000 | 02669nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-981-10-0506-0 | ||
003 | DE-He213 | ||
005 | 20200420221302.0 | ||
007 | cr nn 008mamaa | ||
008 | 160621s2016 si | s |||| 0|eng d | ||
020 |
_a9789811005060 _9978-981-10-0506-0 |
||
024 | 7 |
_a10.1007/978-981-10-0506-0 _2doi |
|
050 | 4 | _aTK5102.9 | |
050 | 4 | _aTA1637-1638 | |
050 | 4 | _aTK7882.S65 | |
072 | 7 |
_aTTBM _2bicssc |
|
072 | 7 |
_aUYS _2bicssc |
|
072 | 7 |
_aTEC008000 _2bisacsh |
|
072 | 7 |
_aCOM073000 _2bisacsh |
|
082 | 0 | 4 |
_a621.382 _223 |
100 | 1 |
_aBas, Patrick. _eauthor. |
|
245 | 1 | 0 |
_aWatermarking Security _h[electronic resource] / _cby Patrick Bas, Teddy Furon, Fran�cois Cayre, Gwena�el Do�err, Benjamin Mathon. |
264 | 1 |
_aSingapore : _bSpringer Singapore : _bImprint: Springer, _c2016. |
|
300 |
_aIX, 125 p. 70 illus., 29 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSpringerBriefs in Electrical and Computer Engineering, _x2191-8112 |
|
505 | 0 | _aGeneral Introduction -- A quick tour of watermarking techniques -- Fundamentals -- Secure Design -- Attacks -- Conclusions and Open Problems. | |
520 | _aThis book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain. | ||
650 | 0 | _aEngineering. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aSystem safety. | |
650 | 1 | 4 | _aEngineering. |
650 | 2 | 4 | _aSignal, Image and Speech Processing. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aSecurity Science and Technology. |
650 | 2 | 4 | _aData Encryption. |
700 | 1 |
_aFuron, Teddy. _eauthor. |
|
700 | 1 |
_aCayre, Fran�cois. _eauthor. |
|
700 | 1 |
_aDo�err, Gwena�el. _eauthor. |
|
700 | 1 |
_aMathon, Benjamin. _eauthor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9789811005053 |
830 | 0 |
_aSpringerBriefs in Electrical and Computer Engineering, _x2191-8112 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-981-10-0506-0 |
912 | _aZDB-2-ENG | ||
942 | _cEBK | ||
999 |
_c53256 _d53256 |