Digital watermarking and steganography /
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by lim...
Saved in:
Main Authors: | |
---|---|
Corporate Authors: | |
Group Author: | ; ; ; |
Published: |
Morgan Kaufmann Publishers,
|
Publisher Address: | Amsterdam : |
Publication Dates: | 2008. |
Literature type: | eBook |
Language: | English |
Edition: | Second edition. |
Series: |
The Morgan Kaufmann series in multimedia information and systems
The Morgan kaufmann series in computer security |
Subjects: | |
Online Access: |
http://www.sciencedirect.com/science/book/9780123725851 |
Summary: |
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second editi |
Item Description: | Prev. ed. entered under Cox. |
Carrier Form: | 1 online resource (xxviii, 593 pages) : illustrations. |
Bibliography: | Includes bibliographical references (pages 549-574) and index. |
ISBN: |
9780080555805 0080555802 9780123725851 0123725852 |
Index Number: | QA76 |
CLC: | TP309-532 |
Contents: | Front Cover; Digital Watermarking and Steganography; Copyright Page; Table of Contents; Preface to the First Edition; Preface to the Second Edition; Example Watermarking Systems; Chapter 1. Introduction; Chapter 2. Applications and Properties; Chapter 3. Models of Watermarking; Chapter 4. Basic Message Coding; Chapter 5. Watermarking with Side Information; Chapter 6. Practical Dirty-Paper Codes; Chapter 7. Analyzing Errors; Chapter 8. Using Perceptual Models; Chapter 9. Robust Watermarking; Chapter 10. Watermark Security; Chapter 11. Content Authentication; Chapter 12. Steganography. |