Читать книгу Multimedia Security, Volume 1 - William Puech - Страница 3
List of Tables
Оглавление1 Chapter 1Table 1.1 Description of the main sources of noise during the acquisition proces...
2 Chapter 3Table 3.1 Galois field GF(24)Table 3.2 Summary table of different contributions in watermarking and correctio...Table 3.3. Table of acronyms in Table 3.2Table 3.4 Table of code correction parameters. For each row of the table, we hav...
3 Chapter 4Table 4.1 Psychovisual experiments of marked image comparisons
4 Chapter 7Table 7.1 Properties of data hiding methods, according to their embedding domainTable 7.2 Comparison with previous methods on the 3D Bunny objectTable 7.3 Evaluation of the quality of the approach studied (Itier and Puech 201...
5 Chapter 8Table 8.1 The different possibilities of good and bad detection. For a color ver...