{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BB21200687.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BB21200687#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BB21200687.json"},"dc:title":[{"@value":"Transactions on data hiding and multimedia security VII"}],"dcterms:alternative":["Data hiding and multimedia security VII","Transactions on data hiding and multimedia security 7"],"dc:creator":"Yun Q. Shi (ed.)","dc:publisher":[{"@value":"Springer"}],"dcterms:extent":"viii, 114 p.","cinii:size":"24 cm","dc:language":"eng","dc:date":"2012","cinii:ncid":"BB21200687","cinii:ownerCount":"1","foaf:maker":[{"@id":"https://ci.nii.ac.jp/author/DA12554087#entity","@type":"foaf:Person","foaf:name":[{"@value":"Shi, Yun Q."}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA014075","@type":"foaf:Organization","foaf:name":"九州工業大学 附属図書館 情報工学部分館","rdfs:seeAlso":{"@id":"https://www.lib.kyutech.ac.jp/opac/search?s_ncid=BB21200687"}}],"prism:publicationDate":["c2012"],"cinii:note":["\"Journal subline\" -- cover","Includes bibliographical references and index"],"dc:subject":["LCC:QA76.575","DC23:005.82"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Multimedia+systems","dc:title":"Multimedia systems"},{"@id":"https://ci.nii.ac.jp/books/search?q=Data+encryption+%28Computer+science%29","dc:title":"Data encryption (Computer science)"}],"dcterms:isPartOf":[{"@id":"https://ci.nii.ac.jp/ncid/BA00009279#entity","dc:title":"Lecture notes in computer science, 7110","@type":"bibo:Book"}],"dcterms:hasPart":[{"@id":"urn:isbn:9783642286926"}]}]}