HOME > Detail View

Detail View

Steganography in digital media : principles, algorithms, and applications

Steganography in digital media : principles, algorithms, and applications (Loan 5 times)

Material type
단행본
Personal Author
Fridrich, Jessica.
Title Statement
Steganography in digital media : principles, algorithms, and applications / Jessica Fridrich.
Publication, Distribution, etc
Cambridge ;   New York :   Cambridge University Press,   2010.  
Physical Medium
xxii, 437 p., [4] p. of plates : ill. (some col.) ; 26 cm.
ISBN
9780521190190 (hbk.) 0521190193 (hbk.)
Bibliography, Etc. Note
Includes bibliographical references (p. [409]-426) and index.
Subject Added Entry-Topical Term
Data encryption (Computer science) Data protection. Digital media.
000 01085camuu2200301 a 4500
001 000045682484
005 20111214153717
008 111214s2010 enkaf b 001 0 eng d
010 ▼a 2010285350
015 ▼a GBA984202 ▼2 bnb
020 ▼a 9780521190190 (hbk.)
020 ▼a 0521190193 (hbk.)
035 ▼a (KERIS)REF000015931641
040 ▼a UKM ▼c UKM ▼d BTCTA ▼d BWKUK ▼d YDXCP ▼d BWX ▼d BNG ▼d DLC ▼d 211009
050 0 0 ▼a QA76.9.A25 ▼b F75 2010
082 0 4 ▼a 005.82 ▼2 22
084 ▼a 005.82 ▼2 DDCK
090 ▼a 005.82 ▼b F898s
100 1 ▼a Fridrich, Jessica.
245 1 0 ▼a Steganography in digital media : ▼b principles, algorithms, and applications / ▼c Jessica Fridrich.
260 ▼a Cambridge ; ▼a New York : ▼b Cambridge University Press, ▼c 2010.
300 ▼a xxii, 437 p., [4] p. of plates : ▼b ill. (some col.) ; ▼c 26 cm.
504 ▼a Includes bibliographical references (p. [409]-426) and index.
650 0 ▼a Data encryption (Computer science)
650 0 ▼a Data protection.
650 0 ▼a Digital media.
945 ▼a KLPA

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.82 F898s Accession No. 121215844 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents

Preface; Acknowledgments; 1. Introduction; 2. Digital image formats; 3. Digital image acquisition; 4. Steganographic channel; 5. Naive steganography; 6. Steganographic security; 7. Practical steganographic methods; 8. Matrix embedding; 9. Non-shared selection channel; 10. Steganalysis; 11. Selected targeted attacks; 12. Blind steganalysis; 13. Steganography; A. Statistics; B. Information theory; C. Linear codes; D. Signal detection and estimation; E. Support vector machines; Notation; Glossary; References; Index.


Information Provided By: : Aladin

New Arrivals Books in Related Fields