Normal view MARC view ISBD view

Watermarking Security [electronic resource] / by Patrick Bas, Teddy Furon, Fran�cois Cayre, Gwena�el Do�err, Benjamin Mathon.

By: Bas, Patrick [author.].
Contributor(s): Furon, Teddy [author.] | Cayre, Fran�cois [author.] | Do�err, Gwena�el [author.] | Mathon, Benjamin [author.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: SpringerBriefs in Electrical and Computer Engineering: Publisher: Singapore : Springer Singapore : Imprint: Springer, 2016Description: IX, 125 p. 70 illus., 29 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9789811005060.Subject(s): Engineering | Computer security | Data encryption (Computer science) | System safety | Engineering | Signal, Image and Speech Processing | Systems and Data Security | Security Science and Technology | Data EncryptionAdditional physical formats: Printed edition:: No titleDDC classification: 621.382 Online resources: Click here to access online
Contents:
General Introduction -- A quick tour of watermarking techniques -- Fundamentals -- Secure Design -- Attacks -- Conclusions and Open Problems.
In: Springer eBooksSummary: This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.
    average rating: 0.0 (0 votes)
No physical items for this record

General Introduction -- A quick tour of watermarking techniques -- Fundamentals -- Secure Design -- Attacks -- Conclusions and Open Problems.

This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

There are no comments for this item.

Log in to your account to post a comment.