|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910163015103321 |
|
|
Autore |
Su Qingtang |
|
|
Titolo |
Color image watermarking : algorithms and technologies / / Qingtang Su |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, [Germany] ; ; Boston, [Massachusetts] : , : De Gruyter, , 2017 |
|
©2017 |
|
|
|
|
|
|
|
|
|
ISBN |
|
3-11-048763-2 |
3-11-048773-X |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (200 pages) : illustrations (some color) |
|
|
|
|
|
|
Collana |
|
Advances in Computer Science, , 2509-7261 ; ; Volume 1 |
|
|
|
|
|
|
Altri autori (Persone) |
|
Tsinghua University Press |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Digital images - Watermarking |
Data encryption (Computer science) |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Frontmatter -- Preface -- Contents -- Acknowledgments -- 1. Introduction -- 2. Common Mathematical Knowledge Used in Digital Watermarking -- 3. Color Image -- 4. The Color Image Watermarking Algorithm Based on DC Component -- 5. The Color Image Watermarking Algorithm Based on Integer Wavelet Transform -- 6. The Color Image Watermarking Algorithm Based on Singular Value Decomposition -- 7. The Color Image Watermarking Algorithm Based on Schur Decomposition -- 8. The Color Image Watermarking Algorithm Based on QR Decomposition -- 9. The Color Image Watermarking Algorithm Based on Hessenberg Decomposition -- 10. Summary and Prospect -- References -- Index |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book presents watermarking algorithms derived from signal processing methods such as wavelet transform, matrix decomposition and cosine transform to address the limitations of current technologies. For each algorithm, mathematical foundations are explained with analysis conducted to evaluate performances on robotness and efficiency. Combining theories and practice, it is suitable for information security researchers and industrial engineers. |
|
|
|
|
|
|
|