Watermarking Security [recurso electrónico] / by Patrick Bas, Teddy Furon, François Cayre, Gwenaël Doërr, Benjamin Mathon.
Tipo de material: TextoSeries SpringerBriefs in Electrical and Computer EngineeringEditor: Singapore : Springer Singapore : Imprint: Springer, 2016Descripción: IX, 125 p. 70 illus., 29 illus. in color. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9789811005060Tema(s): Engineering | Computer security | Data encryption (Computer science) | System safety | Engineering | Signal, Image and Speech Processing | Systems and Data Security | Security Science and Technology | Data EncryptionFormatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD: 621.382 Clasificación LoC:TK5102.9TA1637-1638TK7882.S65Recursos en línea: Libro electrónico
Contenidos:
En: Springer eBooksResumen: This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.
General Introduction -- A quick tour of watermarking techniques -- Fundamentals -- Secure Design -- Attacks -- Conclusions and Open Problems.
Tipo de ítem | Biblioteca actual | Colección | Signatura | Copia número | Estado | Fecha de vencimiento | Código de barras |
---|---|---|---|---|---|---|---|
Libro Electrónico | Biblioteca Electrónica | Colección de Libros Electrónicos | 1 | No para préstamo |
General Introduction -- A quick tour of watermarking techniques -- Fundamentals -- Secure Design -- Attacks -- Conclusions and Open Problems.
This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.