Digital Watermarking and Steganography
eBook - PDF

Digital Watermarking and Steganography

  1. 624 pages
  2. English
  3. PDF
  4. Available on iOS & Android
eBook - PDF

Digital Watermarking and Steganography

About this book

Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession. - This new edition now contains essential information on steganalysis and steganography - New concepts and new applications including QIM introduced - Digital watermark embedding is given a complete update with new processes and applications

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Digital Watermarking and Steganography by Ingemar Cox,Matthew Miller,Jeffrey Bloom,Jessica Fridrich,Ton Kalker in PDF and/or ePUB format, as well as other popular books in Informatica & Reti di computer. We have over one million books available in our catalogue for you to explore.

Information

Year
2007
Print ISBN
9780123725851
eBook ISBN
9780080555805
Edition
2

Table of contents

  1. Front Cover
  2. Digital Watermarking and Steganography
  3. Copyright Page
  4. Table of Contents
  5. Preface to the First Edition
  6. Preface to the Second Edition
  7. Example Watermarking Systems
  8. Chapter 1. Introduction
  9. Chapter 2. Applications and Properties
  10. Chapter 3. Models of Watermarking
  11. Chapter 4. Basic Message Coding
  12. Chapter 5. Watermarking with Side Information
  13. Chapter 6. Practical Dirty-Paper Codes
  14. Chapter 7. Analyzing Errors
  15. Chapter 8. Using Perceptual Models
  16. Chapter 9. Robust Watermarking
  17. Chapter 10. Watermark Security
  18. Chapter 11. Content Authentication
  19. Chapter 12. Steganography
  20. Chapter 13. Steganalysis
  21. Appendix A. Background Concepts
  22. Appendix B. Selected Theoretical Results
  23. Appendix C. Notation and Common Variables
  24. Glossary
  25. References
  26. Index
  27. About the Authors