312,20 €
346,89 €
-10% with code: EXTRA
Color Image Watermarking
Color Image Watermarking
312,20
346,89 €
  • We will send in 10–14 business days.
This book presents watermarking algorithms derived from signal processing methods such as wavelet transform, matrix decomposition and cosine transform to address the limitations of current technologies. For each algorithm, mathematical foundations are explained with analysis conducted to evaluate performances on robotness and efficiency. Combining theories and practice, it is suitable for information security researchers and industrial engineers.
346.89
  • Publisher:
  • Year: 2017
  • ISBN-10: 3110487578
  • ISBN-13: 9783110487572
  • Format: 17 x 24.4 x 1.3 cm, kieti viršeliai
  • Language: English
  • SAVE -10% with code: EXTRA

Color Image Watermarking (e-book) (used book) | Qingtang Su | bookbook.eu

Reviews

Description

This book presents watermarking algorithms derived from signal processing methods such as wavelet transform, matrix decomposition and cosine transform to address the limitations of current technologies. For each algorithm, mathematical foundations are explained with analysis conducted to evaluate performances on robotness and efficiency. Combining theories and practice, it is suitable for information security researchers and industrial engineers.

EXTRA 10 % discount with code: EXTRA

312,20
346,89 €
We will send in 10–14 business days.

The promotion ends in 23d.08:37:14

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 3,47 Book Euros!?
  • Author: Qingtang Su
  • Publisher:
  • Year: 2017
  • ISBN-10: 3110487578
  • ISBN-13: 9783110487572
  • Format: 17 x 24.4 x 1.3 cm, kieti viršeliai
  • Language: English English

This book presents watermarking algorithms derived from signal processing methods such as wavelet transform, matrix decomposition and cosine transform to address the limitations of current technologies. For each algorithm, mathematical foundations are explained with analysis conducted to evaluate performances on robotness and efficiency. Combining theories and practice, it is suitable for information security researchers and industrial engineers.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)