top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing : (IIH-MSP 2006) : proceedings ; 18-20 December, 2006, Pasadena, California, USA
2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing : (IIH-MSP 2006) : proceedings ; 18-20 December, 2006, Pasadena, California, USA
Pubbl/distr/stampa [Place of publication not identified], : IEEE Computer Society, 2006
Disciplina 005.8
Soggetto topico Computer security - Security measures
Computer networks
Cryptography
Digital watermarking
Data protection
Engineering & Applied Sciences
Computer Science
ISBN 1-5090-9149-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996199008303316
[Place of publication not identified], : IEEE Computer Society, 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing : (IIH-MSP 2006) : proceedings ; 18-20 December, 2006, Pasadena, California, USA
2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing : (IIH-MSP 2006) : proceedings ; 18-20 December, 2006, Pasadena, California, USA
Pubbl/distr/stampa [Place of publication not identified], : IEEE Computer Society, 2006
Disciplina 005.8
Soggetto topico Computer security - Security measures
Computer networks
Cryptography
Digital watermarking
Data protection
Engineering & Applied Sciences
Computer Science
ISBN 9781509091492
1509091491
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910142716203321
[Place of publication not identified], : IEEE Computer Society, 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Security Solutions for Multimedia
Advanced Security Solutions for Multimedia
Autore Ansari Irshad Ahmad
Edizione [1st ed.]
Pubbl/distr/stampa Bristol : , : Institute of Physics Publishing, , 2021
Descrizione fisica 1 online resource (276 pages)
Altri autori (Persone) BajajVarun
SinhalRishi
SharmaTarun Kumar
NajafiEsmaeil
ShahManan
GohilJay
PatelJay
WuHanzhou
AbazarMahdie
Collana IOP Ebooks Series
Soggetto topico Data encryption (Computer science)
Digital watermarking
ISBN 0-7503-4572-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Acknowledgements -- Editor biographies -- Irshad Ahmad Ansari -- Varun Bajaj -- Contributor biographies -- Mahdie Abazar -- Parmeshwar Birajadar -- Seyed Mostafa FakhrAhmad -- Vikram M Gadre -- Ali Ghorbani -- Jay Gohil -- Abdelhamid Helali -- Sunil Kumar Jauhar -- Ameya Kshirsagar -- S Kuppa -- Hassen Maaref -- V M Manikandan -- Suja Cherukullapurath Mana -- Peyman Masjedi -- Ridha Mghaieth -- Amina Msolli -- Esmaeil Najafi -- Akash S Palde -- Jay Patel -- D S Raghukumar -- Vishal Rajput -- Antti Rissanen -- Marjo Rissanen -- T Saipraba -- Sagar G Sangodkar -- Manan Shah -- Tarun Kumar Sharma -- Rishi Sinhal -- M Suresha -- Niranjan Suthar -- Mohammad Taheri -- Hanzhou Wu -- Chapter 1 Blind image watermarking with efficient dual restoration feature -- 1.1 Introduction -- 1.2 Literature review -- 1.3 Proposed fragile watermarking scheme -- 1.3.1 Watermark pre-processing -- 1.3.2 Watermark embedding -- 1.3.3 Watermark extraction -- 1.3.4 Self-recovery process -- 1.4 Experimental results and discussion -- 1.4.1 Tamper detection anaylsis -- 1.4.2 Self-recovery of the tampered portion -- 1.5 Conclusion -- Acknowledgements -- References -- Chapter 2 Secure, robust and imperceptible image watermarking scheme based on sharp frequency localized contourlet transform -- 2.1 Introduction -- 2.2 The properties of SFLCT -- 2.3 The proposed SFLCT watermarking scheme -- 2.3.1 Computing strength factors -- 2.4 Implementations and results of the proposed SFLCT scheme -- 2.4.1 Robustness of the proposed SFLCT scheme -- 2.4.2 The security examination of the proposed scheme -- 2.5 Comparative analysis of the proposed scheme -- 2.6 Conclusion -- References -- Chapter 3 Content watermarking and data hiding in multimedia security -- 3.1 Introduction -- 3.2 Content watermarking in multimedia security -- 3.2.1 Introduction.
