عرض عادي

Multimedia security : watermarking, steganography, and forensics / edited by Frank Y. Shih.

المساهم (المساهمين):نوع المادة : نصنصالناشر:Boca Raton, Fla. : CRC Press, [2013]تاريخ حقوق النشر: ©2013وصف:xxiii, 399 pages : illustrations ; 25 cmنوع المحتوى:
  • text
نوع الوسائط:
  • unmediated
نوع الناقل:
  • volume
تدمك:
  • 9781439873311
  • 1439873313
الموضوع:تصنيف مكتبة الكونجرس:
  • TK5105.15 .M84 2013
موارد على الانترنت:
المحتويات:
Multimedia duplicate mining toward knowledge discovery / Xiaomeng Wu, Sebatien Poullot, and Shin'ichi Satoh -- Discriminative learning-assisted video semantic concept classification / Qiusha Zhu, Mei-Ling Shyu, and Shu-Ching Chen -- Improved feature vocabulary-based method for image categorization / Frank Y. Shih and Alexander Sheppard -- Automatic detection and removal of visible image watermarks / Hong-Ren Su, Ya-Yun Cheng, and Shang-Hong Lai -- Digital watermarking based on chaotic map and reference register / Yi-Ta Wu and Frank Y. Shih -- Pseudo-random pixel rearrangement algorithm based on Gaussian integers for image watermarking / Aleksey Koval, Frank Y. Shih, and Boris S. Verkhovsky -- Reversible data-hiding techniques for digital images / Zhi-Hui Wang, Ming-Ting Sun, and Chin-Chen Chang -- Watermarking based on local binary pattern operators / Wenyin Zhang and Frank Y. Shih -- Authentication of JPEG images based on genetic algorithms / Venkata Gopal Edupuganti and Frank Y. Shih -- An efficient block-based fragile watermarking system for tamper localization and recovery / Vankata Gopal Edupuganti, Frank Y. Shih, and I-Cheng Chang -- Survey of image steganography and steganalysis / Mayra Bachrach and Frank Y. Shih -- Digital steganographic schemes based on image vector quantization / Shinfeng D. Lin and Shih-Chieh Shie -- Differential evolution-based algorithm for breaking the visual steganalytic system / Frank Y. Shih and Venkata Gopal Edupuganti -- Genetic algorithm-based methodology for breaking the steganalytic systems / Yi-Ta Wu and Frank Y. Shih -- Image inpainting using an enhanced exemplar-based algorithm / I-Cheng Chang and Chia-We Hsu -- A comparison study on copy-cover image forgery detection / Frank Y. Shih and Yuan Yuan -- Chaos-based hash function with both modification detection and localization capabilities / Di Xiao, Frank Y. Shih, and Xiaofeng Liao -- Video forensics / Hsiao-Rong Tyan and Hong-Yuan Mark Liao -- Using the self-synchronizing method to improve security of the multi-chaotic systems-based image encryption / Di Ziao and Frank Y. Shih -- Behavior modeleing of human objects in multimedia content / Yafeng Yin and Hong Man.
ملخص:"This book provides technical information on multimedia security and steganography as well as the fundamental theoretical framework for developing the extensive advanced techniques. By comprehensively considering the essential principles of the multimedia security and steganographic systems, readers can not only obtain the novel ideas in implementing the advanced algorithms, but also discover the new problems. The book consists of many technical tutorials from various professionals. The text is illustrated with plentiful graphs and examples in order to simplify the problems, so readers can easily understand even complicated theories"-- Provided by publisher.
المقتنيات
نوع المادة المكتبة الحالية رقم الطلب رقم النسخة حالة تاريخ الإستحقاق الباركود
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة TK5105.15 .M84 2013 (إستعراض الرف(يفتح أدناه)) C.1 Library Use Only | داخل المكتبة فقط 30010011299681
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة TK5105.15 .M84 2013 (إستعراض الرف(يفتح أدناه)) C.2 المتاح 300100316598

"This book provides technical information on multimedia security and steganography as well as the fundamental theoretical framework for developing the extensive advanced techniques. By comprehensively considering the essential principles of the multimedia security and steganographic systems, readers can not only obtain the novel ideas in implementing the advanced algorithms, but also discover the new problems. The book consists of many technical tutorials from various professionals. The text is illustrated with plentiful graphs and examples in order to simplify the problems, so readers can easily understand even complicated theories"-- Provided by publisher.

Includes bibliographical references and index.

Multimedia duplicate mining toward knowledge discovery / Xiaomeng Wu, Sebatien Poullot, and Shin'ichi Satoh -- Discriminative learning-assisted video semantic concept classification / Qiusha Zhu, Mei-Ling Shyu, and Shu-Ching Chen -- Improved feature vocabulary-based method for image categorization / Frank Y. Shih and Alexander Sheppard -- Automatic detection and removal of visible image watermarks / Hong-Ren Su, Ya-Yun Cheng, and Shang-Hong Lai -- Digital watermarking based on chaotic map and reference register / Yi-Ta Wu and Frank Y. Shih -- Pseudo-random pixel rearrangement algorithm based on Gaussian integers for image watermarking / Aleksey Koval, Frank Y. Shih, and Boris S. Verkhovsky -- Reversible data-hiding techniques for digital images / Zhi-Hui Wang, Ming-Ting Sun, and Chin-Chen Chang -- Watermarking based on local binary pattern operators / Wenyin Zhang and Frank Y. Shih -- Authentication of JPEG images based on genetic algorithms / Venkata Gopal Edupuganti and Frank Y. Shih -- An efficient block-based fragile watermarking system for tamper localization and recovery / Vankata Gopal Edupuganti, Frank Y. Shih, and I-Cheng Chang -- Survey of image steganography and steganalysis / Mayra Bachrach and Frank Y. Shih -- Digital steganographic schemes based on image vector quantization / Shinfeng D. Lin and Shih-Chieh Shie -- Differential evolution-based algorithm for breaking the visual steganalytic system / Frank Y. Shih and Venkata Gopal Edupuganti -- Genetic algorithm-based methodology for breaking the steganalytic systems / Yi-Ta Wu and Frank Y. Shih -- Image inpainting using an enhanced exemplar-based algorithm / I-Cheng Chang and Chia-We Hsu -- A comparison study on copy-cover image forgery detection / Frank Y. Shih and Yuan Yuan -- Chaos-based hash function with both modification detection and localization capabilities / Di Xiao, Frank Y. Shih, and Xiaofeng Liao -- Video forensics / Hsiao-Rong Tyan and Hong-Yuan Mark Liao -- Using the self-synchronizing method to improve security of the multi-chaotic systems-based image encryption / Di Ziao and Frank Y. Shih -- Behavior modeleing of human objects in multimedia content / Yafeng Yin and Hong Man.

شارك

أبوظبي، الإمارات العربية المتحدة

reference@ecssr.ae

97124044780 +

حقوق النشر © 2024 مركز الإمارات للدراسات والبحوث الاستراتيجية جميع الحقوق محفوظة