Contents: Chapter One: Introduction Chapter Two: Applications and Properties Chapter Three: Models of Watermarking Chapter Four: Message Coding Chapter Five: Watermarking with Side Information Chapter Six: Structured Dirty-Paper Codes Chapter Seven: Analyzing Errors Chapter Eight: Using Perceptual Models Chapter Nine: Robust Watermarking Chapter Ten: Watermark Security Chapter Eleven: Content A…
Table of Contents
Introduction to Cryptocomplexity.
Foundations of Computer Science and Mathematics.
Foundations of Complexity Theory.
Foundations of Cryptology.
Hierarchies Based on NP.
Randomized Algorithms and Complexity Classes.
RSA Cryptosystem, Primality, and Factoring.
Other Public-Key Cryptosystems and Protocols.