Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Популярные книги



Название: Digital Watermarking and Steganography: Fundamentals and Techniques, Second Edition 2nd Edition
Издательство: CRC Press
Автор:Frank Y. Shih
Год: 2017
Количество страниц:292
Язык: English
Формат:pdf
Размер:24 Mb

This book intends to provide a comprehensive overview on different aspects of mechanisms and techniques for information security. It is written for students, researchers, and professionals studying in the field of multimedia security and steganography. Multimedia security and steganography is especially relevant due to the global scale of digital multimedia and the rapid growth of the Internet. Digital watermarking technology can be used to guarantee authenticity and can be applied as proof that the content has not been altered since insertion. Updated techniques and advances in watermarking are explored in this new edition. The combinational spatial and frequency domains watermarking technique provides a new concept of enlarging the embedding capacity of watermarks. The genetic algorithm (GA) based watermarking technique solves the rounding error problem and provide an efficient embedding approach. Each chapter provides the reader with a fundamental, theoretical framework, while developing the extensive advanced techniques and considering the essential principles of the digital watermarking and steganographic systems. Several robust algorithms that are presented throughout illustrate the framework and provide assistance and tools in understanding and implementing the fundamental principles.


Table of Contents

Chapter One: Introduction

1.1 Digital Watermarking

1.2 Digital Steganography

1.3 Differences between Watermarking and Steganography

1.4 A Brief History

References

Appendix: Selected List of Books on Watermarking and Steganography

Chapter Two: Classification in Digital Watermarking

2.1 Classification based on Characteristics

2.2 Classification based on Applications

References

Chapter Three: Mathematical Preliminaries

3.1 Least Significant Bit (LSB) Substitution

3.2 Discrete Fourier Transform (DFT)

3.3 Discrete Cosine Transform (DCT)

3.4 Discrete Wavelet Transform (DWT)

3.5 Random Sequence Generation

3.6 Chaotic Map

3.7 Error Correction Code

3.8 Set Partitioning in Hierarchical Tree (SPIHT)

References

Chapter Four: Digital Watermarking Fundamentals

4.1 Spatial Domain Watermarking

4.2 Frequency Domain Watermarking

4.3 Fragile Watermark

4.4 Robust Watermark

References

Chapter Five: Watermarking Attacks and Tools

5.1 Image Processing Attacks

5.2 Geometric Attack

5.3 Cryptographic Attack

5.4 Protocol Attack

5.5 Watermarking Tools

5.6 An Efficient Block-based Fragile Watermarking System for Tamper Localization and Recovery

References

Chapter Six: Combinational Domain Digital Watermarking

6.1 Overview of Combinational Watermarking

6.2 Watermarking in the Spatial Domain

6.3 The Watermarking in the Frequency Domain

6.4 Experimental Results

6.5 Further Encryption of Combinational Watermarking

References

Chapter Seven: Watermarking Based on Genetic Algorithm

7.1 Introduction to the Genetic Algorithm

7.2 Concept of GA-Based Watermarking

7.3 GA-based Rounding Error Correction Watermarking

7.4 An Application to Medical Image Watermarking

7.5 Authentication of JPEG Images based on Genetic Algorithms

References

Chapter Eight: Adjusted-Purpose Digital Watermarking

8.1 An Adjusted-Purpose Digital Watermarking Technique

8.2 An Adjusted-Purpose Watermarking Technique by Particle Swarm Optimization

References

Chapter Nine: High Capacity Watermarking

9.1 Robust High Capacity Digital Watermarking

9.2 High-Capacity Multiple Regions of Interest Watermarking for Medical Images

References

Chapter Ten: Reversible Watermarking

10.1 A Reversible Image Authentication Scheme based on Chaotic Fragile Watermark

10.2 Reversible Data Hiding Techniques Using Multiple Scanning Difference Value Histogram Modification

References

Chapter Eleven: Steganography and Steganalysis

11.1 Steganography

11.2 Steganalysis

References

Chapter Twelve: Steganography Based on Genetic Algorithm and Differential Evolution

12.1 Steganography Based on GA

12.2 Steganography Based on DE

References
Share this Title
AddThis Sharing Buttons
Share to FacebookShare to TwitterShare to LinkedInShare to Google+Share to Pinterest
Recommend to
Librarian
Related Titles


depositfiles.com
turbobit.net







Нерабочая ссылка? Вам СЮДА


Успейте скачать!!!
Ссылки на скачивание книг ЗАПРЕЩЕННЫХ ИЗДАТЕЛЬСТВ удаляются через 3 дня с момента публикации и заменяются (по договору с АЗАПИ) партнерскими ссылками магазина LITRES!



Автор: decomeron 12-04-2017, 09:08 | Напечатать |
 
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.




С этой публикацией часто скачивают:

Большое Спасибо!

blush

  написал: NIKOOD (12 апреля 2017 10:57) [цитировать]

Цитата: NIKOOD
Большое Спасибо!

blush

smile

  написал: decomeron (12 апреля 2017 10:59) [цитировать]

  • bowtiesmilelaughingblushsmileyrelaxedsmirk
    heart_eyeskissing_heartkissing_closed_eyesflushedrelievedsatisfiedgrin
    winkstuck_out_tongue_winking_eyestuck_out_tongue_closed_eyesgrinningkissingstuck_out_tonguesleeping
    worriedfrowninganguishedopen_mouthgrimacingconfusedhushed
    expressionlessunamusedsweat_smilesweatdisappointed_relievedwearypensive
    disappointedconfoundedfearfulcold_sweatperseverecrysob
    joyastonishedscreamtired_faceangryragetriumph
    sleepyyummasksunglassesdizzy_faceimpsmiling_imp
    neutral_faceno_mouthinnocent





Нажимая на кнопку "Отправить", Вы даете согласие на обработку персональных данных, а также подтверждаете условия "Политики конфиденциальности" настоящего сайта.


 MirKnig.Su  ©2017     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности