Data Hiding and Its Applications : : Digital Watermarking and Steganography / / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi.

Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding metho...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
TeilnehmendeR:
Place / Publishing House:Basel : : MDPI - Multidisciplinary Digital Publishing Institute,, 2022.
Year of Publication:2022
Language:English
Physical Description:1 online resource (234 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993603471004498
ctrlnum (CKB)5400000000043753
(NjHacI)995400000000043753
(EXLCZ)995400000000043753
collection bib_alma
record_format marc
spelling Megías, David, author.
Data Hiding and Its Applications : Digital Watermarking and Steganography / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi.
Data Hiding and Its Applications
Basel : MDPI - Multidisciplinary Digital Publishing Institute, 2022.
1 online resource (234 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Description based on online resource; title from PDF title page (MDPI - Multidisciplinary Digital Publishing Institute, viewed June 27, 2023).
Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others.
Computer security.
Computer security Management.
3-0365-2936-5
Mazurczyk, Wojciech, author.
Kuribayashi, Minoru, author.
language English
format eBook
author Megías, David,
Mazurczyk, Wojciech,
Kuribayashi, Minoru,
spellingShingle Megías, David,
Mazurczyk, Wojciech,
Kuribayashi, Minoru,
Data Hiding and Its Applications : Digital Watermarking and Steganography /
author_facet Megías, David,
Mazurczyk, Wojciech,
Kuribayashi, Minoru,
Mazurczyk, Wojciech,
Kuribayashi, Minoru,
author_variant d m dm
w m wm
m k mk
author_role VerfasserIn
VerfasserIn
VerfasserIn
author2 Mazurczyk, Wojciech,
Kuribayashi, Minoru,
author2_role TeilnehmendeR
TeilnehmendeR
author_sort Megías, David,
title Data Hiding and Its Applications : Digital Watermarking and Steganography /
title_sub Digital Watermarking and Steganography /
title_full Data Hiding and Its Applications : Digital Watermarking and Steganography / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi.
title_fullStr Data Hiding and Its Applications : Digital Watermarking and Steganography / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi.
title_full_unstemmed Data Hiding and Its Applications : Digital Watermarking and Steganography / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi.
title_auth Data Hiding and Its Applications : Digital Watermarking and Steganography /
title_alt Data Hiding and Its Applications
title_new Data Hiding and Its Applications :
title_sort data hiding and its applications : digital watermarking and steganography /
publisher MDPI - Multidisciplinary Digital Publishing Institute,
publishDate 2022
physical 1 online resource (234 pages)
isbn 3-0365-2936-5
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 A25 M445 42022
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
work_keys_str_mv AT megiasdavid datahidinganditsapplicationsdigitalwatermarkingandsteganography
AT mazurczykwojciech datahidinganditsapplicationsdigitalwatermarkingandsteganography
AT kuribayashiminoru datahidinganditsapplicationsdigitalwatermarkingandsteganography
AT megiasdavid datahidinganditsapplications
AT mazurczykwojciech datahidinganditsapplications
AT kuribayashiminoru datahidinganditsapplications
status_str n
ids_txt_mv (CKB)5400000000043753
(NjHacI)995400000000043753
(EXLCZ)995400000000043753
carrierType_str_mv cr
is_hierarchy_title Data Hiding and Its Applications : Digital Watermarking and Steganography /
author2_original_writing_str_mv noLinkedField
noLinkedField
_version_ 1796653217929494531
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01928nam a2200313 i 4500</leader><controlfield tag="001">993603471004498</controlfield><controlfield tag="005">20230629092132.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">230629s2022 sz o 000 0 eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5400000000043753</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)995400000000043753</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995400000000043753</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">.M445 2022</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Megías, David,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data Hiding and Its Applications :</subfield><subfield code="b">Digital Watermarking and Steganography /</subfield><subfield code="c">David Megías, Wojciech Mazurczyk, Minoru Kuribayashi.</subfield></datafield><datafield tag="246" ind1=" " ind2=" "><subfield code="a">Data Hiding and Its Applications </subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Basel :</subfield><subfield code="b">MDPI - Multidisciplinary Digital Publishing Institute,</subfield><subfield code="c">2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (234 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (MDPI - Multidisciplinary Digital Publishing Institute, viewed June 27, 2023).</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-0365-2936-5</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mazurczyk, Wojciech,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kuribayashi, Minoru,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-07-08 12:04:47 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-04-04 09:22:53 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5338126390004498&amp;Force_direct=true</subfield><subfield code="Z">5338126390004498</subfield><subfield code="b">Available</subfield><subfield code="8">5338126390004498</subfield></datafield></record></collection>