What do you think?
Rate this book


Realistic application scenarios and parameters help you to decide which watermarking technology is right for a host of applications. In-depth analysis of threats, risks, and attack mechanisms lets you establish quality and robustness criteria to ensure optimal content protection. Copy and usage schemes, digital rights management, tamper resistance, and encryption are also among the content protection mechanisms and solutions that this book arms you with to prevent illegal pirating of copyrighted digital content.
274 pages, Hardcover
First published June 29, 2003