Multimedia Security: Watermarking, Steganography, and Forensics
Editat de Frank Y. Shihen Limba Engleză Paperback – 29 mar 2017
Giving readers an in-depth overview of different aspects of information security mechanisms and methods, this resource also serves as an instructional tool on how to use the fundamental theoretical framework required for the development of extensive advanced techniques. The presentation of several robust algorithms illustrates this framework, helping readers to quickly master and apply fundamental principles.
Presented case studies cover:
- The execution (and feasibility) of techniques used to discover hidden knowledge by applying multimedia duplicate mining methods to large multimedia content
- Different types of image steganographic schemes based on vector quantization
- Techniques used to detect changes in human motion behavior and to classify different types of small-group motion behavior
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 611.52 lei 6-8 săpt. | |
CRC Press – 29 mar 2017 | 611.52 lei 6-8 săpt. | |
Hardback (1) | 1591.41 lei 6-8 săpt. | |
CRC Press – 25 aug 2012 | 1591.41 lei 6-8 săpt. |
Preț: 611.52 lei
Preț vechi: 764.40 lei
-20% Nou
Puncte Express: 917
Preț estimativ în valută:
117.03€ • 121.57$ • 97.21£
117.03€ • 121.57$ • 97.21£
Carte tipărită la comandă
Livrare economică 01-15 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781138072541
ISBN-10: 1138072540
Pagini: 424
Ilustrații: Approx. 360 equations; 48 Tables, black and white; 208 Illustrations, black and white
Dimensiuni: 156 x 234 x 22 mm
Greutate: 0.61 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
ISBN-10: 1138072540
Pagini: 424
Ilustrații: Approx. 360 equations; 48 Tables, black and white; 208 Illustrations, black and white
Dimensiuni: 156 x 234 x 22 mm
Greutate: 0.61 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
Cuprins
Part I: Multimedia Mining and Classification
Multimedia Duplicate Mining toward Knowledge Discovery. Discriminative Learning-Assisted Video Semantic Concept Classification. An Improved Feature Vocabulary-Based Method for Image Categorization.
Part II: Watermarking
Automatic Detection and Removal of Visible Image Watermarks. Digital Watermarking Based on Chaotic Map and Reference Register. A Pseudo-Random Pixel Rearrangement Algorithm Based on Gaussian Integers for Image Watermarking. Reversible Data-Hiding Techniques for Digital Images. Watermarking Based on Local Binary Pattern Operators. Authentication of JPEG Images Based on Genetic Algorithms. An Efficient Block-Based Fragile Watermarking System for Tamper Localization and Recovery.
Part III: Steganography
Survey of Image Steganography and Steganalysis. Digital Steganographic Schemes Based on Image Vector Quantization. A Differential Evolution-Based Algorithm for Breaking the Visual Steganalytic System. Genetic Algorithm-Based Methodology for Breaking the Steganalytic Systems.
Part IV: Forensics
Image Inpainting Using an Enhanced Exemplar-Based Algorithm. A Comparison Study on Copy-Cover Image Forgery Detection. A Chaos-Based Hash Function with Both Modification Detection and Localization Capabilities. Video Forensics. Using the Self-Synchronizing Method to Improve Security of the Multi-Chaotic Systems-Based Image Encryption. Behavior Modeling of Human Objects in Multimedia Content.
Multimedia Duplicate Mining toward Knowledge Discovery. Discriminative Learning-Assisted Video Semantic Concept Classification. An Improved Feature Vocabulary-Based Method for Image Categorization.
Part II: Watermarking
Automatic Detection and Removal of Visible Image Watermarks. Digital Watermarking Based on Chaotic Map and Reference Register. A Pseudo-Random Pixel Rearrangement Algorithm Based on Gaussian Integers for Image Watermarking. Reversible Data-Hiding Techniques for Digital Images. Watermarking Based on Local Binary Pattern Operators. Authentication of JPEG Images Based on Genetic Algorithms. An Efficient Block-Based Fragile Watermarking System for Tamper Localization and Recovery.
Part III: Steganography
Survey of Image Steganography and Steganalysis. Digital Steganographic Schemes Based on Image Vector Quantization. A Differential Evolution-Based Algorithm for Breaking the Visual Steganalytic System. Genetic Algorithm-Based Methodology for Breaking the Steganalytic Systems.
Part IV: Forensics
Image Inpainting Using an Enhanced Exemplar-Based Algorithm. A Comparison Study on Copy-Cover Image Forgery Detection. A Chaos-Based Hash Function with Both Modification Detection and Localization Capabilities. Video Forensics. Using the Self-Synchronizing Method to Improve Security of the Multi-Chaotic Systems-Based Image Encryption. Behavior Modeling of Human Objects in Multimedia Content.
Notă biografică
Internationally renowned scholar Frank Y. Shih received his BS degree from the National Cheng Kung University, Taiwan, in 1980. He earned an MS degree from the State University of New York, Stony Brook, USA, in 1983, and a Ph.D from Purdue University, West Lafayette, Indiana, USA, in 1987. He is currently a professor at New Jersey Institute of Technology, Newark, jointly appointed in the departments of Computer Science, Electrical and Computer Engineering, and Biomedical Engineering. He is also director of the school’s Computer Vision Laboratory.
Descriere
This book provides technical information on multimedia security and steganography as well as the fundamental theoretical framework for developing extensive advanced techniques. By understanding essential principles of multimedia security and steganographic systems, readers can develop novel ideas in implementing advanced algorithms. Topics include automatic detection and removal of visible image watermarks, digital watermarking based on chaotic map and reference register, digital steganographic schemes based on image vector quantization, image inpainting using an enhanced exemplar-based algorithm, and behavior modeling of human objects in multimedia content.