Skip to Main Content
Information Security Management Handbook, Volume 7, 6th Edition
book

Information Security Management Handbook, Volume 7, 6th Edition

by Richard O'Hanley, James S. Tiller
August 2013
Intermediate to advanced content levelIntermediate to advanced
434 pages
15h 17m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 7, 6th Edition
70 ◾  Information Security Management Handbook
methods, initially, the image is decomposed into higher- and lower-resolution bands by choosing a
particular wavelet. e watermarks are then embedded into high-resolution bands where the HVS
is less sensitive.
Fingerprinting techniques are another form of watermarking techniques. Fingerprinting
makes the digital copy unique by embedding a unique identification or serial number into it.
Fingerprinting has an ability to track back the culprits who circumvent the copy protection by
analyzing the pirate copy under circulation. Watermarking deals with embedding identification
information in a cover, such as a video or audio signal robustly, whereas fingerprinting mainly
concentrates on creating a unique ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 5, 6th Edition

Information Security Management Handbook, Volume 5, 6th Edition

Micki Krause Nozaki, Harold F. Tipton
Information Security for Managers

Information Security for Managers

Michael Workman, Daniel C. Phelps, John N. Gathegi

Publisher Resources

ISBN: 9781466567498