Muutke küpsiste eelistusi

E-raamat: Multimedia Security: Watermarking, Steganography, and Forensics

Edited by (New Jersey Institute of Technology, Newark, NJ, USA)
  • Formaat: 424 pages
  • Ilmumisaeg: 19-Dec-2017
  • Kirjastus: CRC Press Inc
  • Keel: eng
  • ISBN-13: 9781351832816
Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 103,99 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 424 pages
  • Ilmumisaeg: 19-Dec-2017
  • Kirjastus: CRC Press Inc
  • Keel: eng
  • ISBN-13: 9781351832816
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

"This book provides technical information on multimedia security and steganography as well as the fundamental theoretical framework for developing the extensive advanced techniques. By comprehensively considering the essential principles of the multimedia security and steganographic systems, readers can not only obtain the novel ideas in implementing the advanced algorithms, but also discover the new problems. The book consists of many technical tutorials from various professionals. The text is illustrated with plentiful graphs and examples in order to simplify the problems, so readers can easily understand even complicated theories"--



Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, this book presents a wealth of everyday protection application examples in fields including multimedia mining and classification, digital watermarking, steganography, and digital forensics.

Giving readers an in-depth overview of different aspects of information security mechanisms and methods, this resource also serves as an instructional tool on how to use the fundamental theoretical framework required for the development of extensive advanced techniques. The presentation of several robust algorithms illustrates this framework, helping readers to quickly master and apply fundamental principles.

Presented case studies cover:

  • The execution (and feasibility) of techniques used to discover hidden knowledge by applying multimedia duplicate mining methods to large multimedia content
  • Different types of image steganographic schemes based on vector quantization
  • Techniques used to detect changes in human motion behavior and to classify different types of small-group motion behavior

Useful for students, researchers, and professionals, this book consists of a variety of technical tutorials that offer an abundance of graphs and examples to powerfully convey the principles of multimedia security and steganography. Imparting the extensive experience of the contributors, this approach simplifies problems, helping readers more easily understand even the most complicated theories. It also enables them to uncover novel concepts involved in the implementation of algorithms, which can lead to the discovery of new problems and new means of solving them.

Preface ix
Acknowledgments xiii
Editor xv
Contributors xvii
PART I Multimedia Mining and Classification
Chapter 1 Multimedia Duplicate Mining toward Knowledge Discovery
3(28)
Xiaomeng Wu
Sebastian Poullot
Shin'ichi Satoh
Chapter 2 Discriminative Learning-Assisted Video Semantic Concept Classification
31(20)
Qiusha Zhu
Mei-Ling Shyu
Shu-Ching Chen
Chapter 3 Improved Feature Vocabulary-Based Method for Image Categorization
51(16)
Frank Y. Shih
Alexander Sheppard
PART II Watermarking
Chapter 4 Automatic Detection and Removal of Visible Image Watermarks
67(18)
Hong-Ren Su
Ya-Yun Cheng
Shang-Hong Lai
Chapter 5 Digital Watermarking Based on Chaotic Map and Reference Register
85(14)
Yi-Ta Wu
Frank Y. Shih
Chapter 6 Pseudo-Random Pixel Rearrangement Algorithm Based on Gaussian Integers for Image Watermarking
99(16)
Aleksey Koval
Frank Y. Shih
Boris S. Verkhovsky
Chapter 7 Reversible Data-Hiding Techniques for Digital Images
115(26)
Zhi-Hui Wang
Ming-Ting Sun
Chin-Chen Chang
Chapter 8 Watermarking Based on Local Binary Pattern Operators
141(24)
Wenyin Zhang
Frank Y. Shih
Chapter 9 Authentication of JPEG Images Based on Genetic Algorithms
165(16)
Venkata Gopal Edupuganti
Frank Y. Shih
Chapter 10 An Efficient Block-Based Fragile Watermarking System for Tamper Localization and Recovery
181(20)
Venkata Gopal Edupuganti
Frank Y. Shih
I-Cheng Chang
PART III Steganography
Chapter 11 Survey of Image Steganography and Steganalysis
201(14)
Mayra Bachrach
Frank Y. Shih
Chapter 12 Digital Steganographic Schemes Based on Image Vector Quantization
215(30)
Shinfeng D. Lin
Shih-Chieh Shie
Chapter 13 Differential Evolution-Based Algorithm for Breaking the Visual Steganalytic System
245(12)
Frank Y. Shih
Venkata Gopal Edupuganti
Chapter 14 Genetic Algorithm-Based Methodology for Breaking the Steganalytic Systems
257(18)
Yi-Ta Wu
Frank Y. Shih
PART IV Forensics
Chapter 15 Image Inpainting Using an Enhanced Exemplar-Based Algorithm
275(22)
I-Cheng Chang
Chia-We Hsu
Chapter 16 A Comparison Study on Copy-Cover Image Forgery Detection
297(16)
Frank Y. Shih
Yuan Yuan
Chapter 17 Chaos-Based Hash Function with Both Modification Detection and Localization Capabilities
313(14)
Di Xiao
Frank Y. Shih
Xiaofeng Liao
Chapter 18 Video Forensics
327(16)
Hsiao-Rong Tyan
Hong-Yuan Mark Liao
Chapter 19 Using the Self-Synchronizing Method to Improve Security of the Multi-Chaotic Systems-Based Image Encryption
343(14)
Di Xiao
Frank Y. Shih
Chapter 20 Behavior Modeling of Human Objects in Multimedia Content
357(28)
Yafeng Yin
Hong Man
Index 385
Internationally renowned scholar Frank Y. Shih received his BS degree from the National Cheng Kung University, Taiwan, in 1980. He earned an MS degree from the State University of New York, Stony Brook, USA, in 1983, and a Ph.D from Purdue University, West Lafayette, Indiana, USA, in 1987. He is currently a professor at New Jersey Institute of Technology, Newark, jointly appointed in the departments of Computer Science, Electrical and Computer Engineering, and Biomedical Engineering. He is also director of the schools Computer Vision Laboratory.