Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
What is included with this book?
Authentication Watermarkings for Binary Images | p. 1 |
Secure Multimedia Content Distribution Based on Watermarking Technology | p. 24 |
Digital Watermarking in the Transform Domain with Emphasis on SVD | p. 46 |
Digital Video Watermarking and the Collusion Attack | p. 67 |
A Survey of Current Watermarking Synchronization Techniques | p. 84 |
On the Necessity of Finding Content Before Watermark Retrieval: Active Search Strategies for Localising Watermarked Media on the Internet | p. 106 |
Statistical Watermark Detection in the Transform Domain for Digital Images | p. 120 |
On Noise, Steganography, and the Active Warden | p. 139 |
Visibility Control and Quality Assessment of Watermarking and Data Hiding Algorithms | p. 163 |
Computational Aspects of Digital Steganography | p. 193 |
On Steganalysis and Clean Image Estimation | p. 212 |
Steganalysis: Trends and Challenges | p. 245 |
Benchmarking Steganalysis | p. 266 |
Digital Camera Source Identification Through JPEG Quantisation | p. 291 |
Traitor Tracing for Multimedia Forensics | p. 314 |
Efficient Transparent JPEG2000 Encryption | p. 336 |
Compilation of References | p. 360 |
Index | p. 393 |
Table of Contents provided by Blackwell. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.