Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 3 of 3 matches in All Departments
With a preface by Ton Kalker. Informed Watermarking is an essential tool for both academic and professional researchers working in the areas of multimedia security, information embedding, and communication. Theory and practice are linked, particularly in the area of multi-user communication. From the Preface: Watermarking has become a more mature discipline with proper foundation in both signal processing and information theory. We can truly say that we are in the era of "second generation" watermarking. This book is first in addressing watermarking problems in terms of second-generation insights. It provides a complete overview of the most important results on capacity and security. The Costa scheme, and in particular a simpler version of it, the Scalar Costa scheme, is studied in great detail. An important result of this book is that it is possible to approach the Shannon limit within a few decibels in a practical system. These results are verified on real-world data, not only the classical category of images, but also on chemical structure sets. Inspired by the work of Moulin and O'Sullivan, this book also addresses security aspects by studying AGWN attacks in terms of game theory. "The authors of Informed Watermarking give a well-written exposA(c) of how watermarking came of age, where we are now, and what to expect in the future. It is my expectation that this book will be a standard reference on second-generation watermarking for the years to come." Ton Kalker, Technische Universiteit Eindhoven
With a preface by Ton Kalker. Informed Watermarking is an essential tool for both academic and professional researchers working in the areas of multimedia security, information embedding, and communication. Theory and practice are linked, particularly in the area of multi-user communication. From the Preface: Watermarking has become a more mature discipline with proper foundation in both signal processing and information theory. We can truly say that we are in the era of second generation watermarking. This book is first in addressing watermarking problems in terms of second-generation insights. It provides a complete overview of the most important results on capacity and security. The Costa scheme, and in particular a simpler version of it, the Scalar Costa scheme, is studied in great detail. An important result of this book is that it is possible to approach the Shannon limit within a few decibels in a practical system. These results are verified on real-world data, not only the classical category of images, but also on chemical structure sets.Inspired by the work of Moulin and O'Sullivan, this book also addresses security aspects by studying AGWN attacks in terms of game theory. The authors of Informed Watermarking give a well-written expose of how watermarking came of age, where we are now, and what to expect in the future. It is my expectation that this book will be a standard reference on second-generation watermarking for the years to come. Ton Kalker, Technische Universiteit Eindhoven
Mit dem Vordringen der Mikroelektronik in Bereiche, die in der Vergangenheit keinen Bezug zu dieser Technik hatten, wAchst das InformationsbedA1/4rfnis A1/4ber die MAglichkeiten der Realisierung von Systemen oder Teilkomponenten in Form integrierter Schaltungen. Es wird immer wichtiger, den Mikroelektronik-Anwender in die Lage zu versetzen, selbst System- und Schaltungs-Layouts herstellungsgerecht zu entwerfen. Das Buch gibt hierzu einen Aoeberblick A1/4ber den Weg des Entwurfs einer "Full-Custom-Schaltung." Es liegt ihm als roter Faden ein neues Entwurfsverfahren zugrunde, das moderne Workstations mit leistungsfAhigen Rechnern nutzt. Der VLSI-Anwender wird sowohl mit Entwurfsverfahren vertraut gemacht, als auch mit den technologischen Randbedingungen fA1/4r den optimalen Systementwurf.
|
You may like...
|