The first two chapters of this book have discussed the field of watermarking at a fairly nontechnical level. With the present chapter, we begin our exploration of the detailed, technical principles.
Some results have been hidden because they may be inaccessible to you