Innovations in Digital Watermarking Techniques [electronic resource] /by Feng-Hsing Wang, Jeng-Shyang Pan, Lakhmi C. Jain.
by Wang, Feng-Hsing [author.]; Pan, Jeng-Shyang [author.]; Jain, Lakhmi C [author.]; SpringerLink (Online service).
Material type:
Item type | Current location | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
TA640-643 (Browse shelf) | Available | ||||
Long Loan | MAIN LIBRARY | TA329-348 (Browse shelf) | Available |
Browsing MAIN LIBRARY Shelves Close shelf browser
QC310.15-319 Thermodynamics, Gibbs Method and Statistical Physics of Electron Gases | QC173.96-174.52 Time in Quantum Mechanics - Vol. 2 | QD901-999 Dislocation Dynamics During Plastic Deformation | TA329-348 Innovations in Digital Watermarking Techniques | TA329-348 Advances in Agent-Based Complex Automated Negotiations | TJ210.2-211.495 Control Configuration Selection for Multivariable Plants | TJ210.2-211.495 Modeling and Control of Complex Physical Systems |
and Background -- Digital Watermarking Techniques -- Intelligent Techniques -- Intelligent Watermarking -- Spatial-Based Watermarking Schemes and Pixel Selection -- Discrete Cosine Transform Based Watermarking Scheme and Band Selection -- Vector Quantisation Based Watermarking Schemes and Codebook Partition -- Genetic Index Assignment -- Genetic Watermark Modification -- Hybrid Systems of Digital Watermarking -- Watermarking Based on Multiple Description VQ -- Fake Watermark Embedding Scheme Based on Multi-Stage VQ -- Watermarking with Visual Cryptography and Gain-Shape VQ -- Summary -- Conclusions and Future Directions.
Information security and copyright protection are more important today than before. Digital watermarking is one of the widely used techniques used in the world in the area of information security. This book introduces a number of digital watermarking techniques and is divided into four parts. The first part introduces the importance of watermarking techniques and intelligent technology. The second part includes a number of watermarking techniques. The third part includes the hybrid watermarking techniques and the final part presents conclusions. This book is directed to students, professors, researchers and application engineers who are interested in the area of information security.
There are no comments for this item.