Sold Out
Book Categories |
Preface | ||
Example Watermarking Systems | ||
1 | Introduction | 1 |
2 | Applications and Properties | 11 |
3 | Models of Watermarking | 41 |
4 | Basic Message Coding | 85 |
5 | Watermarking with Side Information | 117 |
6 | Analyzing Errors | 157 |
7 | Using Perceptual Models | 201 |
8 | Robust Watermarking | 241 |
9 | Watermark Security | 279 |
10 | Content Authentication | 319 |
App. A: Background Concepts | 359 | |
App. B: Selected Theoretical Results | 373 | |
App. C: Source Code | 395 | |
App. D: Notation and Common Variables | 483 | |
Glossary | 487 | |
References | 501 | |
Index | 521 | |
About the Authors | 541 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionDigital Watermarking
X
This Item is in Your InventoryDigital Watermarking
X
You must be logged in to review the productsX
X
X
Add Digital Watermarking, This book is an immensely valuable contribution. The treatment of error rates, fidelity, quality and related issues is outstanding, being not just rooted in communications theory but also grounded in extensive experiments. Examples drawn from real, Digital Watermarking to the inventory that you are selling on WonderClubX
X
Add Digital Watermarking, This book is an immensely valuable contribution. The treatment of error rates, fidelity, quality and related issues is outstanding, being not just rooted in communications theory but also grounded in extensive experiments. Examples drawn from real, Digital Watermarking to your collection on WonderClub |