Multimedia security : watermarking, steganography, and forensics / edited by Frank Y. Shih.
نوع المادة :![نص](/opac-tmpl/lib/famfamfam/BK.png)
- text
- unmediated
- volume
- 9781439873311
- 1439873313
- TK5105.15 .M84 2013
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | TK5105.15 .M84 2013 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30010011299681 | ||
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | TK5105.15 .M84 2013 (إستعراض الرف(يفتح أدناه)) | C.2 | المتاح | 300100316598 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
TK5105.15 .M825 2013 Multimedia networking and coding / | TK5105.15 .M825 2013 Multimedia networking and coding / | TK5105.15 .M84 2013 Multimedia security : watermarking, steganography, and forensics / | TK5105.15 .M84 2013 Multimedia security : watermarking, steganography, and forensics / | TK5105.15 .P65 2009 The IMS : IP multimedia concepts and services / | TK5105.3 .H54 2007 High-performance packet switching architectures / | TK5105.386 .R33 2016 Streaming and digital media : understanding the business and technology / |
"This book provides technical information on multimedia security and steganography as well as the fundamental theoretical framework for developing the extensive advanced techniques. By comprehensively considering the essential principles of the multimedia security and steganographic systems, readers can not only obtain the novel ideas in implementing the advanced algorithms, but also discover the new problems. The book consists of many technical tutorials from various professionals. The text is illustrated with plentiful graphs and examples in order to simplify the problems, so readers can easily understand even complicated theories"-- Provided by publisher.
Includes bibliographical references and index.
Multimedia duplicate mining toward knowledge discovery / Xiaomeng Wu, Sebatien Poullot, and Shin'ichi Satoh -- Discriminative learning-assisted video semantic concept classification / Qiusha Zhu, Mei-Ling Shyu, and Shu-Ching Chen -- Improved feature vocabulary-based method for image categorization / Frank Y. Shih and Alexander Sheppard -- Automatic detection and removal of visible image watermarks / Hong-Ren Su, Ya-Yun Cheng, and Shang-Hong Lai -- Digital watermarking based on chaotic map and reference register / Yi-Ta Wu and Frank Y. Shih -- Pseudo-random pixel rearrangement algorithm based on Gaussian integers for image watermarking / Aleksey Koval, Frank Y. Shih, and Boris S. Verkhovsky -- Reversible data-hiding techniques for digital images / Zhi-Hui Wang, Ming-Ting Sun, and Chin-Chen Chang -- Watermarking based on local binary pattern operators / Wenyin Zhang and Frank Y. Shih -- Authentication of JPEG images based on genetic algorithms / Venkata Gopal Edupuganti and Frank Y. Shih -- An efficient block-based fragile watermarking system for tamper localization and recovery / Vankata Gopal Edupuganti, Frank Y. Shih, and I-Cheng Chang -- Survey of image steganography and steganalysis / Mayra Bachrach and Frank Y. Shih -- Digital steganographic schemes based on image vector quantization / Shinfeng D. Lin and Shih-Chieh Shie -- Differential evolution-based algorithm for breaking the visual steganalytic system / Frank Y. Shih and Venkata Gopal Edupuganti -- Genetic algorithm-based methodology for breaking the steganalytic systems / Yi-Ta Wu and Frank Y. Shih -- Image inpainting using an enhanced exemplar-based algorithm / I-Cheng Chang and Chia-We Hsu -- A comparison study on copy-cover image forgery detection / Frank Y. Shih and Yuan Yuan -- Chaos-based hash function with both modification detection and localization capabilities / Di Xiao, Frank Y. Shih, and Xiaofeng Liao -- Video forensics / Hsiao-Rong Tyan and Hong-Yuan Mark Liao -- Using the self-synchronizing method to improve security of the multi-chaotic systems-based image encryption / Di Ziao and Frank Y. Shih -- Behavior modeleing of human objects in multimedia content / Yafeng Yin and Hong Man.