Fr. 135.00

Innovations in Digital Watermarking Techniques

English · Paperback / Softback

Shipping usually within 6 to 7 weeks

Description

Read more

Information security and copyright protection are more important today than before. Digital watermarking is one of the widely used techniques used in the world in the area of information security.
This book introduces a number of digital watermarking techniques and is divided into four parts. The first part introduces the importance of watermarking techniques and intelligent technology. The second part includes a number of watermarking techniques. The third part includes the hybrid watermarking techniques and the final part presents conclusions.
This book is directed to students, professors, researchers and application engineers who are interested in the area of information security.

List of contents

I Introduction and Background.- Introduction.- Digital Watermarking Techniques.- Intelligent Techniques .- II Intelligent Watermarking.- Spatial-Based Watermarking Schemes and Pixel Selection.- Discrete Cosine Transform Based Watermarking Scheme and Band Selection.- Vector Quantisation Based Watermarking Schemes and Codebook Partition.- Genetic Index Assignment.- Genetic Watermark Modification.- III Hybrid Systems of Digital Watermarking.- Watermarking Based on Multiple Description VQ.- Fake Watermark Embedding Scheme Based on Multi-Stage VQ.- Watermarking with Visual Cryptography and Gain-Shape VQ.- IV Summary.- 12 Conclusions and Future Directions.

Summary

Information security and copyright protection are more important today than before. Digital watermarking is one of the widely used techniques used in the world in the area of information security.
This book introduces a number of digital watermarking techniques and is divided into four parts. The first part introduces the importance of watermarking techniques and intelligent technology. The second part includes a number of watermarking techniques. The third part includes the hybrid watermarking techniques and the final part presents conclusions.
This book is directed to students, professors, researchers and application engineers who are interested in the area of information security.

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.