000 | 03076nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-3-642-18405-5 | ||
003 | DE-He213 | ||
005 | 20240730193200.0 | ||
007 | cr nn 008mamaa | ||
008 | 110117s2011 gw | s |||| 0|eng d | ||
020 |
_a9783642184055 _9978-3-642-18405-5 |
||
024 | 7 |
_a10.1007/978-3-642-18405-5 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aDigital Watermarking _h[electronic resource] : _b9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers / _cedited by Hyoung-Joong Kim, Yun Q. Shi, Mauro Barni. |
250 | _a1st ed. 2011. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2011. |
|
300 |
_aX, 317 p. 140 illus., 60 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v6526 |
|
520 | _aThis book constitutes the thoroughly refereed post-conference proceedings of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held in Seoul, Korea, in October 2010. The 26 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on forensics, visual cryptography, robust watermarking, steganography, fingerprinting, and steganalysis. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aData structures (Computer science). _98188 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aCoding theory. _94154 |
|
650 | 0 |
_aInformation storage and retrieval systems. _922213 |
|
650 | 0 |
_aComputer graphics. _94088 |
|
650 | 0 |
_aComputer vision. _9152787 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aData Structures and Information Theory. _931923 |
650 | 2 | 4 |
_aCoding and Information Theory. _9152788 |
650 | 2 | 4 |
_aInformation Storage and Retrieval. _923927 |
650 | 2 | 4 |
_aComputer Graphics. _94088 |
650 | 2 | 4 |
_aComputer Vision. _9152789 |
700 | 1 |
_aKim, Hyoung-Joong. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9152790 |
|
700 | 1 |
_aShi, Yun Q. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9152791 |
|
700 | 1 |
_aBarni, Mauro. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9152792 |
|
710 | 2 |
_aSpringerLink (Online service) _9152793 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642184048 |
776 | 0 | 8 |
_iPrinted edition: _z9783642184062 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v6526 _9152794 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-18405-5 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c94637 _d94637 |