3.2.2 Content watermarking technique reviews -- 3.2.3 Table pertaining to research work on content watermarking in multimedia security -- 3.2.4 Inference -- 3.3 Data hiding in multimedia security -- 3.3.1 Background -- 3.3.2 Data hiding technique reviews -- 3.3.3 Table pertaining to research work on data hiding in multimedia security -- 3.3.4 Inference -- 3.4 Conclusion -- Acknowledgments -- References -- Chapter 4 Recent advances in reversible watermarking in an encrypted domain -- 4.1 Introduction -- 4.2 Preliminaries -- 4.2.1 Cover source and formats -- 4.2.2 Encryption methods -- 4.2.3 Evaluation metrics -- 4.2.4 Auxiliary data -- 4.3 State-of-the-art methods -- 4.3.1 General framework -- 4.3.2 Reserving room after encryption -- 4.3.3 Reserving room before encryption -- 4.3.4 Challenges and opportunities -- 4.4 Conclusion -- Acknowledgements -- References -- Chapter 5 An analysis of deep steganography and steganalysis -- 5.1 Introduction -- 5.2 Deep learning -- 5.2.1 Steganalysis -- 5.2.2 Steganography -- 5.3 Conclusion -- References -- Chapter 6 Recent trends in reversible data hiding techniques -- 6.1 Introduction -- 6.2 Types of RDH schemes -- 6.2.1 RDH in natural images -- 6.2.2 RDH in encrypted images -- 6.2.3 RDH through encryption (RDHTE) -- 6.3 Analysis of RDH schemes -- 6.4 Image dataset for experimental study -- 6.5 Future scope of the research in RDH -- 6.6 Conclusion -- References -- Chapter 7 Anatomized study of security solutions for multimedia: deep learning-enabled authentication, cryptography and information hiding -- 7.1 Introduction -- 7.2 Hurdles in conventional approaches for security -- 7.2.1 Vulnerability due to expansion -- 7.2.2 Authentication and computational latency -- 7.2.3 Discrepancy in authentication -- 7.3 Vulnerability to multimedia content -- 7.3.1 Data disclosure -- 7.3.2 Content manipulation.
7.3.3 Link sharing -- 7.3.4 Steganography -- 7.3.5 Common workspace -- 7.4 Analysis of security solutions for multimedia content -- 7.4.1 Cryptography -- 7.4.2 Data hiding -- 7.4.3 Deep learning enabled authentication -- 7.5 Future scope -- 7.6 Conclusion -- Acknowledgements -- References -- Chapter 8 New lightweight image encryption algorithm for the Internet of Things and wireless multimedia sensor networks -- 8.1 Introduction -- 8.2 Cryptographic primitives -- 8.2.1 Cryptanalysis -- 8.2.2 Cryptography system -- 8.3 Proposed lightweight algorithm -- 8.4 Safety assessment -- 8.4.1 Statistical analysis -- 8.4.2 Sensitivity test: robustness against differential attacks -- 8.4.3 Calculations speed analysis -- 8.5 Conclusion -- References -- Chapter 9 Applying the capabilities of machine learning for multimedia security: an analysis -- 9.1 Introduction -- 9.2 Overview of machine learning -- 9.2.1 Classification -- 9.2.2 Regression -- 9.2.3 Deep learning -- 9.3 Machine learning algorithms for multimedia security -- 9.4 Advantages of using ML based security mechanism for multimedia -- 9.5 Conclusion -- References -- Chapter 10 Assistive communication technology options for elderly care -- 10.1 Introduction -- 10.2 Cameras for patient monitoring in hospitals -- 10.2.1 Cameras for patient supervising in elderly care -- 10.2.2 Extending camera monitoring from the hospital to the home -- 10.2.3 Home-access video service as experienced by family members -- 10.2.4 Home-access video service as experienced by staff -- 10.2.5 New contexts and possibilities for camera surveillance in elderly care -- 10.3 Home-access monitoring and security -- 10.4 Benefits of the service -- 10.4.1 Benefit for the hospital patient -- 10.4.2 Benefit to the patient's relatives -- 10.4.3 Benefit to the organization -- 10.5 Requirements for the service model.
