Watermarking Security [recurso electrónico] / by Patrick Bas, Teddy Furon, François Cayre, Gwenaël Doërr, Benjamin Mathon.

Por: Bas, Patrick [author.]Colaborador(es): Furon, Teddy [author.] | Cayre, François [author.] | Doërr, Gwenaël [author.] | Mathon, Benjamin [author.] | SpringerLink (Online service)Tipo de material: TextoTextoSeries SpringerBriefs in Electrical and Computer EngineeringEditor: Singapore : Springer Singapore : Imprint: Springer, 2016Descripción: IX, 125 p. 70 illus., 29 illus. in color. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9789811005060Tema(s): Engineering | Computer security | Data encryption (Computer science) | System safety | Engineering | Signal, Image and Speech Processing | Systems and Data Security | Security Science and Technology | Data EncryptionFormatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD: 621.382 Clasificación LoC:TK5102.9TA1637-1638TK7882.S65Recursos en línea: Libro electrónicoTexto
Contenidos:
General Introduction -- A quick tour of watermarking techniques -- Fundamentals -- Secure Design -- Attacks -- Conclusions and Open Problems.
En: Springer eBooksResumen: This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.
Star ratings
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Electrónico Biblioteca Electrónica
Colección de Libros Electrónicos 1 No para préstamo

General Introduction -- A quick tour of watermarking techniques -- Fundamentals -- Secure Design -- Attacks -- Conclusions and Open Problems.

This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

Con tecnología Koha