It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 04561cam 2201069 a 4500
001 ocn704393874
003 OCoLC
005 20220713025237.0
008 110301s2011 gw a ob 101 0 eng d
006 m o d
007 cr cn|||||||||
040 $aGW5XE$beng$epn$cGW5XE$dOCLCQ$dGZM$dOCLCQ$dWAU$dOCLCO$dOCLCA$dOHI$dOCLCF$dBEDGE$dOCL$dOCLCQ$dSHS$dESU$dIOG$dTFW$dOCLCO$dU3W$dWYU$dCNTRU$dOCLCQ$dWURST$dOCLCA$dAJS$dOCLCQ$dOCLCO$dCOM$dOCLCO
019 $a769769847
020 $a9783642184055$q(electronic bk.)
020 $a3642184057$q(electronic bk.)
020 $z9783642184048
024 7 $a10.1007/978-3-642-18405-5$2doi
035 $a(OCoLC)704393874$z(OCoLC)769769847
037 $a978-3-642-18404-8$bSpringer$nhttp://www.springerlink.com
050 4 $aQA76.9.A25$bI93 2011
072 7 $aQA$2lcco
072 7 $aURY$2bicssc
072 7 $aCOM053000$2bisacsh
082 04 $a005.8$222
111 2 $aIWDW (Conference)$n(9th :$d2010 :$cSeoul, Korea)
245 10 $aDigital watermarking :$b9th international workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010 : revised selected papers /$cHyoung-Joong Kim, Yun-Qing Shi, Mauro Barni (eds.).
246 30 $aIWDW 2010
260 $aBerlin ;$aNew York :$bSpringer,$c©2011.
300 $a1 online resource (x, 316 pages) :$billustrations
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
347 $atext file
347 $bPDF
490 1 $aLecture notes in computer science,$x1611-3349 ;$v6526
504 $aIncludes bibliographical references and index.
588 0 $aPrint version record.
520 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held in Seoul, Korea, in October 2010. The 26 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on forensics, visual cryptography, robust watermarking, steganography, fingerprinting, and steganalysis.
650 0 $aDigital watermarking$vCongresses.
650 6 $aTatouage numérique$vCongrès.
650 7 $aInformatique.$2eclas
650 7 $aDigital watermarking.$2fast$0(OCoLC)fst00893746
650 7 $aElektronisches Wasserzeichen$2gnd
650 7 $aSteganographie$2gnd
650 7 $aKryptoanalyse$2gnd
650 7 $aGeheimnisprinzip$2gnd
650 7 $aMultimedia$2gnd
650 7 $aSicherheitsprotokoll$2gnd
650 7 $aComputerforensik$2gnd
650 7 $aBildverarbeitung$2gnd
650 7 $aAuthentifikation$2gnd
651 7 $aSeoul <2010>$2swd
653 00 $ainformatieontsluiting
653 00 $ainformation retrieval
653 00 $ainformatieopslag
653 00 $ainformation storage
653 00 $acomputergrafie
653 00 $acomputer graphics
653 00 $abeeldverwerking
653 00 $aimage processing
653 00 $amachine vision
653 00 $acomputerwetenschappen
653 00 $acomputer sciences
653 00 $agegevensbeheer
653 00 $adata management
653 00 $ainformatietheorie
653 00 $ainformation theory
653 00 $agegevensstructuren
653 00 $adata structures
653 10 $aInformation and Communication Technology (General)
653 10 $aInformatie- en communicatietechnologie (algemeen)
655 0 $aElectronic books.
655 2 $aCongress
655 4 $aElectronic books.
655 7 $aConference papers and proceedings.$2fast$0(OCoLC)fst01423772
655 7 $aConference papers and proceedings.$2lcgft
655 7 $aActes de congrès.$2rvmgf
655 7 $aKongress.$2swd
700 1 $aKim, Hyoung Joong,$d1954-
700 1 $aShi, Yun Q.
700 1 $aBarni, Mauro,$cPh. D.
776 08 $iPrint version:$tDigital watermarking.$dBerlin : Springer, 2011$z9783642184048$w(OCoLC)698166124
830 0 $aLecture notes in computer science ;$v6526.$x0302-9743
856 40 $3SpringerLink$uhttps://doi.org/10.1007/978-3-642-18405-5
856 40 $3SpringerLink$uhttps://link.springer.com/book/10.1007/978-3-642-18405-5
856 40 $uhttp://VH7QX3XE2P.search.serialssolutions.com/?V=1.0&L=VH7QX3XE2P&S=JCs&C=TC0000476063&T=marc&tab=BOOKS
856 41 $3Table of contents$uhttp://d-nb.info/1009117904/04
856 42 $3Inhaltstext$qtext/html$uhttp://deposit.d-nb.de/cgi-bin/dokserv?id=3639535&prov=M&dok_var=1&dok_ext=htm
029 1 $aAU@$b000048699026
029 1 $aNZ1$b13669332
994 $aZ0$bIME
948 $hNO HOLDINGS IN IME - 357 OTHER HOLDINGS