This book provides technical information on multimedia security and steganography as well as the fundamental theoretical framework for developing extensive advanced techniques. By understanding essential principles of multimedia security and steganographic systems, readers can develop novel ideas in implementing advanced algorithms. Topics include automatic detection and removal of visible image watermarks, digital watermarking based on chaotic map and reference register, digital steganographic schemes based on image vector quantization, image inpainting using an enhanced exemplar-based…mehr
This book provides technical information on multimedia security and steganography as well as the fundamental theoretical framework for developing extensive advanced techniques. By understanding essential principles of multimedia security and steganographic systems, readers can develop novel ideas in implementing advanced algorithms. Topics include automatic detection and removal of visible image watermarks, digital watermarking based on chaotic map and reference register, digital steganographic schemes based on image vector quantization, image inpainting using an enhanced exemplar-based algorithm, and behavior modeling of human objects in multimedia content.
Internationally renowned scholar Frank Y. Shih received his BS degree from the National Cheng Kung University, Taiwan, in 1980. He earned an MS degree from the State University of New York, Stony Brook, USA, in 1983, and a Ph.D from Purdue University, West Lafayette, Indiana, USA, in 1987. He is currently a professor at New Jersey Institute of Technology, Newark, jointly appointed in the departments of Computer Science, Electrical and Computer Engineering, and Biomedical Engineering. He is also director of the school's Computer Vision Laboratory.
Inhaltsangabe
Part I: Multimedia Mining and Classification Multimedia Duplicate Mining toward Knowledge Discovery. Discriminative Learning-Assisted Video Semantic Concept Classification. An Improved Feature Vocabulary-Based Method for Image Categorization. Part II: Watermarking Automatic Detection and Removal of Visible Image Watermarks. Digital Watermarking Based on Chaotic Map and Reference Register. A Pseudo-Random Pixel Rearrangement Algorithm Based on Gaussian Integers for Image Watermarking. Reversible Data-Hiding Techniques for Digital Images. Watermarking Based on Local Binary Pattern Operators. Authentication of JPEG Images Based on Genetic Algorithms. An Efficient Block-Based Fragile Watermarking System for Tamper Localization and Recovery. Part III: Steganography Survey of Image Steganography and Steganalysis. Digital Steganographic Schemes Based on Image Vector Quantization. A Differential Evolution-Based Algorithm for Breaking the Visual Steganalytic System. Genetic Algorithm-Based Methodology for Breaking the Steganalytic Systems. Part IV: Forensics Image Inpainting Using an Enhanced Exemplar-Based Algorithm. A Comparison Study on Copy-Cover Image Forgery Detection. A Chaos-Based Hash Function with Both Modification Detection and Localization Capabilities. Video Forensics. Using the Self-Synchronizing Method to Improve Security of the Multi-Chaotic Systems-Based Image Encryption. Behavior Modeling of Human Objects in Multimedia Content.
Part I: Multimedia Mining and Classification Multimedia Duplicate Mining toward Knowledge Discovery. Discriminative Learning-Assisted Video Semantic Concept Classification. An Improved Feature Vocabulary-Based Method for Image Categorization. Part II: Watermarking Automatic Detection and Removal of Visible Image Watermarks. Digital Watermarking Based on Chaotic Map and Reference Register. A Pseudo-Random Pixel Rearrangement Algorithm Based on Gaussian Integers for Image Watermarking. Reversible Data-Hiding Techniques for Digital Images. Watermarking Based on Local Binary Pattern Operators. Authentication of JPEG Images Based on Genetic Algorithms. An Efficient Block-Based Fragile Watermarking System for Tamper Localization and Recovery. Part III: Steganography Survey of Image Steganography and Steganalysis. Digital Steganographic Schemes Based on Image Vector Quantization. A Differential Evolution-Based Algorithm for Breaking the Visual Steganalytic System. Genetic Algorithm-Based Methodology for Breaking the Steganalytic Systems. Part IV: Forensics Image Inpainting Using an Enhanced Exemplar-Based Algorithm. A Comparison Study on Copy-Cover Image Forgery Detection. A Chaos-Based Hash Function with Both Modification Detection and Localization Capabilities. Video Forensics. Using the Self-Synchronizing Method to Improve Security of the Multi-Chaotic Systems-Based Image Encryption. Behavior Modeling of Human Objects in Multimedia Content.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309