Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
Amity Central Library ASET M.tech Network & Cyber Security | Reference | 005.82 SHI-D (Browse shelf(Opens below)) | Not For Loan | 27508 |
Introduction
Digital Watermarking
Digital Steganography
Differences between Watermarking and Steganography
A Brief History
Appendix: Selected List of Books on Watermarking and Steganography
Classification in Digital Watermarking
Classification Based on Characteristics
Classification Based on Applications
Mathematical Preliminaries
Least-Significant-Bit Substitution
Discrete Fourier Transform (DFT)
Discrete Cosine Transform
Discrete Wavelet Transform
Random Sequence Generation
The Chaotic Map
Error Correction Code
Set Partitioning in Hierarchical Tree
Digital Watermarking Fundamentals
Spatial-Domain Watermarking
Frequency-Domain Watermarking
The Fragile Watermark
The Robust Watermark
Watermarking Attacks and Tools
Image Processing Attacks
Geometric Transformation
Cryptographic Attack
Protocol Attacks
Watermarking Tools
Combinational Digital Watermarking in the Spatial
and Frequency Domains
An Overview of Combinational Watermarking
There are no comments on this title.