Normal view MARC view ISBD view

Watermarking Security [electronic resource] / by Patrick Bas, Teddy Furon, François Cayre, Gwenaël Doërr, Benjamin Mathon.

By: Bas, Patrick [author.].
Contributor(s): Furon, Teddy [author.] | Cayre, François [author.] | Doërr, Gwenaël [author.] | Mathon, Benjamin [author.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: SpringerBriefs in Signal Processing: Publisher: Singapore : Springer Nature Singapore : Imprint: Springer, 2016Edition: 1st ed. 2016.Description: IX, 125 p. 70 illus., 29 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9789811005060.Subject(s): Signal processing | Data protection | Security systems | Cryptography | Data encryption (Computer science) | Signal, Speech and Image Processing | Data and Information Security | Security Science and Technology | CryptologyAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 621.382 Online resources: Click here to access online
Contents:
General Introduction -- A quick tour of watermarking techniques -- Fundamentals -- Secure Design -- Attacks -- Conclusions and Open Problems.
In: Springer Nature eBookSummary: This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.
    average rating: 0.0 (0 votes)
No physical items for this record

General Introduction -- A quick tour of watermarking techniques -- Fundamentals -- Secure Design -- Attacks -- Conclusions and Open Problems.

This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

There are no comments for this item.

Log in to your account to post a comment.