Digital WatermarkingElsevier, 2001. gada 17. okt. - 542 lappuses Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications. |
No grāmatas satura
1.5. rezultāts no 62.
... Channels 44 3.2.3 Secure Transmission 45 Communication-Based Models of Watermarking 47 3.3.1 Basic Model 47 3.3.2 Watermarking as Communication with Side Information at the Transmitter 55 3.3.3 Watermarking as Multiplexed Communications ...
... Channel 135 5.2.3 Dirty-Paper Codes for More Complex Channels 138 5.3 Structured Dirty-Paper Codes 144 5.3.1 Lattice Codes 145 5.3.2 Syndrome Codes 151 5.3.3 Least-Significant-Bit Watermarking 153 5.4 Summary 154 6 Analyzing Errors 157 ...
... Channels with Side Information 373 B.1.2 Capacity of Channels with Side Information 374 Capacity of the AWGN Dirty-Paper Channel (Costa) 376 Information-Theoretic Analysis of Secure Watermarking (Moulin and O'Sullivan) 377 B.3.1 ...
... channels looking for marked content. Information. Hiding,. Steganography,. and. Watermarking. Watermarking is closely related to the fields of information hiding and steganography. These three fields have a great deal of overlap and share ...
... channels [246], in which he discusses the technical issues surrounding verification of the SALT-II treaty between the United States and the Soviet Union. The SALT-II treaty allowed both countries to have many missile silos but only a ...
Saturs
1 | |
11 | |
Chapter 3 Models of Watermarking | 41 |
Chapter 4 Basic Message Coding | 85 |
Chapter 5 Watermarking with Side Information | 117 |
Chapter 6 Analyzing Errors | 157 |
Chapter 7 Using Perceptual Models | 201 |
Chapter 8 Robust Watermarking | 241 |
Appendix A Background Concepts | 359 |
Appendix B Selected Theoretical Results | 373 |
Appendix C Source Code | 395 |
Appendix D Notation and Common Variables | 483 |
Glossary | 487 |
501 | |
521 | |
About the Authors | 541 |
Citi izdevumi - Skatīt visu
Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea ... Ingemar J. Cox Ierobežota priekšskatīšana - 2005 |
Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea ... Ingemar J. Cox,Ton Kalker,Heung-Kyu Lee Ierobežota priekšskatīšana - 2005 |
Bieži izmantoti vārdi un frāzes
Atsauces uz šo grāmatu
Multimedia Encryption and Watermarking Borko Furht,Edin Muharemagic,Daniel Socek Priekšskatījums nav pieejams - 2005 |