소장자료
LDR | 01863cam a2200000 a | ||
001 | 0100473163▲ | ||
005 | 20200707094429▲ | ||
007 | ta ▲ | ||
008 | 180309s2018 flu f 001 0 eng c▲ | ||
020 | ▼a9781138054219 (hbk.)▲ | ||
035 | ▼a(KERIS)REF000018656690▲ | ||
040 | ▼aDLC▼beng▼cDLC▼dDLC▼d221016▲ | ||
082 | 0 | 4 | ▼a005.8/24▼223▲ |
090 | ▼a005.824▼bS558h▲ | ||
100 | 1 | ▼aShivani, Shivendra.▲ | |
245 | 1 | 0 | ▼aHandbook of image-based security techniques /▼cShivendra Shivani, Suneeta Agarwal, Jasjit S. Suri.▲ |
246 | 3 | 0 | ▼aImage-based security techniques.▲ |
260 | ▼aBoca Raton :▼bCRC Press,▼c[2018].▲ | ||
300 | ▼axxx, 412 p. ;▼c25 cm.▲ | ||
504 | ▼aIncludes index.▲ | ||
520 | ▼aThis book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. The first section explores basic to advanced concepts of visual cryptography (VC). The second section covers Digital Image Watermarking including watermarking algorithms, frameworks for modeling watermarking systems, and the evaluation of watermarking techniques. The final section analyzes Steganography, including the notion, terminology and building blocks of steganographic communication. The book includes many examples and applications, as well as implementation using MATLAB--Provided by publisher.▲ | ||
650 | 0 | ▼aImage files▼xSecurity measures▼vHandbooks, manuals, etc.▲ | |
650 | 0 | ▼aDigital video▼xSecurity measures▼vHandbooks, manuals, etc.▲ | |
650 | 0 | ▼aData encryption (Computer science)▼vHandbooks, manuals, etc.▲ | |
700 | 1 | ▼aAgarwal, Suneeta.▲ | |
700 | 1 | ▼aSuri, Jasjit S.▲ |

Handbook of image-based security techniques
자료유형
국외단행본
서명/책임사항
Handbook of image-based security techniques / Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri.
다양한 서명
Image-based security techniques.
발행사항
Boca Raton : CRC Press , [2018].
형태사항
xxx, 412 p. ; 25 cm.
서지주기
Includes index.
요약주기
This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. The first section explores basic to advanced concepts of visual cryptography (VC). The second section covers Digital Image Watermarking including watermarking algorithms, frameworks for modeling watermarking systems, and the evaluation of watermarking techniques. The final section analyzes Steganography, including the notion, terminology and building blocks of steganographic communication. The book includes many examples and applications, as well as implementation using MATLAB--Provided by publisher.
주제
ISBN
9781138054219 (hbk.)
청구기호
005.824 S558h
소장정보
예도서예약
서서가에없는책 신고
보보존서고신청
캠캠퍼스대출
우우선정리신청
배자료배달신청
문문자발송
출청구기호출력
학소장학술지 원문서비스
등록번호 | 청구기호 | 소장처 | 도서상태 | 반납예정일 | 서비스 |
---|
북토크
자유롭게 책을 읽고
느낀점을 적어주세요
글쓰기
느낀점을 적어주세요
청구기호 브라우징
관련 인기대출 도서