A review of watermarking principles and practices by Miller, Cox, Linnartz

By Miller, Cox, Linnartz

Show description

Read Online or Download A review of watermarking principles and practices PDF

Best computers books

Progress in Artificial Intelligence: 13th Portuguese Conference on Aritficial Intelligence, EPIA 2007, Workshops: GAIW, AIASTS, ALEA, AMITA, BAOSW, BI, CMBSB, IROBOT, MASTA, STCS, and TEMA, Guimarães, Portugal, December 3-7, 2007. Proceedings

This publication constitutes the refereed lawsuits of the thirteenth Portuguese convention on synthetic Intelligence, EPIA 2007, held in Guimarães, Portugal, in December 2007 as 11 built-in workshops. The fifty eight revised complete papers awarded have been conscientiously reviewed and chosen from a complete of 210 submissions.

Transactions on Rough Sets II: Rough Sets and Fuzzy Sets

The LNCS magazine Transactions on tough units is dedicated to the full spectrum of tough units comparable matters, ranging from logical and mathematical foundations, via all facets of tough set thought and its purposes, reminiscent of facts mining, wisdom discovery, and clever info processing, to family members among tough units and different methods to uncertainty, vagueness and incompleteness, reminiscent of fuzzy units and thought of proof.

ShaderX3: Advanced Rendering with DirectX and OpenGL (Shaderx Series)

Its not easy for me to regard the books of this sequence individually (ShaderX three, ShaderX four, ShaderX 5). they're all excellent books of GPU-Gems point or better. compared to GPU gem stones, they're extra educational, i. e. they're fairly brief and extra appropriate to wide variety of functions then GPU gem stones ones (while GPU gem stones sequence is extra clinical, state-of-the-art, contemplating one specific examine) and the accompanying CD is way extra higher (lots of operating examples, so much with resource code).

Additional resources for A review of watermarking principles and practices

Sample text

O. Comiskey, “Modulation and information hiding in images,” in Information Hiding: First Int. Workshop Proc. (R. ), vol. 1174 of Lecture Notes in Computer Science, pp. 207– 226, Springer-Verlag, 1996. [16] J. J. Hernandez, F. Perez-Gonzalez, J. M. Rodriguez, and G. Nieto, “Performance analysis of a 2-D multipulse amplitude modulation scheme for data hiding and watermarking still images,” IEEE Trans. on Selected Areas of Communications, vol. 16, no. 4, pp. 510–524, 1998. [17] F. Petitcolas, R. Anderson, and M.

Linnartz, A. Kalker, and G. Depovere, “Modelling the false-alarm and missed detection rate for electronic watermarks,” in Workshop on Information Hiding, Portland, OR, 15-17 April, 1998. [14] G. Depovere, T. -P. Linnartz, “Improved watermark detection using filtering before correlation,” in Proceedings of the ICIP, (Chicago), Oct. 1998. Submitted. [15] J. R. Smith and B. O. Comiskey, “Modulation and information hiding in images,” in Information Hiding: First Int. Workshop Proc. (R. ), vol. 1174 of Lecture Notes in Computer Science, pp.

Kalker, J. Linnartz, and M. van Dijk, “Watermark estimation through detector analysis,” in Proceedings of the ICIP, (Chicago), Oct. 1998. Accepted. BIBLIOGRAPHY 31 [21] T. Kalker, “Watermark estimation through detector observations,” in Proceedings of the IEEE Benelux Signal Processing Symposium, (Leuven, Belgium), pp. 119–122, Mar. 1998. [22] I. J. -P. Linnartz, “Some general methods for tampering with watermarks,” IEEE Trans. on Selected Areas of Communications, vol. 16, no. 4, pp. 587–593, 1998.

Download PDF sample

Rated 4.54 of 5 – based on 23 votes