Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Watermarking SecuritySecure Design

Watermarking Security: Secure Design [This chapter provides different solutions to achieve a security level such as stego-security, subspace-security or key security while minimizing the embedding distortion.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Loading next page...
 
/lp/springer-journals/watermarking-security-secure-design-uNgdj062A6
Publisher
Springer Singapore
Copyright
© The Author(s) 2016
ISBN
978-981-10-0505-3
Pages
63 –102
DOI
10.1007/978-981-10-0506-0_4
Publisher site
See Chapter on Publisher Site

Abstract

[This chapter provides different solutions to achieve a security level such as stego-security, subspace-security or key security while minimizing the embedding distortion.]

Published: Jun 22, 2016

Keywords: Watermark Scheme; Detection Region; Watermark Technique; Watermark Signal; Robustness Criterion

There are no references for this article.