<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>01510    a2200169   4500</leader>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">9781420047578</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
    <subfield code="a">DLC</subfield>
    <subfield code="b">DLC</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
    <subfield code="a">Shih, Frank Y.</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
    <subfield code="a">Digital watermarking and steganography: fundamentals and techniques</subfield>
    <subfield code="b">fundamentals and techniques</subfield>
    <subfield code="c">Frank Y. Shih.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">Boca Raton :</subfield>
    <subfield code="b">CRC Press,</subfield>
    <subfield code="c">c2008.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">180 p. :</subfield>
    <subfield code="b">ill. ;</subfield>
    <subfield code="c">25 cm.</subfield>
  </datafield>
  <datafield tag="520" ind1="1" ind2=" ">
    <subfield code="a">"Every day millions of people capture, store, transmit, and manipulate digital data. Unfortunately free access digital multimedia communication also provides virtually unprecedented opportunities to pirate copyrighted material. Providing the theoretical background needed to develop and implement advanced techniques and algorithms, Digital Watermarking and Steganography; demonstrates how to develop and implement methods to guarantee the authenticity of digital media; explains the categorization of digital watermarking techniques based on characteristics as well as applications; and presents cutting-edge techniques such as the GA-based breaking algorithm on the frequency-domain steganalytic system." "The popularity of digital media continues to soar. The theoretical foundation presented within this valuable reference will facilitate the creation of new techniques and algorithms to combat present and potential threats against information security."--BK JACKET.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer security.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Multimedia systems</subfield>
    <subfield code="x">Security measures.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Intellectual property.</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="c">BK</subfield>
    <subfield code="k">005.8 SHI</subfield>
    <subfield code="2">ddc</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">9723</subfield>
    <subfield code="d">9723</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="8">NFIC</subfield>
    <subfield code="a">CL</subfield>
    <subfield code="b">CL</subfield>
    <subfield code="c">AI</subfield>
    <subfield code="d">2009-05-19</subfield>
    <subfield code="e">Star Books</subfield>
    <subfield code="g">4807.79</subfield>
    <subfield code="l">1</subfield>
    <subfield code="m">1</subfield>
    <subfield code="o">005.8 SHI</subfield>
    <subfield code="p">SEECS009410</subfield>
    <subfield code="r">2026-05-07</subfield>
    <subfield code="s">2018-12-16</subfield>
    <subfield code="w">2017-01-05</subfield>
    <subfield code="y">BK</subfield>
  </datafield>
</record>
