LEADER 00869nam0-22003371i-450- 001 990000895510403321 005 20001010 010 $a88-386-0608-0 035 $a000089551 035 $aFED01000089551 035 $a(Aleph)000089551FED01 035 $a000089551 100 $a20001010d--------km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $aUnix System V°$eComplementi di Programmazione 205 $a1 ed 210 $aMilano$cMcGraw Hill$d1988 215 $ap.557$cill.$dcm 15 610 0 $aInformatica 700 1$aThomas,$bRebecca$042431 702 1$aRogers,$bLawrence R. 702 1$aYates,$bjean L. 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990000895510403321 952 $a03 INF.0,19$b385$fIINTC 959 $aIINTC 996 $aUnix System V$9356994 997 $aUNINA DB $aING01 LEADER 05641nam 22007334a 450 001 9910450945103321 005 20200520144314.0 010 $a1-281-09616-4 010 $a9786611096168 010 $a0-08-055580-2 035 $a(CKB)1000000000413987 035 $a(EBL)328311 035 $a(OCoLC)227968408 035 $a(SSID)ssj0000139251 035 $a(PQKBManifestationID)11147728 035 $a(PQKBTitleCode)TC0000139251 035 $a(PQKBWorkID)10008230 035 $a(PQKB)10450039 035 $a(MiAaPQ)EBC328311 035 $a(Au-PeEL)EBL328311 035 $a(CaPaEBR)ebr10204371 035 $a(CaONFJC)MIL109616 035 $a(OCoLC)190760116 035 $a(EXLCZ)991000000000413987 100 $a20071001d2008 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aDigital watermarking and steganography$b[electronic resource] /$fIngemar J. Cox ... [et al.] 205 $a2nd ed. 210 $aAmsterdam ;$aBoston $cMorgan Kaufmann Publishers$dc2008 215 $a1 online resource (623 p.) 225 1 $aThe Morgan Kaufmann series in multimedia information and systems 225 1 $aThe Morgan kaufmann series in computer security 300 $aPrev. ed. entered under Cox. 311 $a0-12-372585-2 320 $aIncludes bibliographical references (p. 549-574) and index. 327 $aFront Cover; Digital Watermarking and Steganography; Copyright Page; Table of Contents; Preface to the First Edition; Preface to the Second Edition; Example Watermarking Systems; Chapter 1. Introduction; 1.1 Information Hiding, Steganography, and Watermarking; 1.2 History of Watermarking; 1.3 History of Steganography; 1.4 Importance of Digital Watermarking; 1.5 Importance of Steganography; Chapter 2. Applications and Properties; 2.1 Applications of Watermarking; 2.2 Applications of Steganography; 2.3 Properties of Watermarking Systems; 2.4 Evaluating Watermarking Systems 327 $a2.5 Properties of Steganographic and Steganalysis Systems2.6 Evaluating and Testing Steganographic Systems; 2.7 Summary; Chapter 3. Models of Watermarking; 3.1 Notation; 3.2 Communications; 3.3 Communication-Based Models of Watermarking; 3.4 Geometric Models of Watermarking; 3.5 Modeling Watermark Detection by Correlation; 3.6 Summary; Chapter 4. Basic Message Coding; 4.1 Mapping Messages into Message Vectors; 4.2 Error Correction Coding; 4.3 Detecting Multisymbol Watermarks; 4.4 Summary; Chapter 5. Watermarking with Side Information; 5.1 Informed Embedding 327 $a5.2 Watermarking Using Side Information5.3 Dirty-Paper Codes; 5.4 Summary; Chapter 6. Practical Dirty-Paper Codes; 6.1 Practical Considerations for Dirty-Paper Codes; 6.2 Broad Approaches to Dirty-Paper Code Design; 6.3 Implementing DM with A Simple Lattice Code; 6.4 Typical Tricks in Implementing Lattice Codes; 6.5 Coding with Better Lattices; 6.6 Making Lattice Codes Survive Valumetric Scaling; 6.7 Dirty-Paper Trellis Codes; 6.8 Summary; Chapter 7. Analyzing Errors; 7.1 Message Errors; 7.2 False Positive Errors; 7.3 False Negative Errors; 7.4 ROC Curves 327 $a7.5 The Effect of Whitening on Error Rates7.6 Analysis of Normalized Correlation; 7.7 Summary; Chapter 8. Using Perceptual Models; 8.1 Evaluating Perceptual Impact of Watermarks; 8.2 General Form of A Perceptual Model; 8.3 Two Examples of Perceptual Models; 8.4 Perceptually Adaptive Watermarking; 8.5 Summary; Chapter 9. Robust Watermarking; 9.1 Approaches; 9.2 Robustness to Valumetric Distortions; 9.3 Robustness to Temporal and Geometric Distortions; 9.4 Summary; Chapter 10. Watermark Security; 10.1 Security Requirements; 10.2 Watermark Security and Cryptography 327 $a10.3 Some Significant Known Attacks10.4 Summary; Chapter 11. Content Authentication; 11.1 Exact Authentication; 11.2 Selective Authentication; 11.3 Localization; 11.4 Restoration; 11.5 Summary; Chapter 12. Steganography; 12.1 Steganographic Communication; 12.2 Notation and Terminology; 12.3 Information-Theoretic Foundations of Steganography; 12.4 Practical Steganographic Methods; 12.5 Minimizing the Embedding Impact; 12.6 Summary; Chapter 13. Steganalysis; 13.1 Steganalysis Scenarios; 13.2 Some Significant Steganalysis Algorithms; 13.3 Summary; Appendix A. Background Concepts 327 $aA.1 Information Theory 330 $aDigital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition 410 0$aMorgan Kaufmann series in multimedia information and systems. 410 0$aMorgan Kaufmann series in computer security. 606 $aComputer security 606 $aDigital watermarking 606 $aData protection 608 $aElectronic books. 615 0$aComputer security. 615 0$aDigital watermarking. 615 0$aData protection. 676 $a005.8 701 $aCox$b I. J$g(Ingemar J.)$0627536 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910450945103321 996 $aDigital watermarking and steganography$92476110 997 $aUNINA