Home Page Icon
Home Page
Table of Contents for
End User License Agreement
Close
End User License Agreement
by William Puech
Multimedia Security, Volume 1
Cover
Title Page
Copyright
Foreword by Gildas Avoine
Foreword by Cédric Richard
Preface
1 How to Reconstruct the History of a Digital Image, and of Its Alterations
2 Deep Neural Network Attacks and Defense: The Case of Image Classification
3 Codes and Watermarks
4 Invisibility
5 Steganography: Embedding Data Into Multimedia Content
6 Traitor Tracing
7 3D Watermarking
8 Steganalysis: Detection of Hidden Data in Multimedia Content
List of Authors
Index
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Index
WILEY END USER LICENSE AGREEMENT
Go to
www.wiley.com/go/eula
to access Wiley’s ebook EULA.
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset