Digital Watermarking
Editat de Mauro Barni, Ingemar Cox, Ton Kalker, Hyoung Joong Kimen Limba Engleză Paperback – 30 aug 2005
Preț: 331.59 lei
Preț vechi: 414.49 lei
-20% Nou
Puncte Express: 497
Preț estimativ în valută:
58.68€ • 68.80$ • 51.53£
58.68€ • 68.80$ • 51.53£
Carte tipărită la comandă
Livrare economică 05-19 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540287681
ISBN-10: 354028768X
Pagini: 504
Ilustrații: XII, 492 p.
Dimensiuni: 155 x 235 x 28 mm
Greutate: 0.76 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 354028768X
Pagini: 504
Ilustrații: XII, 492 p.
Dimensiuni: 155 x 235 x 28 mm
Greutate: 0.76 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Session I: Steganography and Steganalysis.- A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography.- Information Transmission and Steganography.- On the Existence of Perfect Stegosystems.- Towards Multi-class Blind Steganalyzer for JPEG Images.- Session II: Fingerprinting.- An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption.- Collusion Secure Convolutional Spread Spectrum Fingerprinting.- Performance Study on Multimedia Fingerprinting Employing Traceability Codes.- Regular Simplex Fingerprints and Their Optimality Properties.- Session III: Watermarking I.- A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet Domain.- Robust Detection of Transform Domain Additive Watermarks.- Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis.- Session IV: Attacks.- A New Inter-frame Collusion Attack and a Countermeasure.- Effectiveness of ST-DM Watermarking Against Intra-video Collusion.- Oracle Attacks and Covert Channels.- Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images.- Session V: Special Session on Watermarking Security.- A Survey of Watermarking Security.- Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy.- Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information.- Practical Data-Hiding: Additive Attacks Performance Analysis.- The Return of the Sensitivity Attack.- Session VI: Watermarking of Unconventional Media.- Look Up Table(LUT) Method for Halftone Image Watermarking.- New Public-Key Authentication Watermarking for JBIG2 Resistant to Parity Attacks.- Software Watermarking as a Proof of Identity: A Study of Zero Knowledge Proof Based Software Watermarking.- Watermarking of 3D Irregular Meshes Based on Wavelet Multiresolution Analysis.- Session VII: Channel Coding and Watermarking.- Digital Watermarking Robustness and Fragility Characteristics: New Modelling and Coding Influence.- New Geometric Analysis of Spread-Spectrum Data Hiding with Repetition Coding, with Implications for Side-Informed Schemes.- Trellis-Coded Rational Dither Modulation for Digital Watermarking.- Session VIII: Theory.- Closed-Form Formulas for Private Watermarking Capacities of Laplacian Sources with the Magnitude-Error Distortion Measure and Under Additive Attacks.- Improved QIM Strategies for Gaussian Watermarking.- On the Achievable Rate of Side Informed Embedding Techniques with Steganographic Constraints.- Performance Lower Bounds for Existing and New Uncoded Digital Watermarking Modulation Techniques.- Session IX: Watermarking II.- Evaluation of Feature Extraction Techniques for Robust Watermarking.- Perceptual Video Watermarking in the 3D-DWT Domain Using a Multiplicative Approach.- Robustness Enhancement of Content-Based Watermarks Using Entropy Masking Effect.- Session X: Applications.- Secure Mutual Distrust Transaction Tracking Using Cryptographic Elements.- ViWiD : Visible Watermarking Based Defense Against Phishing.