
eBook - PDF
Digital Watermarking and Steganography
- 624 pages
- English
- PDF
- Available on iOS & Android
eBook - PDF
Digital Watermarking and Steganography
About this book
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession.
- This new edition now contains essential information on steganalysis and steganography
- New concepts and new applications including QIM introduced
- Digital watermark embedding is given a complete update with new processes and applications
Frequently asked questions
Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Digital Watermarking and Steganography by Ingemar Cox,Matthew Miller,Jeffrey Bloom,Jessica Fridrich,Ton Kalker in PDF and/or ePUB format, as well as other popular books in Informatica & Reti di computer. We have over one million books available in our catalogue for you to explore.
Information
Table of contents
- Front Cover
- Digital Watermarking and Steganography
- Copyright Page
- Table of Contents
- Preface to the First Edition
- Preface to the Second Edition
- Example Watermarking Systems
- Chapter 1. Introduction
- Chapter 2. Applications and Properties
- Chapter 3. Models of Watermarking
- Chapter 4. Basic Message Coding
- Chapter 5. Watermarking with Side Information
- Chapter 6. Practical Dirty-Paper Codes
- Chapter 7. Analyzing Errors
- Chapter 8. Using Perceptual Models
- Chapter 9. Robust Watermarking
- Chapter 10. Watermark Security
- Chapter 11. Content Authentication
- Chapter 12. Steganography
- Chapter 13. Steganalysis
- Appendix A. Background Concepts
- Appendix B. Selected Theoretical Results
- Appendix C. Notation and Common Variables
- Glossary
- References
- Index
- About the Authors