LEADER 01936oam 2200517zu 450 001 996198149103316 005 20210807003216.0 010 $a1-5090-7838-X 035 $a(CKB)1000000000811970 035 $a(SSID)ssj0000395408 035 $a(PQKBManifestationID)12164235 035 $a(PQKBTitleCode)TC0000395408 035 $a(PQKBWorkID)10451066 035 $a(PQKB)11771034 035 $a(EXLCZ)991000000000811970 100 $a20160829d2008 uy 101 0 $aeng 181 $ctxt 182 $cc 183 $acr 200 10$aIIH-MSP 2008 : 2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing : 15-17 August 2008, Harbin, China 210 31$a[Place of publication not identified]$cIEEE Computer Society$d2008 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a0-7695-3278-0 606 $aComputer security$xSecurity measures$vCongresses 606 $aComputer networks$vCongresses 606 $aCryptography$vCongresses 606 $aDigital watermarking$vCongresses 606 $aData protection$vCongresses 606 $aEngineering & Applied Sciences$2HILCC 606 $aComputer Science$2HILCC 615 0$aComputer security$xSecurity measures 615 0$aComputer networks 615 0$aCryptography 615 0$aDigital watermarking 615 0$aData protection 615 7$aEngineering & Applied Sciences 615 7$aComputer Science 702 $aPan$b Jeng-Shyang$f1961- 712 02$aIEEE Computer Society 712 12$aInternational Conference on Intelligent Information Hiding and Multimedia Signal Processing 801 0$bPQKB 906 $aPROCEEDING 912 $a996198149103316 996 $aIIH-MSP 2008 : 2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing : 15-17 August 2008, Harbin, China$92364541 997 $aUNISA