Digital Watermarking and Steganography: Fundamentals and Techniques, Second Edition 2nd EditionКНИГИ » АППАРАТУРА
Название: Digital Watermarking and Steganography: Fundamentals and Techniques, Second Edition 2nd Edition Издательство: CRC Press Автор:Frank Y. Shih Год: 2017 Количество страниц:292 Язык: English Формат:pdf Размер:24 Mb
This book intends to provide a comprehensive overview on different aspects of mechanisms and techniques for information security. It is written for students, researchers, and professionals studying in the field of multimedia security and steganography. Multimedia security and steganography is especially relevant due to the global scale of digital multimedia and the rapid growth of the Internet. Digital watermarking technology can be used to guarantee authenticity and can be applied as proof that the content has not been altered since insertion. Updated techniques and advances in watermarking are explored in this new edition. The combinational spatial and frequency domains watermarking technique provides a new concept of enlarging the embedding capacity of watermarks. The genetic algorithm (GA) based watermarking technique solves the rounding error problem and provide an efficient embedding approach. Each chapter provides the reader with a fundamental, theoretical framework, while developing the extensive advanced techniques and considering the essential principles of the digital watermarking and steganographic systems. Several robust algorithms that are presented throughout illustrate the framework and provide assistance and tools in understanding and implementing the fundamental principles.
Table of Contents
Chapter One: Introduction
1.1 Digital Watermarking
1.2 Digital Steganography
1.3 Differences between Watermarking and Steganography
1.4 A Brief History
References
Appendix: Selected List of Books on Watermarking and Steganography
Chapter Two: Classification in Digital Watermarking
2.1 Classification based on Characteristics
2.2 Classification based on Applications
References
Chapter Three: Mathematical Preliminaries
3.1 Least Significant Bit (LSB) Substitution
3.2 Discrete Fourier Transform (DFT)
3.3 Discrete Cosine Transform (DCT)
3.4 Discrete Wavelet Transform (DWT)
3.5 Random Sequence Generation
3.6 Chaotic Map
3.7 Error Correction Code
3.8 Set Partitioning in Hierarchical Tree (SPIHT)
References
Chapter Four: Digital Watermarking Fundamentals
4.1 Spatial Domain Watermarking
4.2 Frequency Domain Watermarking
4.3 Fragile Watermark
4.4 Robust Watermark
References
Chapter Five: Watermarking Attacks and Tools
5.1 Image Processing Attacks
5.2 Geometric Attack
5.3 Cryptographic Attack
5.4 Protocol Attack
5.5 Watermarking Tools
5.6 An Efficient Block-based Fragile Watermarking System for Tamper Localization and Recovery
References
Chapter Six: Combinational Domain Digital Watermarking
6.1 Overview of Combinational Watermarking
6.2 Watermarking in the Spatial Domain
6.3 The Watermarking in the Frequency Domain
6.4 Experimental Results
6.5 Further Encryption of Combinational Watermarking
References
Chapter Seven: Watermarking Based on Genetic Algorithm
7.5 Authentication of JPEG Images based on Genetic Algorithms
References
Chapter Eight: Adjusted-Purpose Digital Watermarking
8.1 An Adjusted-Purpose Digital Watermarking Technique
8.2 An Adjusted-Purpose Watermarking Technique by Particle Swarm Optimization
References
Chapter Nine: High Capacity Watermarking
9.1 Robust High Capacity Digital Watermarking
9.2 High-Capacity Multiple Regions of Interest Watermarking for Medical Images
References
Chapter Ten: Reversible Watermarking
10.1 A Reversible Image Authentication Scheme based on Chaotic Fragile Watermark
10.2 Reversible Data Hiding Techniques Using Multiple Scanning Difference Value Histogram Modification
References
Chapter Eleven: Steganography and Steganalysis
11.1 Steganography
11.2 Steganalysis
References
Chapter Twelve: Steganography Based on Genetic Algorithm and Differential Evolution
12.1 Steganography Based on GA
12.2 Steganography Based on DE
References Share this Title AddThis Sharing Buttons Share to FacebookShare to TwitterShare to LinkedInShare to Google+Share to Pinterest Recommend to Librarian Related Titles
Steganography Techniques for Digital Images Название: Steganography Techniques for Digital Images Автор: Abid Yahya Издательство: Springer Год: 2018 Формат: PDF Размер: 5 Мб Язык: английский /...