Digital Watermarking and Steganography

Digital Watermarking and Steganography, 2nd Edition

Digital Watermarking and Steganography, 2nd Edition,Ingemar Cox,Matthew Miller,Jeffrey Bloom,Jessica Fridrich,Ton Kalker,ISBN9780123725851

  &      &      &      &      

Morgan Kaufmann




235 X 191

This book provides a framework for researching and working with digital watermarking and steganography techniques.

Print Book + eBook

USD 118.77
USD 197.95

Buy both together and save 40%

Print Book


In Stock

Estimated Delivery Time
USD 101.00

eBook Overview

VST (VitalSource Bookshelf) format

DRM-free included formats : PDF

USD 96.95
Add to Cart

Key Features

*This new edition now contains essential information on steganalysis and steganography
*New concepts and new applications including QIM introduced
*Digital watermark embedding is given a complete update with new processes and applications


Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession.


Computer engineers, government agencies, digital rights managers, network security managers, producers of electronic content, researchers, students

Ingemar Cox

Ingemar J. Cox holds a B.Sc. from University College London and a Ph.D. from Oxford University. He worked at AT&T Bell Labs from 1984 until 1989 and in 1989 joined NEC Research Institute as a senior research scientist. From 1997 to 1999, he served as CTO of Signafy, an NEC subsidiary responsible for commercialization of watermarking, In 1999, he returned to the NEC Research Institute as a Research Fellow.

Affiliations and Expertise

Professor, University College, London, U.K.

Matthew Miller

Matthew L. Miller began working in graphics and image processing at AT&T Bell Labs in 1979. He obtained a B.A. in cognitive science from the University of Rochester in 1986, and has subsequently written several commercial software applications and delivered lecture courses at a number of universities in Europe. Since 1993, he has worked as a researcher at NEC.

Affiliations and Expertise

NEC, Princeton, NJ, U.S.A.

Jeffrey Bloom

Jeffrey A. Bloom, a researcher in digital watermarking at the Sarnoff Corporation, began working in the field in 1998 at Signafy, Inc. and later at NEC Research Institute. He holds B.S. and M.S. degrees in electrical engineering from Worcester Polytechnic Institute and a Ph.D. from the University of California, Davis. Dr. Bloom has expertise in the areas of signal and image processing, image and video compression, and human visual models.

Affiliations and Expertise

Thomson, Princeton, NJ, U.S.A.

Jessica Fridrich

Affiliations and Expertise

SUNY Binghamton, Binghamton, NY, U.S.A.

Ton Kalker

Affiliations and Expertise

Hewlett-Packard Labs, Palo Alto, CA, U.S.A.

Digital Watermarking and Steganography, 2nd Edition

Chapter One: Introduction
Chapter Two: Applications and Properties
Chapter Three: Models of Watermarking
Chapter Four: Message Coding
Chapter Five: Watermarking with Side Information
Chapter Six: Structured Dirty-Paper Codes
Chapter Seven: Analyzing Errors
Chapter Eight: Using Perceptual Models
Chapter Nine: Robust Watermarking
Chapter Ten: Watermark Security
Chapter Eleven: Content Authentication
Chapter Twelve: Steganography and Steganalysis
Free Shipping
Shop with Confidence

Free Shipping around the world
▪ Broad range of products
▪ 30 days return policy

Contact Us