10.5.1 When is a home-access camera a facet of quality? -- 10.5.2 Conditions for practice -- 10.6 Security issues in networked health infrastructure -- 10.6.1 Information security at the strategic level -- 10.6.2 Different layers of security -- 10.6.3 Key elements of safe IT infrastructure in healthcare in the future -- 10.7 Deploying novel surveillance services in healthcare -- 10.7.1 Underlining the basics -- 10.7.2 Design cycles and relevant frames for design -- 10.7.3 Shared leadership -- 10.7.4 Challenges of innovation adaptation -- 10.7.5 New service models and translational design challenges -- 10.8 Conclusion -- References -- Chapter 11 Deep learning approach for scenario-based abnormality detection -- 11.1 Introduction -- 11.2 Literature study -- 11.3 Scenario understanding -- 11.3.1 Key frame extraction using instance segmentation -- 11.3.2 State full artifacts modelling -- 11.3.3 Action recognition and attention of key action -- 11.3.4 A hybrid model for spatio-temporal features -- 11.3.5 Classification and captioning -- 11.4 Abnormality detection -- 11.4.1 Natural abnormality translation -- 11.5 Datasets -- 11.6 Challenges -- 11.7 Trends and strengths -- 11.8 Conclusion -- References -- Chapter 12 Ear recognition for multimedia security -- 12.1 Introduction -- 12.1.1 Components of a biometric system -- 12.1.2 Modes of operation -- 12.1.3 Performance evaluation metrics -- 12.2 Ear recognition -- 12.3 Ear detection -- 12.4 Ear feature extraction -- 12.4.1 Multiresolution technique for feature extraction -- 12.4.2 Deep learning technique for feature extraction -- 12.4.3 Identification and verification experiments -- 12.5 Conclusion -- Acknowledgements -- References -- Chapter 13 Secure multimedia management: currents trends and future avenues -- 13.1 Introduction -- 13.2 Data collection and screening -- 13.3 Results.
13.3.1 General performance of selected publications -- 13.3.2 Performance of countries, institutions, and authors -- 13.3.3 Performance of journals, citations, and keywords -- 13.3.4 Factorial analysis -- 13.3.5 Co-citation network -- 13.3.6 Collaboration worldwide -- 13.4 Conclusion -- References.
Record Nr. UNINA-9910915783003321
Ansari Irshad Ahmad  
Bristol : , : Institute of Physics Publishing, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital forensics and watermarking : 20th international workshop, IWDW 2021, Beijing, China, November 20-22, 2021 : revised selected papers / / Xianfeng Zhao, Alessandro Piva, Pedro Comesaña-Alfaro (editors)
Digital forensics and watermarking : 20th international workshop, IWDW 2021, Beijing, China, November 20-22, 2021 : revised selected papers / / Xianfeng Zhao, Alessandro Piva, Pedro Comesaña-Alfaro (editors)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (279 pages)
Disciplina 005.82
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Digital watermarking
ISBN 3-030-95398-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464539303316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Digital watermarking [electronic resource] / Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom
Digital watermarking [electronic resource] / Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom
Autore Cox, I. J. (Ingemar J.)
Pubbl/distr/stampa San Diego, CA : Academic Press, 2001
Descrizione fisica xxv, 542 p. : ill. ; 24 cm.
Disciplina 005.8
Altri autori (Persone) Miller, Matthew L.
Bloom, Jeffrey A. (Jeffrey Adam), 1964-
Collana The Morgan Kaufmann series in multimedia information and systems
Soggetto topico Computer security
Digital watermarking
Data protection
Soggetto genere / forma Electronic books.
ISBN 9781558607149
1558607145
Formato Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface -- Example Watermarking Systems -- 1 Introduction -- 2 Applications and Properties -- 3 Models of Watermarking -- 4 Basic Message Coding -- 5 Watermarking with Side Information -- 6 Analyzing Errors -- 7 Using Perceptual Models -- 8 Robust Watermarking -- 9 Watermark Security -- 10 Content Authentication -- Appendix A: Background Concepts -- Appendix B: Selected Theoretical Results -- Appendix C: Source Code -- Appendix D: Notationand Common Variables -- Glossary -- References -- Index -- About the Authors.
