- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This new edition aims to provide students, researchers, and professionals with technical information regarding digital watermarking and steganography. Steganographic messages are often first encrypted by traditional means, and then a covert text is modified to contain the encrypted message. Multimedia security technology can be used to guarantee
Andere Kunden interessierten sich auch für
- Artyom M GrigoryanImage Processing93,99 €
- Perceptual Digital Imaging102,99 €
- Image Restoration126,99 €
- Michael O'ByrneImage-Based Damage Assessment for Underwater Inspections60,99 €
- Handbook of Robust Low-Rank and Sparse Matrix Decomposition56,99 €
- Le Nguyen BinhNoises in Optical Communications and Photonic Systems96,99 €
- Sustainable Digital Technologies for Smart Cities59,99 €
-
-
-
This new edition aims to provide students, researchers, and professionals with technical information regarding digital watermarking and steganography. Steganographic messages are often first encrypted by traditional means, and then a covert text is modified to contain the encrypted message. Multimedia security technology can be used to guarantee
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd (Sales)
- 2nd edition
- Seitenzahl: 270
- Erscheinungstermin: 30. September 2020
- Englisch
- Abmessung: 234mm x 156mm x 16mm
- Gewicht: 413g
- ISBN-13: 9780367656430
- ISBN-10: 0367656434
- Artikelnr.: 59992715
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Taylor & Francis Ltd (Sales)
- 2nd edition
- Seitenzahl: 270
- Erscheinungstermin: 30. September 2020
- Englisch
- Abmessung: 234mm x 156mm x 16mm
- Gewicht: 413g
- ISBN-13: 9780367656430
- ISBN-10: 0367656434
- Artikelnr.: 59992715
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Frank Y. Shih received the B.S. degree from National Cheng-Kung University, Taiwan, in 1980, the M.S. degree from the State University of New York at Stony Brook, in 1984, and the Ph.D. degree from Purdue University, West Lafayette, Indiana, in 1987, all in Electrical and Computer Engineering. He served as departmental acting chair, associate chair, director, principal investigator, journal editor, and conference chair. Currently, he is a professor jointly appointed in the Department of Computer Science, the Department of Electrical and Computer Engineering, and the Department of Biomedical Engineering at New Jersey Institute of Technology, Newark, NJ. Dr. Shih also serves as the Director of Computer Vision Laboratory. He held a visiting professor position at Princeton University, Columbia University, National Taiwan University, National Institute of Informatics, Tokyo, and Conservatoire National Des Arts Et Metiers, Paris. Dr. Shih is a well-known scholar internationally, and he serves as the Editor-in-Chief for the Inter. Journal of Multimedia Intelligence and Security. In addition, he is on the Editorial Board of the International Journal of Pattern Recognition, the International Journal of Pattern Recognition Letters, the International Journal of Pattern Recognition and Artificial Intelligence, the International Journal of Recent Patents on Engineering, the International Journal of Recent Patents on Computer Science, the International Journal of Internet Protocol Technology, and the Journal of Internet Technology. He served as a steering member, committee member, and session chair for numerous professional conferences and workshops. Dr. Shih has received numerous grants from the National Science Foundation, Navy and Air Force, and Industry. He was the recipient of Research Initiation Award of NSF and Board of Overseers Excellence in Research Award of NJIT. Furthermore, Dr. Shih has authored three books: "Digital Watermarking and Steganography", "Image Processing and Mathematical Morphology", and "Image Processing and Pattern Recognition." He also edited one book: "Multimedia Security: Watermarking, Steganography, and Forensics." He has published 122 journal papers, 96 conference papers, and 22 book chapters. His current research interests include image processing, computer vision, watermarking and steganography, digital forensics, sensor networks, pattern recognition, bioinformatics, information security, robotics, fuzzy logic, and neural networks.
Preface
Acknowledgments
Author
Chapter 1 Introduction
Chapter 2 Classification in Digital Watermarking
Chapter 3 Mathematical Preliminaries
Chapter 4 Digital Watermarking Fundamentals
Chapter 5 Watermarking Attacks and Tools
Chapter 6 Combinational Domain Digital Watermarking
Chapter 7 Watermarking Based on Genetic Algorithms
Chapter 8 Adjusted-Purpose Watermarking
Chapter 9 High-Capacity Watermarking
Chapter 10 Reversible Watermarking
Chapter 11 Steganography and Steganalysis
Chapter 12 Steganography Based on Genetic Algorithms and Differential
Evolution
Index
Acknowledgments
Author
Chapter 1 Introduction
Chapter 2 Classification in Digital Watermarking
Chapter 3 Mathematical Preliminaries
Chapter 4 Digital Watermarking Fundamentals
Chapter 5 Watermarking Attacks and Tools
Chapter 6 Combinational Domain Digital Watermarking
Chapter 7 Watermarking Based on Genetic Algorithms
Chapter 8 Adjusted-Purpose Watermarking
Chapter 9 High-Capacity Watermarking
Chapter 10 Reversible Watermarking
Chapter 11 Steganography and Steganalysis
Chapter 12 Steganography Based on Genetic Algorithms and Differential
Evolution
Index
Preface
Acknowledgments
Author
Chapter 1 Introduction
Chapter 2 Classification in Digital Watermarking
Chapter 3 Mathematical Preliminaries
Chapter 4 Digital Watermarking Fundamentals
Chapter 5 Watermarking Attacks and Tools
Chapter 6 Combinational Domain Digital Watermarking
Chapter 7 Watermarking Based on Genetic Algorithms
Chapter 8 Adjusted-Purpose Watermarking
Chapter 9 High-Capacity Watermarking
Chapter 10 Reversible Watermarking
Chapter 11 Steganography and Steganalysis
Chapter 12 Steganography Based on Genetic Algorithms and Differential
Evolution
Index
Acknowledgments
Author
Chapter 1 Introduction
Chapter 2 Classification in Digital Watermarking
Chapter 3 Mathematical Preliminaries
Chapter 4 Digital Watermarking Fundamentals
Chapter 5 Watermarking Attacks and Tools
Chapter 6 Combinational Domain Digital Watermarking
Chapter 7 Watermarking Based on Genetic Algorithms
Chapter 8 Adjusted-Purpose Watermarking
Chapter 9 High-Capacity Watermarking
Chapter 10 Reversible Watermarking
Chapter 11 Steganography and Steganalysis
Chapter 12 Steganography Based on Genetic Algorithms and Differential
Evolution
Index