What people are saying - Write a review
We haven't found any reviews in the usual places.
Security Aspects and Legal Issues
Introduction to the Taxonomy of Multiple Cryptography
The German Digital Signature Act in the Context of Implementing the EU Directive for Electronic Signatures
14 other sections not shown
Other editions - View all
active data hiding algorithm applications arrays attack audio block coding compression Computer correlation cropping cryptography decoding decryption defined detector DFT coefficients digital images digital signatures digital watermarking distortion distribution domain edge electronic signatures embed embedded watermark encoded encryption entity error estimate extracted Figure flood algorithm fragile marking fragile watermarks frequency Gaussian graph hash function hash value hidden data host signal IEEE Image Processing inserted JPEG layer marked image masking message authentication codes method modified MPEG multiple multiple-key ciphers multiple-key-parameter noise non-repudiation original image parameter patterns performed pixel pixel level plaintext private key problem Proc protocol public key quantization requirements rotation sample scale factors secret key sequence signature scheme solution spatial spread spectrum steganography Stirmark tamper termark tion triangle trust verifier visual watermark detection watermarked image watermarking schemes watermarking system watermarking techniques wavelet maxima zero knowledge proofs