Data Hiding Fundamentals and Applications
Content Security in Digital Multimedia
- Publisher's listprice EUR 76.95
-
31 915 Ft (30 395 Ft + 5% VAT)
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 10% (cc. 3 192 Ft off)
- Discounted price 28 723 Ft (27 356 Ft + 5% VAT)
Subcribe now and take benefit of a favourable price.
Subscribe
31 915 Ft
Availability
printed on demand
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Publisher Elsevier Science
- Date of Publication 9 September 2004
- ISBN 9780120471447
- Binding Hardback
- No. of pages272 pages
- Size 228x152 mm
- Weight 540 g
- Language English 0
Categories
Long description:
Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with respect to multimedia content. The owners of this content face enormous challenges in safeguarding their intellectual property, while still exploiting the Internet as an important resource for commerce.
Data Hiding Fundamentals and Applications focuses on the theory and state-of-the-art applications of content security and data hiding in digital multimedia. One of the pillars of content security solutions is the imperceptible insertion of information into multimedia data for security purposes; the idea is that this inserted information will allow detection of unauthorized usage.
MoreTable of Contents:
Introduction. Frameworks for Data Hiding. Communication with Side Information and Data Hiding. Type-I (Linear) Data Hiding. Type-II and Type-III (Non-Linear) Data Hiding Methods. Advanced Implementations. Major Design Issues. Data Hiding Applications.
More