Record Nr. UNISALENTO-991003248509707536
Cox, I. J. (Ingemar J.)  
San Diego, CA : Academic Press, 2001
Risorse elettroniche
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
Digital watermarking : 6th international workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007 : proceedings / / edited by Yun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser
Digital watermarking : 6th international workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007 : proceedings / / edited by Yun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Germany : , : Springer, , [2008]
Descrizione fisica 1 online resource (XII, 484 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Digital watermarking
ISBN 3-540-92238-5
Classificazione DAT 050f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Lecture -- Watermarking, a Mature Technology – Retrospect and Prospect -- The Marriage of Cryptography and Watermarking — Beneficial and Challenging for Secure Watermarking and Detection -- Detecting Photographic Composites of People -- Session I: Watermark Security -- (In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005 -- Attack Analysis for He & Wu’s Joint Watermarking/Fingerprinting Scheme -- Multiple Watermarking in Visual Cryptography -- Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding -- Session II: Steganalysis -- Fusion Based Blind Image Steganalysis by Boosting Feature Selection -- Steganalysis of Multi Bit Plane Image Steganography -- Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis -- Weaknesses of MB2 -- Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis -- Steganalysis Versus Splicing Detection -- Session III: Authentication -- Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning -- A General Data Hiding Framework and Multi-level Signature for Binary Images -- High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents -- Session IV: Reversible Data Hiding -- Reversible Quantization-Index Modulation Using Neighboring Correlation -- High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain -- Reversible Data Hiding Using Prediction Error Values Embedding -- An Improved Reversible Difference Expansion Watermarking Algorithm -- Optimum Histogram Pair Based Image Lossless Data Embedding -- Session V: Robust Watermarking -- Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding -- GA-Based Robustness Evaluation Method for Digital Image Watermarking -- Dither Modulation in the Logarithmic Domain -- Session VI: Poster Session -- A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack -- Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption -- Design an Aperiodic Stochastic Resonance Signal Processor for Digital Watermarking -- Watermarking for Authentication of LZ-77 Compressed Documents -- Robust Audio Zero-Watermark Based on LWT and Chaotic Modulation -- A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone Images -- Session VII: Theory and Methods in Watermarking -- On the Complexity of Obtaining Optimal Watermarking Schemes -- A Theoretical Framework for Watermarking of Compressed Signals -- Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model -- Multiple Scrambling and Adaptive Synchronization for Audio Watermarking -- A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality -- A High Payload VQ Steganographic Method for Binary Images.
Record Nr. UNISA-996465399003316
Berlin, Germany : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Digital watermarking and steganography [[electronic resource] /] / Ingemar J. Cox ... [et al.]
Digital watermarking and steganography [[electronic resource] /] / Ingemar J. Cox ... [et al.]
Edizione [2nd ed.]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Morgan Kaufmann Publishers, c2008
Descrizione fisica 1 online resource (623 p.)
Disciplina 005.8
Altri autori (Persone) CoxI. J (Ingemar J.)
Collana The Morgan Kaufmann series in multimedia information and systems
The Morgan kaufmann series in computer security
Soggetto topico Computer security
Digital watermarking
Data protection
Soggetto genere / forma Electronic books.
