Multimedia Watermarking
Autor: | Aditya Kumar Sahu |
---|---|
EAN: | 9789819998036 |
eBook Format: | |
Sprache: | Englisch |
Produktart: | eBook |
Veröffentlichungsdatum: | 21.02.2024 |
Untertitel: | Latest Developments and Trends |
Kategorie: | |
Schlagworte: | Digital watermarking;Tamper detection and localization;Multimedia authentication and access control;Machine learning;Blockchain;Self-recovery based watermarking;Spatial domain;Discrete wavelet transform;Singular value decomposition (SVD) based waterm |
139,09 €*
Versandkostenfrei
Die Verfügbarkeit wird nach ihrer Bestellung bei uns geprüft.
Bücher sind in der Regel innerhalb von 1-2 Werktagen abholbereit.
Multimedia watermarking is a key ingredient for integrity verification, transaction tracking, copyright protection, authentication, copy control, and forgery detection. This book provides an extensive survey from the fundamentals to cutting-edge digital watermarking techniques. One of the crucial aspects of multimedia security is the ability to detect forged/tampered regions from the multimedia object. In this book, we emphasized how tampering detection, localization, and recovery of manipulated information not only limits but also eliminates the scope of unauthorized usage. Finally, this book provides the groundwork for understanding the role of intelligent machines and blockchain in achieving better security in multimedia watermarking.
Readers will find it easy to comprehend the wide variety of applications, theoretical principles, and effective solutions for protecting intellectual rights soon after reading this book.
Dr. Aditya Kumar Sahu currently works as an Associate Professor at Vignan University, Guntur, India. He holds PhD degree from KL University, Vijayawada, India. He has published many indexed publications in the field of information hiding with reputed publishers such as Springer, Elsevier, IEEE, T&F, and DeGruyter. His current research interests include image watermarking, tamper detection and correction, self-recovery, reversible watermarking, data hiding, image authentication using deep neural networks, and steganalysis.