Data Hiding and Its Applications : : Digital Watermarking and Steganography / / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi.
Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding metho...
Saved in:
VerfasserIn: | |
---|---|
TeilnehmendeR: | |
Place / Publishing House: | Basel : : MDPI - Multidisciplinary Digital Publishing Institute,, 2022. |
Year of Publication: | 2022 |
Language: | English |
Physical Description: | 1 online resource (234 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993603471004498 |
---|---|
ctrlnum |
(CKB)5400000000043753 (NjHacI)995400000000043753 (EXLCZ)995400000000043753 |
collection |
bib_alma |
record_format |
marc |
spelling |
Megías, David, author. Data Hiding and Its Applications : Digital Watermarking and Steganography / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi. Data Hiding and Its Applications Basel : MDPI - Multidisciplinary Digital Publishing Institute, 2022. 1 online resource (234 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Description based on online resource; title from PDF title page (MDPI - Multidisciplinary Digital Publishing Institute, viewed June 27, 2023). Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others. Computer security. Computer security Management. 3-0365-2936-5 Mazurczyk, Wojciech, author. Kuribayashi, Minoru, author. |
language |
English |
format |
eBook |
author |
Megías, David, Mazurczyk, Wojciech, Kuribayashi, Minoru, |
spellingShingle |
Megías, David, Mazurczyk, Wojciech, Kuribayashi, Minoru, Data Hiding and Its Applications : Digital Watermarking and Steganography / |
author_facet |
Megías, David, Mazurczyk, Wojciech, Kuribayashi, Minoru, Mazurczyk, Wojciech, Kuribayashi, Minoru, |
author_variant |
d m dm w m wm m k mk |
author_role |
VerfasserIn VerfasserIn VerfasserIn |
author2 |
Mazurczyk, Wojciech, Kuribayashi, Minoru, |
author2_role |
TeilnehmendeR TeilnehmendeR |
author_sort |
Megías, David, |
title |
Data Hiding and Its Applications : Digital Watermarking and Steganography / |
title_sub |
Digital Watermarking and Steganography / |
title_full |
Data Hiding and Its Applications : Digital Watermarking and Steganography / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi. |
title_fullStr |
Data Hiding and Its Applications : Digital Watermarking and Steganography / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi. |
title_full_unstemmed |
Data Hiding and Its Applications : Digital Watermarking and Steganography / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi. |
title_auth |
Data Hiding and Its Applications : Digital Watermarking and Steganography / |
title_alt |
Data Hiding and Its Applications |
title_new |
Data Hiding and Its Applications : |
title_sort |
data hiding and its applications : digital watermarking and steganography / |
publisher |
MDPI - Multidisciplinary Digital Publishing Institute, |
publishDate |
2022 |
physical |
1 online resource (234 pages) |
isbn |
3-0365-2936-5 |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.9 A25 M445 42022 |
illustrated |
Not Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
work_keys_str_mv |
AT megiasdavid datahidinganditsapplicationsdigitalwatermarkingandsteganography AT mazurczykwojciech datahidinganditsapplicationsdigitalwatermarkingandsteganography AT kuribayashiminoru datahidinganditsapplicationsdigitalwatermarkingandsteganography AT megiasdavid datahidinganditsapplications AT mazurczykwojciech datahidinganditsapplications AT kuribayashiminoru datahidinganditsapplications |
status_str |
n |
ids_txt_mv |
(CKB)5400000000043753 (NjHacI)995400000000043753 (EXLCZ)995400000000043753 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Data Hiding and Its Applications : Digital Watermarking and Steganography / |
author2_original_writing_str_mv |
noLinkedField noLinkedField |
_version_ |
1796653217929494531 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01928nam a2200313 i 4500</leader><controlfield tag="001">993603471004498</controlfield><controlfield tag="005">20230629092132.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">230629s2022 sz o 000 0 eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5400000000043753</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)995400000000043753</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995400000000043753</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">.M445 2022</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Megías, David,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data Hiding and Its Applications :</subfield><subfield code="b">Digital Watermarking and Steganography /</subfield><subfield code="c">David Megías, Wojciech Mazurczyk, Minoru Kuribayashi.</subfield></datafield><datafield tag="246" ind1=" " ind2=" "><subfield code="a">Data Hiding and Its Applications </subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Basel :</subfield><subfield code="b">MDPI - Multidisciplinary Digital Publishing Institute,</subfield><subfield code="c">2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (234 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (MDPI - Multidisciplinary Digital Publishing Institute, viewed June 27, 2023).</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-0365-2936-5</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mazurczyk, Wojciech,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kuribayashi, Minoru,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-07-08 12:04:47 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-04-04 09:22:53 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5338126390004498&Force_direct=true</subfield><subfield code="Z">5338126390004498</subfield><subfield code="b">Available</subfield><subfield code="8">5338126390004498</subfield></datafield></record></collection> |