Download A review of watermarking principles and practices by Miller, Cox, Linnartz PDF

By Miller, Cox, Linnartz

Show description

Read Online or Download A review of watermarking principles and practices PDF

Similar computers books

HF Filter Design Computer Simulation

A ebook for engineers who layout and construct filters of all kinds, together with lumped aspect, coaxial, helical, dielectric resonator, stripline and microstrip kinds. a radical assessment of vintage and glossy clear out layout options, containing vast useful layout details of passband features, topologies and modifications, part results and matching.

Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003. Proceedings

This e-book constitutes the refereed complaints of the seventh IFIP overseas convention on Communications and Multimedia protection, CMS 2003, held in Torino, Italy in October 2003. The 21 revised complete papers provided have been conscientiously reviewed and chosen for presentation. The papers are prepared in topical sections on cryptography, community defense, cellular and instant community protection, belief and privateness, software defense, and multimedia safeguard.

Advances in Social Network Mining and Analysis: Second International Workshop, SNAKDD 2008, Las Vegas, NV, USA, August 24-27, 2008. Revised Selected Papers ... Computer Science and General Issues)

This paintings constitutes the lawsuits of the second one overseas Workshop on Advances in Social community and research, held in Las Vegas, NV, united states in August 2008.

Additional info for A review of watermarking principles and practices

Example text

2, pp. 86–90, IEEE, 1994. [28] J. Brassil, S. Low, N. Maxemchuk, and L. O’Gorman, “Electronic marking and identification techniques to discourage document copying,” in Proc. of Infocom’94, pp. 1278–1287, 1994. [29] J. Brassil and L. O’Gorman, “Watermarking document images with bounding box expansion,” in Information Hiding (R. ), vol. 1174 of Lecture Notes in Computer Science, pp. 227–235, SpringerVerlag, 1996. [30] G. Caronni, “Assuring ownership rights for digital images,” in Proc. Reliable IT Systems, VIS’95, Vieweg Publishing Company, 1995.

Of Infocom’94, pp. 1278–1287, 1994. [29] J. Brassil and L. O’Gorman, “Watermarking document images with bounding box expansion,” in Information Hiding (R. ), vol. 1174 of Lecture Notes in Computer Science, pp. 227–235, SpringerVerlag, 1996. [30] G. Caronni, “Assuring ownership rights for digital images,” in Proc. Reliable IT Systems, VIS’95, Vieweg Publishing Company, 1995. [31] K. Tanaka, Y. Nakamura, and K. Matsui, “Embedding secret information into a dithered multi-level image,” in Proc, 1990 IEEE Military Communications Conference, pp.

Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol. 35, no. 3/4, pp. 313–336, 1996. [41] O. Paatelma and R. H. ” WIPO Patent WO 95/20291, 1995. [42] L. Holt, B. G. Maufe, and A. ” UK Patent GB 2196167A, 1988. [43] R. D. Preuss, S. E. Roukos, A. W. F. Huggins, H. Gish, M. A. Bergamo, P. M. Peterson, and D. A. ” US Patent 5,319,735, 1994. [44] C. I. Podilchuk and W. Zeng, “Image-adaptive watermarking using visual models,” IEEE Trans. on Selected Areas of Communications, vol.

Download PDF sample

Rated 4.69 of 5 – based on 3 votes