Digital Watermarking and Steganography ( 2 )

Publication series :2

Author: Cox   Ingemar;Miller   Matthew;Bloom   Jeffrey  

Publisher: Elsevier Science‎

Publication year: 2007

E-ISBN: 9780080555805

P-ISBN(Paperback): 9780123725851

P-ISBN(Hardback):  9780123725851

Subject: TP309.2 Data Security

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession.

  • This new edition now contains essential information on steganalysis and steganography
  • New concepts and new applications including QIM introduced
  • Digital watermark embedding is given a complete update with new processes and applications

Chapter

Chapter 2. Applications and Properties

Chapter 3. Models of Watermarking

Chapter 4. Basic Message Coding

Chapter 5. Watermarking with Side Information

Chapter 6. Practical Dirty-Paper Codes

Chapter 7. Analyzing Errors

Chapter 8. Using Perceptual Models

Chapter 9. Robust Watermarking

Chapter 10. Watermark Security

Chapter 11. Content Authentication

Chapter 12. Steganography

Chapter 13. Steganalysis

Appendix A. Background Concepts

Appendix B. Selected Theoretical Results

Appendix C. Notation and Common Variables

Glossary

References

Index

About the Authors

The users who browse this book also browse


No browse record.