By Miller, Cox, Linnartz

Show description

Read Online or Download A review of watermarking principles and practices PDF

Similar computers books

Wireless Home Networking for Dummies (3rd Edition)

Instant domestic networks are higher than ever! The emergence of recent criteria has made them more uncomplicated, less difficult, more cost-effective to possess and function. nonetheless, you must be aware of what to seem for (and glance out for), and the specialist suggestions you'll locate in instant domestic Networks For Dummies, third version is helping you make sure that your wire-free existence is usually a straightforward lifestyles!

Category Theory and Computer Science: Paris, France, September 3–6, 1991 Proceedings

The papers during this quantity have been provided on the fourth biennial summer time convention on classification conception and computing device technology, held in Paris, September3-6, 1991. classification concept remains to be an enormous instrument in foundationalstudies in machine technological know-how. it's been greatly utilized by way of logicians to get concise interpretations of many logical thoughts.

Computer Music: Synthesis, Composition, and Performance, 2nd Ed.

This article displays the present country of laptop expertise and song composition. The authors provide transparent, functional overviews of application languages, real-time synthesizers, electronic filtering, man made intelligence, and lots more and plenty extra.

Additional info for A review of watermarking principles and practices

Sample text

12] W. Bender, D. Gruhl, and N. Morimoto, “Techniques for data hiding,” in Proc. of SPIE, vol. 2420, p. 40, February 1995. [13] J. Linnartz, A. Kalker, and G. Depovere, “Modelling the false-alarm and missed detection rate for electronic watermarks,” in Workshop on Information Hiding, Portland, OR, 15-17 April, 1998. [14] G. Depovere, T. -P. Linnartz, “Improved watermark detection using filtering before correlation,” in Proceedings of the ICIP, (Chicago), Oct. 1998. Submitted. [15] J. R. Smith and B.

Vol. 1174 of Lecture Notes in Computer Science, pp. 227–235, SpringerVerlag, 1996. [30] G. Caronni, “Assuring ownership rights for digital images,” in Proc. Reliable IT Systems, VIS’95, Vieweg Publishing Company, 1995. [31] K. Tanaka, Y. Nakamura, and K. Matsui, “Embedding secret information into a dithered multi-level image,” in Proc, 1990 IEEE Military Communications Conference, pp. 216–220, 1990. [32] K. Matsui and K. Tanaka, “Video-steganography,” in IMA Intellectual Property Project Proceedings, vol.

On Image Processing, 1996. [37] M. D. Swanson, B. Zhu, and A. H. Tewfik, “Transparent robust image watermarking,” in IEEE Int. Conf. on Image Processing, 1996. [38] D. C. ” European Patent EP 0 690 595 A1, 1996. [39] G. B. Rhoads, “Indentification/authentication coding method and apparatus,” World Intellectual Property Organization, vol. IPO WO 95/14289, 1995. [40] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol. 35, no. 3/4, pp. 313–336, 1996. [41] O.

Download PDF sample

A review of watermarking principles and practices by Miller, Cox, Linnartz
Rated 4.49 of 5 – based on 32 votes