Digital watermarking and steganography

Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by lim...

Πλήρης περιγραφή

Άλλοι συγγραφείς: Cox, I. J.
Μορφή: Ηλεκτρονική πηγή
Γλώσσα: English
Στοιχεία έκδοσης: Amsterdam ; Boston : Morgan Kaufmann Publishers, c2008.
Έκδοση: 2nd ed.
Σειρά: Morgan Kaufmann series in multimedia information and systems.
Morgan kaufmann series in computer security.
Θέματα:
Διαθέσιμο Online: http://www.sciencedirect.com/science/book/9780123725851
Ετικέτες: Προσθήκη ετικέτας
Δεν υπάρχουν, Καταχωρήστε ετικέτα πρώτοι!
LEADER 03239nam a2200337 a 4500
001 1/44778
008 140630s2008 ne 001 0 eng
020 |a 9780123725851 
020 |a 0123725852 
035 |l 47732 
040 |a OPELS  |b eng  |c OPELS  |d OCLCQ  |d OCLCF  |d GR-PeUP 
245 0 0 |a Digital watermarking and steganography  |h [electronic resource] /  |c Ingemar J. Cox ... [et al.]. 
250 |a 2nd ed. 
260 |a Amsterdam ;  |a Boston :  |b Morgan Kaufmann Publishers,  |c c2008. 
300 |a 1 online resource (xxviii, 593 p.) :  |b ill. 
490 1 |a The Morgan Kaufmann series in multimedia information and systems 
490 1 |a The Morgan kaufmann series in computer security 
520 |a Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession. *This new edition now contains essential information on steganalysis and steganography *New concepts and new applications including QIM introduced *Digital watermark embedding is given a complete update with new processes and applications. 
505 0 |a Chapter One: Introduction -- Chapter Two: Applications and Properties -- Chapter Three: Models of Watermarking -- Chapter Four: Message Coding -- Chapter Five: Watermarking with Side Information -- Chapter Six: Structured Dirty-Paper Codes -- Chapter Seven: Analyzing Errors -- Chapter Eight: Using Perceptual Models -- Chapter Nine: Robust Watermarking -- Chapter Ten: Watermark Security -- Chapter Eleven: Content Authentication -- Chapter Twelve: Steganography and Steganalysis. 
504 |a Includes bibliographical references (p. 549-574) and index. 
650 4 |a Computer security. 
650 4 |a Digital watermarking. 
650 4 |a Data protection. 
655 4 |a Electronic books. 
700 1 |a Cox, I. J.  |q (Ingemar J.) 
830 0 |a Morgan Kaufmann series in multimedia information and systems. 
830 0 |a Morgan kaufmann series in computer security. 
852 |a INST  |b UNIPILB  |c EBOOKS  |e 20140630  |p 00b47732  |q 00b47732  |t ONLINE  |y 0 
856 4 0 |3 ScienceDirect  |u http://www.sciencedirect.com/science/book/9780123725851 
856 4 |d /webopac/covers/03/47732_9780123725851.jpg 
856 4 |d /webopac/covers/03/47732_0123725852.jpg