- Arts & Culture 7336
- Books in Foreign Languages 153
- Business & Economics 4395
- Computers 2131
- Application Software 40
- Books for Beginners 349
- Computer Systems 19
- Cryptography 22
- Data Bases 57
- Games 196
- Graphics & Design 179
- Hardware 156
- Internet & Local Networking 237
- Internet Programming 190
- Office Software 39
- Online Auctions 40
- Operating Systems 113
- Programming Languages 275
- Publications 38
- Security 129
- Software Development 52
- Dictionaries & Encyclopedias 595
- Education & Science 105239
- Engineering 5675
- Esoteric 931
- Fiction 3252
- For Children 333
- House, Family & Entertainment 2319
- Law 2691
- Medicine 1253
- Newspapers & Magazines 384
- Security 253
- Sport, Tourism 1004
- Website Promotion 612
Digital steganography
Refunds: 0
Uploaded: 28.03.2014
Content: 40328181802370.zip 1686,71 kB
Product description
Interest in steganography appeared in the last decade and caused widespread multimedia technologies. Steganography methods allow not only to covertly transmit data, but also to solve problems of interference-authentication to protect information from unauthorized copying, tracking the spread of information through communication networks, information retrieval in multimedia databases dannyh.Mezhdunarodnye symposiums hidden data held since 1996, the first symposium on steganography held in July 2002. Steganography - quickly and rapidly developing science, using methods and achievements of cryptography, digital signal processing, communication theory and informatsii.Na Russian language Steganography was dedicated just a few review journal articles. This book is intended to fill this gap. It summarizes the most recent results of investigations of foreign scientists. The book deals with both theoretical and practical aspects of steganography performed stegosystems classification and methods of integration, studied in detail issues of improving capacity stegokanala, ensuring durability and stealth introduction is given more than 50 algorithms embedded dannyh.Kniga intended for students, graduate students, researchers, studying issues of information security, as well as design engineers means of information protection. Also of great interest, it will have experts in the field of information theory and digital signal processing.
Feedback
0Period | |||
1 month | 3 months | 12 months | |
0 | 0 | 0 | |
0 | 0 | 0 |