Digital watermarking and steganography : fundamentals and techniques /: fundamentals and techniques. (2007)
- Record Type:
- Book
- Title:
- Digital watermarking and steganography : fundamentals and techniques /: fundamentals and techniques. (2007)
- Main Title:
- Digital watermarking and steganography : fundamentals and techniques
- Further Information:
- Note: Frank Y. Shih.
- Other Names:
- Shih, Frank Y
- Contents:
- Introduction ; Digital Watermarking; Digital Steganography; Differences between Watermarking and Steganography; A Brief History; Appendix: Selected List of Books on Watermarking and Steganography; Classification in Digital Watermarking ; Classification Based on Characteristics; Classification Based on Applications; Mathematical Preliminaries ; Least-Significant-Bit Substitution; Discrete Fourier Transform (DFT); Discrete Cosine Transform; Discrete Wavelet Transform; Random Sequence Generation ; The Chaotic Map; Error Correction Code; Set Partitioning in Hierarchical Tree; Digital Watermarking Fundamentals ; Spatial-Domain Watermarking; Frequency-Domain Watermarking; The Fragile Watermark; The Robust Watermark; Watermarking Attacks and Tools ; Image Processing Attacks; Geometric Transformation ; Cryptographic Attack; Protocol Attacks; Watermarking Tools; Combinational Digital Watermarking in the Spatial ; and Frequency Domains ; An Overview of Combinational Watermarking; Watermarking in the Spatial Domain; Watermarking in the Frequency Domain; Experimental Results; Further Encryption of Combinational Watermarking; Genetic Algorithm-Based Digital Watermarking ; Introduction to the Genetic Algorithm; The Concept of Genetic Algorithm-Based Watermarking; Genetic Algorithm-Based Rounding-Error Correction Watermarking; An Application for Medical Image Watermarking; Adjusted-Purpose Digital Watermarking ; An Overview of Adjusted-Purpose Digital Watermarking; The MorphologicalIntroduction ; Digital Watermarking; Digital Steganography; Differences between Watermarking and Steganography; A Brief History; Appendix: Selected List of Books on Watermarking and Steganography; Classification in Digital Watermarking ; Classification Based on Characteristics; Classification Based on Applications; Mathematical Preliminaries ; Least-Significant-Bit Substitution; Discrete Fourier Transform (DFT); Discrete Cosine Transform; Discrete Wavelet Transform; Random Sequence Generation ; The Chaotic Map; Error Correction Code; Set Partitioning in Hierarchical Tree; Digital Watermarking Fundamentals ; Spatial-Domain Watermarking; Frequency-Domain Watermarking; The Fragile Watermark; The Robust Watermark; Watermarking Attacks and Tools ; Image Processing Attacks; Geometric Transformation ; Cryptographic Attack; Protocol Attacks; Watermarking Tools; Combinational Digital Watermarking in the Spatial ; and Frequency Domains ; An Overview of Combinational Watermarking; Watermarking in the Spatial Domain; Watermarking in the Frequency Domain; Experimental Results; Further Encryption of Combinational Watermarking; Genetic Algorithm-Based Digital Watermarking ; Introduction to the Genetic Algorithm; The Concept of Genetic Algorithm-Based Watermarking; Genetic Algorithm-Based Rounding-Error Correction Watermarking; An Application for Medical Image Watermarking; Adjusted-Purpose Digital Watermarking ; An Overview of Adjusted-Purpose Digital Watermarking; The Morphological Approach for Extracting Pixel-Based Features ; The Strategies for Adjusting the Varying-Sized Transform; Window and Quality Factor; Experimental Results ; The Collecting Approach for Generating the VSTW; Robust High-Capacity Digital Watermarking ; The Weakness of Current Robust Watermarking; The Concept of Robust Watermarking ; Enlargement of Significant Coefficients; The Determination of Embedding Locations; The RHC Watermarking Algorithm; Experimental Results ; Introduction to Digital Steganography ; Types of Steganography; Applications of Steganography ; Embedding Security and Imperceptibility; Examples of Steganographic Software ; Steganalysis ; An Overview; The Statistical Properties of Images; The Visual Steganalytic System; IQM-Based Steganalytic System; Learning Strategies ; The Frequency-Domain Steganalytic System; Genetic Algorithm-Based Steganography ; An Overview of the GA-Based Breaking Methodology; The GA-Based Breaking Algorithm on the FDSS ; Experimental Results ; Complexity Analysis; Index … (more)
- Publisher Details:
- Place of publication not identified : CRC Press
- Publication Date:
- 2007
- Extent:
- 1 online resource, illustrations
- Subjects:
- 005.8
Computer security
Intellectual property
Multimedia systems -- Security measures - Languages:
- English
- ISBNs:
- 9781420047585
1420047582 - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.160708
- Ingest File:
- 02_086.xml