Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same.The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession. This new edition now contains essential information on steganalysis and steganography. New concepts and new applications including QIM are introduced. Digital watermark embedding is given a complete update with new processes and applications.About the Author:
Ingemar J. Cox holds a B.Sc. from University College London and a Ph.D. from Oxford University. He worked at AT&T Bell Labs from 1984 until 1989 and in 1989 joined NEC Research Institute as a senior research scientist. From 1997 to 1999, he served as CTO of Signafy, an NEC subsidiary responsible for commercialization of watermarking, In 1999, he returned to the NEC Research Institute as a Research Fellow. Matthew L. Miller began working in graphics and image processing at AT&T Bell Labs in 1979. He obtained a B.A. in cognitive science from the University of Rochester in 1986, and has subsequently written several commercial software applications and delivered lecture courses at a number of universities in Europe. Since 1993, he has worked as a researcher at NEC. Jeffrey A. Bloom, a researcher in digital watermarking at the Sarnoff Corporation, began working in the field in 1998 at Signafy, Inc. and later at NEC Research Institute. He holds B.S. and M.S. degrees in electrical engineering from Worcester Polytechnic Institute and a Ph.D. from the University of California, Davis. Dr. Bloom has expertise in the areas of signal and image processing, image and video compression, and human visual models.
"Sobre este título" puede pertenecer a otra edición de este libro.
Descripción Saint Louis, Missouri, U.S.A.: Morgan Kaufmann Pub, 2007. Hardcover. Estado de conservación: New. Ship out 1-2 business day,Brand new,US edition, Free tracking number usually 2-4 biz days delivery to worldwide Same shipping fee with US, Canada,Europe country, Australia, item will ship out from either LA or Asia kf. Nº de ref. de la librería ABE-10739965537
Descripción Morgan Kaufmann, 2007. Hardback. Estado de conservación: NEW. 9780123725851 This listing is a new book, a title currently in-print which we order directly and immediately from the publisher. Nº de ref. de la librería HTANDREE01195999
Descripción Morgan Kaufmann, 2007. Hardback. Estado de conservación: NEW. 9780123725851 This listing is a new book, a title currently in-print which we order directly and immediately from the publisher. Nº de ref. de la librería HTANDREE0891724
Descripción Morgan Kaufmann, 2007. Hardcover. Estado de conservación: New. Nº de ref. de la librería SONG0123725852
Descripción Morgan Kaufmann, 2007. Hardcover. Estado de conservación: New. 2. Nº de ref. de la librería DADAX0123725852
Descripción Morgan Kaufmann, 2007. Estado de conservación: New. Brand New, Unread Copy in Perfect Condition. A+ Customer Service! Summary: Chapter One: Introduction Chapter Two: Applications and Properties Chapter Three: Models of Watermarking Chapter Four: Message Coding Chapter Five: Watermarking with Side Information Chapter Six: Structured Dirty-Paper Codes Chapter Seven: Analyzing Errors Chapter Eight: Using Perceptual Models Chapter Nine: Robust Watermarking Chapter Ten: Watermark Security Chapter Eleven: Content Authentication Chapter Twelve: Steganography and Steganalysis. Nº de ref. de la librería ABE_book_new_0123725852
Descripción Morgan Kaufmann, 2007. Hardcover. Estado de conservación: New. book. Nº de ref. de la librería 0123725852
Descripción Morgan Kaufmann Pub, 2007. Hardcover. Estado de conservación: Brand New. 2nd edition. 593 pages. 9.50x7.75x1.25 inches. In Stock. Nº de ref. de la librería zk0123725852
Descripción Morgan Kaufmann. Hardcover. Estado de conservación: New. 0123725852 New Condition. Nº de ref. de la librería NEW4.0040591
Descripción Morgan Kaufmann, 2007. Hardcover. Estado de conservación: New. Nº de ref. de la librería P110123725852