Digital watermarking and steganography
Enregistré dans:
| Collectivité auteur: | ebrary, Inc |
|---|---|
| Autres auteurs: | Cox, I. J. (Ingemar J.) |
| Format: | Électronique eBook |
| Langue: | anglais |
| Publié: |
Amsterdam ; Boston :
Morgan Kaufmann Publishers,
c2008.
|
| Édition: | 2nd ed. |
| Collection: | Morgan Kaufmann series in multimedia information and systems.
Morgan Kaufmann series in computer security. |
| Sujets: | |
| Accès en ligne: | An electronic book accessible through the World Wide Web; click to view |
| Tags: |
Ajouter un tag
Pas de tags, Soyez le premier à ajouter un tag!
|
Documents similaires
Digital watermarking and steganography
Publié: (2008)
Publié: (2008)
Intelligent watermarking techniques
Publié: (2004)
Publié: (2004)
Intelligent watermarking techniques
Publié: (2004)
Publié: (2004)
Techniques and applications of digital watermarking and content protection
par: Arnold, Michael (Michael Konrad), 1964-
Publié: (2003)
par: Arnold, Michael (Michael Konrad), 1964-
Publié: (2003)
Techniques and applications of digital watermarking and content protection
par: Arnold, Michael (Michael Konrad), 1964-
Publié: (2003)
par: Arnold, Michael (Michael Konrad), 1964-
Publié: (2003)
Color image watermarking : algorithms and technologies /
par: Su, Qingtang
Publié: (2017)
par: Su, Qingtang
Publié: (2017)
Color image watermarking : algorithms and technologies /
par: Su, Qingtang
Publié: (2017)
par: Su, Qingtang
Publié: (2017)
Papers from the first European workshop on technological & security issues in digital rights management (EuDiRights)
Publié: (2007)
Publié: (2007)
Papers from the first European workshop on technological & security issues in digital rights management (EuDiRights)
Publié: (2007)
Publié: (2007)
Information security policy, processes, and practices /
Publié: (2008)
Publié: (2008)
Information security policy, processes, and practices /
Publié: (2008)
Publié: (2008)
Black hat physical device security exploiting hardware and software /
par: Miller, Drew
Publié: (2005)
par: Miller, Drew
Publié: (2005)
A process for developing a common vocabulary in the information security area
Publié: (2007)
Publié: (2007)
Comptia Security+ 2008 in depth
par: Ciampa, Mark D.
Publié: (2009)
par: Ciampa, Mark D.
Publié: (2009)
Information assurance for the enterprise : a roadmap to information security /
par: Schou, Corey
Publié: (2007)
par: Schou, Corey
Publié: (2007)
Information assurance and computer security
Publié: (2006)
Publié: (2006)
Data privacy in the information age
par: Klosek, Jacqueline, 1972-
Publié: (2000)
par: Klosek, Jacqueline, 1972-
Publié: (2000)
Getting started with FortiGate /
par: Fabbri, Rosato
Publié: (2013)
par: Fabbri, Rosato
Publié: (2013)
Comptia Security+ 2008 in depth
par: Ciampa, Mark D.
Publié: (2009)
par: Ciampa, Mark D.
Publié: (2009)
A process for developing a common vocabulary in the information security area
Publié: (2007)
Publié: (2007)
Information assurance and computer security
Publié: (2006)
Publié: (2006)
Information assurance for the enterprise : a roadmap to information security /
par: Schou, Corey
Publié: (2007)
par: Schou, Corey
Publié: (2007)
Data privacy in the information age
par: Klosek, Jacqueline, 1972-
Publié: (2000)
par: Klosek, Jacqueline, 1972-
Publié: (2000)
Black hat physical device security exploiting hardware and software /
par: Miller, Drew
Publié: (2005)
par: Miller, Drew
Publié: (2005)
Getting started with FortiGate /
par: Fabbri, Rosato
Publié: (2013)
par: Fabbri, Rosato
Publié: (2013)
Implementing database security and auditing
par: Ben-Natan, Ron
Publié: (2005)
par: Ben-Natan, Ron
Publié: (2005)
Implementing database security and auditing
par: Ben-Natan, Ron
Publié: (2005)
par: Ben-Natan, Ron
Publié: (2005)
Crackproof your software the best ways to protect your software against crackers /
par: C̆ervĕn, Pavol
Publié: (2002)
par: C̆ervĕn, Pavol
Publié: (2002)
Crackproof your software the best ways to protect your software against crackers /
par: C̆ervĕn, Pavol
Publié: (2002)
par: C̆ervĕn, Pavol
Publié: (2002)
A practical guide to managing information security
par: Purser, Steve
Publié: (2004)
par: Purser, Steve
Publié: (2004)
Information security management principles
par: Alexander, David
Publié: (2013)
par: Alexander, David
Publié: (2013)
A practical guide to managing information security
par: Purser, Steve
Publié: (2004)
par: Purser, Steve
Publié: (2004)
Information security management principles
par: Alexander, David
Publié: (2013)
par: Alexander, David
Publié: (2013)
Technology and privacy the new landscape /
Publié: (1997)
Publié: (1997)
Privacy protection and computer forensics
par: Caloyannides, Michael A.
Publié: (2004)
par: Caloyannides, Michael A.
Publié: (2004)
Finding and fixing vulnerabilities in information systems the vulnerability assessment & mitigation methodology /
Publié: (2003)
Publié: (2003)
Technology and privacy the new landscape /
Publié: (1997)
Publié: (1997)
Finding and fixing vulnerabilities in information systems the vulnerability assessment & mitigation methodology /
Publié: (2003)
Publié: (2003)
Privacy protection and computer forensics
par: Caloyannides, Michael A.
Publié: (2004)
par: Caloyannides, Michael A.
Publié: (2004)
Identity, security and democracy the wider social and ethical implications of automated systems for human identification /
Publié: (2009)
Publié: (2009)
Documents similaires
-
Digital watermarking and steganography
Publié: (2008) -
Intelligent watermarking techniques
Publié: (2004) -
Intelligent watermarking techniques
Publié: (2004) -
Techniques and applications of digital watermarking and content protection
par: Arnold, Michael (Michael Konrad), 1964-
Publié: (2003) -
Techniques and applications of digital watermarking and content protection
par: Arnold, Michael (Michael Konrad), 1964-
Publié: (2003)