ISBN 1-281-09616-4
9786611096168
0-08-055580-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Digital Watermarking and Steganography; Copyright Page; Table of Contents; Preface to the First Edition; Preface to the Second Edition; Example Watermarking Systems; Chapter 1. Introduction; 1.1 Information Hiding, Steganography, and Watermarking; 1.2 History of Watermarking; 1.3 History of Steganography; 1.4 Importance of Digital Watermarking; 1.5 Importance of Steganography; Chapter 2. Applications and Properties; 2.1 Applications of Watermarking; 2.2 Applications of Steganography; 2.3 Properties of Watermarking Systems; 2.4 Evaluating Watermarking Systems
2.5 Properties of Steganographic and Steganalysis Systems2.6 Evaluating and Testing Steganographic Systems; 2.7 Summary; Chapter 3. Models of Watermarking; 3.1 Notation; 3.2 Communications; 3.3 Communication-Based Models of Watermarking; 3.4 Geometric Models of Watermarking; 3.5 Modeling Watermark Detection by Correlation; 3.6 Summary; Chapter 4. Basic Message Coding; 4.1 Mapping Messages into Message Vectors; 4.2 Error Correction Coding; 4.3 Detecting Multisymbol Watermarks; 4.4 Summary; Chapter 5. Watermarking with Side Information; 5.1 Informed Embedding
5.2 Watermarking Using Side Information5.3 Dirty-Paper Codes; 5.4 Summary; Chapter 6. Practical Dirty-Paper Codes; 6.1 Practical Considerations for Dirty-Paper Codes; 6.2 Broad Approaches to Dirty-Paper Code Design; 6.3 Implementing DM with A Simple Lattice Code; 6.4 Typical Tricks in Implementing Lattice Codes; 6.5 Coding with Better Lattices; 6.6 Making Lattice Codes Survive Valumetric Scaling; 6.7 Dirty-Paper Trellis Codes; 6.8 Summary; Chapter 7. Analyzing Errors; 7.1 Message Errors; 7.2 False Positive Errors; 7.3 False Negative Errors; 7.4 ROC Curves
7.5 The Effect of Whitening on Error Rates7.6 Analysis of Normalized Correlation; 7.7 Summary; Chapter 8. Using Perceptual Models; 8.1 Evaluating Perceptual Impact of Watermarks; 8.2 General Form of A Perceptual Model; 8.3 Two Examples of Perceptual Models; 8.4 Perceptually Adaptive Watermarking; 8.5 Summary; Chapter 9. Robust Watermarking; 9.1 Approaches; 9.2 Robustness to Valumetric Distortions; 9.3 Robustness to Temporal and Geometric Distortions; 9.4 Summary; Chapter 10. Watermark Security; 10.1 Security Requirements; 10.2 Watermark Security and Cryptography
10.3 Some Significant Known Attacks10.4 Summary; Chapter 11. Content Authentication; 11.1 Exact Authentication; 11.2 Selective Authentication; 11.3 Localization; 11.4 Restoration; 11.5 Summary; Chapter 12. Steganography; 12.1 Steganographic Communication; 12.2 Notation and Terminology; 12.3 Information-Theoretic Foundations of Steganography; 12.4 Practical Steganographic Methods; 12.5 Minimizing the Embedding Impact; 12.6 Summary; Chapter 13. Steganalysis; 13.1 Steganalysis Scenarios; 13.2 Some Significant Steganalysis Algorithms; 13.3 Summary; Appendix A. Background Concepts
A.1 Information Theory
Record Nr. UNINA-9910450945103321
Amsterdam ; ; Boston, : Morgan Kaufmann Publishers, c2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital watermarking and steganography [[electronic resource] /] / Ingemar J. Cox ... [et al.]
Digital watermarking and steganography [[electronic resource] /] / Ingemar J. Cox ... [et al.]
Edizione [2nd ed.]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Morgan Kaufmann Publishers, c2008
Descrizione fisica 1 online resource (623 p.)
Disciplina 005.8
Altri autori (Persone) CoxI. J (Ingemar J.)
