) _961545 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789811005053 |
776 | 0 | 8 |
_iPrinted edition: _z9789811005077 |
830 | 0 |
_aSpringerBriefs in Signal Processing, _x2196-4084 _961546 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-10-0506-0 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c80778 _d80778 |