Digital watermarking and steganography /

Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by lim...

Full description

Saved in:
Bibliographic Details
Main Authors: Cox, I. J. Ingemar J
Corporate Authors: Elsevier Science & Technology
Group Author: Miller, Matthew L; Bloom, Jeffrey A; Fridrich, Jessica; Kalker, Ton
Published: Morgan Kaufmann Publishers,
Publisher Address: Amsterdam :
Publication Dates: 2008.
Literature type: eBook
Language: English
Edition: Second edition.
Series: The Morgan Kaufmann series in multimedia information and systems
The Morgan kaufmann series in computer security
Subjects:
Online Access: http://www.sciencedirect.com/science/book/9780123725851
Summary: Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second editi
Item Description: Prev. ed. entered under Cox.
Carrier Form: 1 online resource (xxviii, 593 pages) : illustrations.
Bibliography: Includes bibliographical references (pages 549-574) and index.
ISBN: 9780080555805
0080555802
9780123725851
0123725852
Index Number: QA76
CLC: TP309-532
Contents: Front Cover; Digital Watermarking and Steganography; Copyright Page; Table of Contents; Preface to the First Edition; Preface to the Second Edition; Example Watermarking Systems; Chapter 1. Introduction; Chapter 2. Applications and Properties; Chapter 3. Models of Watermarking; Chapter 4. Basic Message Coding; Chapter 5. Watermarking with Side Information; Chapter 6. Practical Dirty-Paper Codes; Chapter 7. Analyzing Errors; Chapter 8. Using Perceptual Models; Chapter 9. Robust Watermarking; Chapter 10. Watermark Security; Chapter 11. Content Authentication; Chapter 12. Steganography.