Innovations in Digital Watermarking Techniques

Information security and copyright protection are more important today than before. Digital watermarking is one of the widely used techniques used in the world in the area of information security. This book introduces a number of digital watermarking techniques and is divided into four parts. The fi...

Full description

Bibliographic Details
Main Authors: Wang, Feng-Hsing. (Author), Pan, Jeng-Shyang. (Author), Jain, Lakhmi C. (Author)
Corporate Author: SpringerLink (Online service)
Format: Electronic
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2009.
Series:Studies in Computational Intelligence, 232
Subjects:
Online Access:https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-03187-8
LEADER 03196nam a22005175i 4500
001 7388
003 DE-He213
005 20130725193314.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 # # |a 9783642031878  |9 978-3-642-03187-8 
024 7 # |a 10.1007/978-3-642-03187-8  |2 doi 
050 # 4 |a TA329-348 
050 # 4 |a TA640-643 
072 # 7 |a TBJ  |2 bicssc 
072 # 7 |a MAT003000  |2 bisacsh 
082 0 4 |a 519  |2 23 
100 1 # |a Wang, Feng-Hsing.  |e author. 
245 1 0 |a Innovations in Digital Watermarking Techniques  |c by Feng-Hsing Wang, Jeng-Shyang Pan, Lakhmi C. Jain.  |h [electronic resource] / 
264 # 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg,  |c 2009. 
300 # # |b online resource. 
336 # # |a text  |b txt  |2 rdacontent 
337 # # |a computer  |b c  |2 rdamedia 
338 # # |a online resource  |b cr  |2 rdacarrier 
347 # # |a text file  |b PDF  |2 rda 
490 1 # |a Studies in Computational Intelligence,  |v 232  |x 1860-949X ; 
505 0 # |a I Introduction and Background -- Introduction -- Digital Watermarking Techniques -- Intelligent Techniques -- II Intelligent Watermarking -- Spatial-Based Watermarking Schemes and Pixel Selection -- Discrete Cosine Transform Based Watermarking Scheme and Band Selection -- Vector Quantisation Based Watermarking Schemes and Codebook Partition -- Genetic Index Assignment -- Genetic Watermark Modification -- III Hybrid Systems of Digital Watermarking -- Watermarking Based on Multiple Description VQ -- Fake Watermark Embedding Scheme Based on Multi-Stage VQ -- Watermarking with Visual Cryptography and Gain-Shape VQ -- IV Summary -- 12 Conclusions and Future Directions. 
520 # # |a Information security and copyright protection are more important today than before. Digital watermarking is one of the widely used techniques used in the world in the area of information security. This book introduces a number of digital watermarking techniques and is divided into four parts. The first part introduces the importance of watermarking techniques and intelligent technology. The second part includes a number of watermarking techniques. The third part includes the hybrid watermarking techniques and the final part presents conclusions. This book is directed to students, professors, researchers and application engineers who are interested in the area of information security. 
650 # 0 |a Engineering. 
650 # 0 |a Data structures (Computer science). 
650 # 0 |a Artificial intelligence. 
650 # 0 |a Engineering mathematics. 
650 1 4 |a Engineering. 
650 2 4 |a Appl.Mathematics/Computational Methods of Engineering. 
650 2 4 |a Artificial Intelligence (incl. Robotics). 
650 2 4 |a Data Structures, Cryptology and Information Theory. 
700 1 # |a Pan, Jeng-Shyang.  |e author. 
700 1 # |a Jain, Lakhmi C.  |e author. 
710 2 # |a SpringerLink (Online service) 
773 0 # |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642031861 
830 # 0 |a Studies in Computational Intelligence,  |v 232  |x 1860-949X ; 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-03187-8 
912 # # |a ZDB-2-ENG 
950 # # |a Engineering (Springer-11647)