Digital Watermarking at Meripustak

Digital Watermarking

Books from same Author: Cox N J

Books from same Publisher: ELSEVIER

Related Category: Author List / Publisher List

  • Price: ₹ 7286.00/- [ 43.00% off ]

    Seller Price: ₹ 4153.00

Sold By: Store4Doctors      Click for Bulk Order

Offer 1: Get 43.00 % + Flat ₹ 75 discount on shopping of ₹ 500 [Use Code: MPSTK75]

Offer 2: Get 43.00 % + Flat ₹ 100 discount on shopping of ₹ 1500 [Use Code: IND100]

Offer 3: Get 43.00 % + Flat ₹ 300 discount on shopping of ₹ 5000 [Use Code: MPSTK300]

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

Free Shipping Available

Click for International Orders
  • Provide Fastest Delivery

  • 100% Original Guaranteed
  • General Information  
    Author(s)Cox N J
    Publish YearSeptember 2001


    ELSEVIER Digital Watermarking by Cox N J

    Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. "Digital Watermarking" covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications.This title emphasizes the underlying watermarking principles that are relevant for all media: images, video, and audio. It discusses a wide variety of applications, theoretical principles, detection and embedding concepts and the key properties of digital watermarks - robustness, fidelity, data payload, and security. It examines copyright protection and many other applications, including broadcast monitoring, transaction tracking, authentication, copy control, and device control. It presents a series of detailed examples called "Investigations" th...