LEADER 00859nam0 2200277 i 450 001 996276347603316 005 20181204150818.0 010 $a978-88-15-25324-8 100 $a20171206d2017----||||0itac50 ba 101 $aita 102 $aIT 200 1 $a<> arte del sarto nel Medioevo$equando la moda diventa un mestiere$fElisa Tosi Brandi 210 $aBologna$cIl mulino$d2017 215 $a217 p.$cill.$d22 cm 225 2 $aPercorsi$iStoria 410 0$aPercorsi$iStoria 606 0 $aSartoria$xRuolo [delle] Corporazioni medievali$yItalia$zSec. 13.-15.$2BNCF 676 $a338.6320886464 700 1$aTOSI BRANDI,$bElisa$0752421 801 0$aIT$bsalbc$gISBD 912 $a996276347603316 951 $aX.1.B. 1753$b268752 L.M.$cX.1.B.$d439978 959 $aBK 969 $aUMA 996 $aArte del sarto nel Medioevo$91539478 997 $aUNISA LEADER 01704nam 2200385Ia 450 001 996394334303316 005 20221108072322.0 035 $a(CKB)3810000000008228 035 $a(EEBO)2264180196 035 $a(OCoLC)31355826 035 $a(EXLCZ)993810000000008228 100 $a19941025d1643 uy | 101 0 $aeng 135 $aurbn#|||a|bb| 200 12$aA trve Christian svbiect vnder an heathen prince, or, Tertullians plea for allegeance$b[electronic resource] $eargued in time of the sixth persecution, under the Emperour Severus, ann. Dom. 204 : with a briefe application to the citizens of London /$fwritten by a member of the House of Commons 210 $a[Oxford] $cPrinted by Henry Ha[ll$d1642/3] 215 $a[2], 8 [i.e. 6] p 300 $aTertullian selection printed in English and Latin in parallel texts. 300 $aErrors in paging: pages numbered 1,2,3,12,13,8. 300 $aImperfect: first pages torn, with loss of print. Bracketed material in imprint supplied from Wing (2nd ed.) 300 $aSecond part has caption title: Application to the citizens of famous London. 300 $aReproduction of original in the Trinity College Library, University of Dublin. 330 $aeebo-0159 606 $aAllegiance$vEarly works to 1800 606 $aChurch and state$vEarly works to 1800 615 0$aAllegiance 615 0$aChurch and state 700 $aTertullian$fapproximately 160-approximately 230.$0859945 801 0$bEAH 801 1$bEAH 801 2$bWaOLN 906 $aBOOK 912 $a996394334303316 996 $aA trve Christian svbiect vnder an heathen prince, or, Tertullians plea for allegeance$92345389 997 $aUNISA LEADER 08412nam 22008775 450 001 9910144206503321 005 20200706135943.0 010 $a1-280-30800-1 010 $a9786610308002 010 $a3-540-24624-X 024 7 $a10.1007/b95658 035 $a(CKB)1000000000212315 035 $a(DE-He213)978-3-540-24624-4 035 $a(SSID)ssj0000139250 035 $a(PQKBManifestationID)11154885 035 $a(PQKBTitleCode)TC0000139250 035 $a(PQKBWorkID)10008229 035 $a(PQKB)10682249 035 $a(MiAaPQ)EBC3087597 035 $a(PPN)155203088 035 $a(EXLCZ)991000000000212315 100 $a20121227d2004 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDigital Watermarking $eSecond International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers /$fedited by Ton Kalker, Yong M. Ro, Ingemar J. Cox 205 $a1st ed. 2004. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2004. 215 $a1 online resource (XII, 604 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v2939 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-21061-X 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aInvited Talks -- The Importance of Aliasing in Structured Quantization Index Modulation Data Hiding -- Watermark Embedding for Black-Box Channels -- Image Steganography and Steganalysis: Concepts and Practice -- On the Integration of Watermarks and Cryptography -- I: DRM I -- Content-Dependent Anti-disclosure Image Watermark -- Performance Measurement of Watermark Embedding Patterns -- II: Theory -- Image Fusion Based Visible Watermarking Using Dual-Tree Complex Wavelet Transform -- Optimal Data-Hiding Strategies for Games with BER Payoffs -- Robust Wavelet-Based Information Hiding through Low-Density Parity-Check (LDPC) Codes -- III: Non-St+Stego -- Natural Language Watermarking Using Semantic Substitution for Chinese Text -- Resilient Information Hiding for Abstract Semi-structures -- Model-Based Steganography -- IV: Systems -- Authentication of 3-D Polygonal Meshes -- Use of Motion Estimation to Improve Video Watermarking for MPEG Encoders -- A Robust Printed Image Watermarking Based on Iterative Halftoning Method -- A Feature-Watermarking Scheme for JPEG Image Authentication -- V: Estimation -- An Intelligent Watermark Detection Decoder Based on Independent Component Analysis -- Coefficient Selection Methods for Scalable Spread Spectrum Watermarking -- Performance Analysis of Order Statistical Patchwork -- Rotation-Tolerant Watermark Detection Using Circular Harmonic Function Correlation Filter -- VI: Perception+Audio -- On Perceptual Quality of Watermarked Images ? An Experimental Approach -- Audio Watermarking Based on Music Content Analysis: Robust against Time Scale Modification -- Multi-bit Video Watermarking Based on 3D DFT Using Perceptual Models -- EM Estimation of Scale Factor for Quantization-Based Audio Watermarking -- VII: DRM II -- Semi-fragile Watermarking for Tamper Proofing and Authentication of Still Images -- Secure Video Watermarking via Embedding Strength Modulation -- On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving -- Posters -- RST-Resistant Image Watermarking Using Invariant Centroid and Reordered Fourier-Mellin Transform -- Robust Audio Watermarking Using Both DWT and Masking Effect -- Normalization Domain Watermarking Method Based on Pattern Extraction -- Robust Watermarking with Adaptive Receiving -- A Robust Logo Multiresolution Watermarking Based on Independent Component Analysis Extraction -- Highly Reliable Stochastic Perceptual Watermarking Model Based on Multiwavelet Transform -- Metadata Hiding for Content Adaptation -- Echo Watermarking in Sub-band Domain -- Modification of Polar Echo Kernel for Performance Improvement of Audio Watermarking -- Increasing Robustness of an Improved Spread Spectrum Audio Watermarking Method Using Attack Characterization -- Enhancement Methods of Image Quality in Screen Mark Attack -- A Method to Improve the Stego-Image Quality for Palette-Based Image Steganography -- A Secure Steganographic Scheme against Statistical Analyses -- A Three-Dimensional Watermarking Algorithm Using the DCT Transform of Triangle Strips -- High Quality Perceptual Steganographic Techniques -- A Watermarking Scheme Applicable for Fingerprinting Protocol -- A New Digital Watermarking for Architectural Design Drawing Using LINEs and ARCs Based on Vertex -- Public Watermark Detection Using Multiple Proxies and Secret Sharing -- Towards Generic Detection Scheme in Zero Knowledge Protocol for Blind Watermark Detection -- Lossless Watermarking Considering the Human Visual System -- Data-Hiding Capacity Improvement for Text Watermarking Using Space Coding Method. 330 $aWe are happy to present to you the proceedings of the 2nd International Workshop on Digital Watermarking, IWDW 2003. Since its modern re-appearance in the academic community in the early 1990s, great progress has been made in understanding both the capabilities and the weaknesses of digital watermarking. On the theoretical side, we all are now well aware of the fact that digital waterma- ing is best viewed as a form of communication using side information. In the case of digital watermarking the side information in question is the document to be wat- marked. This insight has led to a better understanding of the limits of the capacity and robustness of digital watermarking algorithms. It has also led to new and improved watermarking algorithms, both in terms of capacity and imperceptibility. Similarly, the role of human perception, and models thereof, has been greatly enhanced in the study and design of digital watermarking algorithms and systems. On the practical side, applications of watermarking are not yet abundant. The original euphoria on the role of digital watermarking in copy protection and copyright prot- tion has not resulted in widespread usage in practical systems. With hindsight, a n- ber of reasons can be given for this lack of practical applications. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v2939 606 $aData encryption (Computer science) 606 $aComputers and civilization 606 $aOperating systems (Computers) 606 $aAlgorithms 606 $aMultimedia systems 606 $aManagement information systems 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aMultimedia Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I18059 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science) 615 0$aComputers and civilization. 615 0$aOperating systems (Computers) 615 0$aAlgorithms. 615 0$aMultimedia systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aCryptology. 615 24$aComputers and Society. 615 24$aOperating Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aMultimedia Information Systems. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aKalker$b Ton$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRo$b Yong M$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCox$b Ingemar J$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aIWDW 2003 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910144206503321 996 $aDigital Watermarking$9772245 997 $aUNINA