Digital Watermarking and Steganography: Fundamentals and Techniques, Second Edition 2nd Edition
- Добавил: decomeron
- Дата: 12-04-2017, 09:08
- Комментариев: 2
Название: Digital Watermarking and Steganography: Fundamentals and Techniques, Second Edition 2nd Edition
Издательство: CRC Press
Автор:Frank Y. Shih
Год: 2017
Количество страниц:292
Язык: English
Формат:pdf
Размер:24 Mb
This book intends to provide a comprehensive overview on different aspects of mechanisms and techniques for information security. It is written for students, researchers, and professionals studying in the field of multimedia security and steganography. Multimedia security and steganography is especially relevant due to the global scale of digital multimedia and the rapid growth of the Internet. Digital watermarking technology can be used to guarantee authenticity and can be applied as proof that the content has not been altered since insertion. Updated techniques and advances in watermarking are explored in this new edition. The combinational spatial and frequency domains watermarking technique provides a new concept of enlarging the embedding capacity of watermarks. The genetic algorithm (GA) based watermarking technique solves the rounding error problem and provide an efficient embedding approach. Each chapter provides the reader with a fundamental, theoretical framework, while developing the extensive advanced techniques and considering the essential principles of the digital watermarking and steganographic systems. Several robust algorithms that are presented throughout illustrate the framework and provide assistance and tools in understanding and implementing the fundamental principles.
Table of Contents
Chapter One: Introduction
1.1 Digital Watermarking
1.2 Digital Steganography
1.3 Differences between Watermarking and Steganography
1.4 A Brief History
References
Appendix: Selected List of Books on Watermarking and Steganography
Chapter Two: Classification in Digital Watermarking
2.1 Classification based on Characteristics
2.2 Classification based on Applications
References
Chapter Three: Mathematical Preliminaries
3.1 Least Significant Bit (LSB) Substitution
3.2 Discrete Fourier Transform (DFT)
3.3 Discrete Cosine Transform (DCT)
3.4 Discrete Wavelet Transform (DWT)
3.5 Random Sequence Generation
3.6 Chaotic Map
3.7 Error Correction Code
3.8 Set Partitioning in Hierarchical Tree (SPIHT)
References
Chapter Four: Digital Watermarking Fundamentals
4.1 Spatial Domain Watermarking
4.2 Frequency Domain Watermarking
4.3 Fragile Watermark
4.4 Robust Watermark
References
Chapter Five: Watermarking Attacks and Tools
5.1 Image Processing Attacks
5.2 Geometric Attack
5.3 Cryptographic Attack
5.4 Protocol Attack
5.5 Watermarking Tools
5.6 An Efficient Block-based Fragile Watermarking System for Tamper Localization and Recovery
References
Chapter Six: Combinational Domain Digital Watermarking
6.1 Overview of Combinational Watermarking
6.2 Watermarking in the Spatial Domain
6.3 The Watermarking in the Frequency Domain
6.4 Experimental Results
6.5 Further Encryption of Combinational Watermarking
References
Chapter Seven: Watermarking Based on Genetic Algorithm
7.1 Introduction to the Genetic Algorithm
7.2 Concept of GA-Based Watermarking
7.3 GA-based Rounding Error Correction Watermarking
7.4 An Application to Medical Image Watermarking
7.5 Authentication of JPEG Images based on Genetic Algorithms
References
Chapter Eight: Adjusted-Purpose Digital Watermarking
8.1 An Adjusted-Purpose Digital Watermarking Technique
8.2 An Adjusted-Purpose Watermarking Technique by Particle Swarm Optimization
References
Chapter Nine: High Capacity Watermarking
9.1 Robust High Capacity Digital Watermarking
9.2 High-Capacity Multiple Regions of Interest Watermarking for Medical Images
References
Chapter Ten: Reversible Watermarking
10.1 A Reversible Image Authentication Scheme based on Chaotic Fragile Watermark
10.2 Reversible Data Hiding Techniques Using Multiple Scanning Difference Value Histogram Modification
References
Chapter Eleven: Steganography and Steganalysis
11.1 Steganography
11.2 Steganalysis
References
Chapter Twelve: Steganography Based on Genetic Algorithm and Differential Evolution
12.1 Steganography Based on GA
12.2 Steganography Based on DE
References
Share this Title
AddThis Sharing Buttons
Share to FacebookShare to TwitterShare to LinkedInShare to Google+Share to Pinterest
Recommend to
Librarian
Related Titles
depositfiles.com
turbobit.net
Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.
Комментарии пользователей