Linked e-resources
Details
Table of Contents
Chapter1: Introduction and the Need for Noise Tolerant Data Authentication
Chapter2: Wireless Communications
Chapter3: Noise Tolerant Data Authentication Mechanisms
Chapter4: Digital Watermarking Techniques
Chapter5: Dual Watermarking with Error Correction
Chapter6: Enhanced Decoding based on Authenticating the Region of Interests
Chapter7: Authentication with Block Level Error Localization.
Chapter2: Wireless Communications
Chapter3: Noise Tolerant Data Authentication Mechanisms
Chapter4: Digital Watermarking Techniques
Chapter5: Dual Watermarking with Error Correction
Chapter6: Enhanced Decoding based on Authenticating the Region of Interests
Chapter7: Authentication with Block Level Error Localization.