Collana The Morgan Kaufmann series in multimedia information and systems
The Morgan kaufmann series in computer security
Soggetto topico Computer security
Digital watermarking
Data protection
ISBN 1-281-09616-4
9786611096168
0-08-055580-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Digital Watermarking and Steganography; Copyright Page; Table of Contents; Preface to the First Edition; Preface to the Second Edition; Example Watermarking Systems; Chapter 1. Introduction; 1.1 Information Hiding, Steganography, and Watermarking; 1.2 History of Watermarking; 1.3 History of Steganography; 1.4 Importance of Digital Watermarking; 1.5 Importance of Steganography; Chapter 2. Applications and Properties; 2.1 Applications of Watermarking; 2.2 Applications of Steganography; 2.3 Properties of Watermarking Systems; 2.4 Evaluating Watermarking Systems
2.5 Properties of Steganographic and Steganalysis Systems2.6 Evaluating and Testing Steganographic Systems; 2.7 Summary; Chapter 3. Models of Watermarking; 3.1 Notation; 3.2 Communications; 3.3 Communication-Based Models of Watermarking; 3.4 Geometric Models of Watermarking; 3.5 Modeling Watermark Detection by Correlation; 3.6 Summary; Chapter 4. Basic Message Coding; 4.1 Mapping Messages into Message Vectors; 4.2 Error Correction Coding; 4.3 Detecting Multisymbol Watermarks; 4.4 Summary; Chapter 5. Watermarking with Side Information; 5.1 Informed Embedding
5.2 Watermarking Using Side Information5.3 Dirty-Paper Codes; 5.4 Summary; Chapter 6. Practical Dirty-Paper Codes; 6.1 Practical Considerations for Dirty-Paper Codes; 6.2 Broad Approaches to Dirty-Paper Code Design; 6.3 Implementing DM with A Simple Lattice Code; 6.4 Typical Tricks in Implementing Lattice Codes; 6.5 Coding with Better Lattices; 6.6 Making Lattice Codes Survive Valumetric Scaling; 6.7 Dirty-Paper Trellis Codes; 6.8 Summary; Chapter 7. Analyzing Errors; 7.1 Message Errors; 7.2 False Positive Errors; 7.3 False Negative Errors; 7.4 ROC Curves
7.5 The Effect of Whitening on Error Rates7.6 Analysis of Normalized Correlation; 7.7 Summary; Chapter 8. Using Perceptual Models; 8.1 Evaluating Perceptual Impact of Watermarks; 8.2 General Form of A Perceptual Model; 8.3 Two Examples of Perceptual Models; 8.4 Perceptually Adaptive Watermarking; 8.5 Summary; Chapter 9. Robust Watermarking; 9.1 Approaches; 9.2 Robustness to Valumetric Distortions; 9.3 Robustness to Temporal and Geometric Distortions; 9.4 Summary; Chapter 10. Watermark Security; 10.1 Security Requirements; 10.2 Watermark Security and Cryptography
10.3 Some Significant Known Attacks10.4 Summary; Chapter 11. Content Authentication; 11.1 Exact Authentication; 11.2 Selective Authentication; 11.3 Localization; 11.4 Restoration; 11.5 Summary; Chapter 12. Steganography; 12.1 Steganographic Communication; 12.2 Notation and Terminology; 12.3 Information-Theoretic Foundations of Steganography; 12.4 Practical Steganographic Methods; 12.5 Minimizing the Embedding Impact; 12.6 Summary; Chapter 13. Steganalysis; 13.1 Steganalysis Scenarios; 13.2 Some Significant Steganalysis Algorithms; 13.3 Summary; Appendix A. Background Concepts
A.1 Information Theory
Record Nr. UNINA-9910777307303321
Amsterdam ; ; Boston, : Morgan Kaufmann Publishers, c2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICWIP 2017 : 2017 International Conference on Watermarking and Image Processing : September 6-8, 2017, Paris, France / / in-cooperation, University of Leeds
ICWIP 2017 : 2017 International Conference on Watermarking and Image Processing : September 6-8, 2017, Paris, France / / in-cooperation, University of Leeds
Pubbl/distr/stampa New York : , : ACM, , 2017
Descrizione fisica 1 online resource (70 pages)
Disciplina 621.367
Soggetto topico Image processing
Digital watermarking
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti International Conference on Watermarking and Image Processing 2017
Proceedings of the International Conference on Watermarking and Image Processing
Record Nr. UNINA-9910376047003321
New York : , : ACM, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IIH-MSP 2008 : 2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing : 15-17 August 2008, Harbin, China
IIH-MSP 2008 : 2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing : 15-17 August 2008, Harbin, China
Pubbl/distr/stampa [Place of publication not identified], : IEEE Computer Society, 2008
Soggetto topico Computer security - Security measures
Computer networks
Cryptography
Digital watermarking
Data protection
Engineering & Applied Sciences
Computer Science
ISBN 1-5090-7838-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996198149103316
[Place of publication not identified], : IEEE Computer Society, 2008
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui