Digital Watermarking and Steganography - Cox, Ingemar; Miller, Matthew; Bloom, Jeffrey; - Prospero Internetes Könyváruház

Digital Watermarking and Steganography

 
Kiadás sorszáma: 2
Kiadó: Morgan Kaufmann
Megjelenés dátuma:
 
Normál ár:

Kiadói listaár:
EUR 80.95
Becsült forint ár:
34 508 Ft (32 865 Ft + 5% áfa)
Miért becsült?
 
Az Ön ára:

27 607 (26 292 Ft + 5% áfa )
Kedvezmény(ek): 20% (kb. 6 902 Ft)
A kedvezmény érvényes eddig: 2024. december 31.
A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
Kattintson ide a feliratkozáshoz
 
Beszerezhetőség:

Megrendelésre a kiadó utánnyomja a könyvet. Rendelhető, de a szokásosnál kicsit lassabban érkezik meg.
Nem tudnak pontosabbat?
 
  példányt

 
Hosszú leírás:
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession.
Tartalomjegyzék:
1. Introduction
2. Applications and Properties
3. Models of Watermarking
4. Message Coding
5. Watermarking with Side Information
6. Structured Dirty-Paper Codes
7. Analyzing Errors
8. Using Perceptual Models
9. Robust Watermarking
10. Watermark Security
11. Content Authentication
12. Steganography and Steganalysis