Cargando…

Steganography and watermarking /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Yang, Ching-Nung (Editor ), Lin, Chia-Chen (Editor ), Chang, Chin-Chen (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : Nova Publishers, [2013]
Colección:Privacy and identity protection
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • STEGANOGRAPHY AND WATERMARKING; STEGANOGRAPHY AND WATERMARKING; Library of Congress Cataloging-in-Publication Data; CONTENTS; PREFACE; Chapter 1: DATA HIDING FOR BINARY IMAGES; 1. INTRODUCTION; 2.WEIGHTED MATRIX METHOD; 4. PAIR-WISE METHOD; 5. HISTOGRAM-BASED SCHEME; 6. DATA HIDING BASED ON BINARY DOCUMENT; 7. COMPARISON; ACKNOWLEDGMENTS; REFERENCES; Chapter 2: REVERSIBLE DATA HIDING SCHEME FOR HALFTONE IMAGES; 1. INTRODUCTION; 2. RELATED WORKS; 3. LUT-BASED REVERSIBLE DATA HIDING SCHEME FOR HALFTONE IMAGES; 4. SIMULATION RESULTS; CONCLUSIONS; ACKNOWLEDGMENT; REFERENCES.
  • Chapter 3: REVERSIBLE DATA HIDING SCHEMES FOR JPEG IMAGES1. Introduction; 2. Overview of JPEG Standard; 3. LSB Based Reversible JPEG Watermarking; 4. Difference Expansion Based Reversible JPEG Watermarking; 5. Histogram Based Reversible JPEG Watermarking; 6. EOB Position Based Reversible JPEG Watermarking; 7. Equivalence Based JPEG Watermarking; 8. Authentication Application; References; Chapter 4: LOSSLESS DATA HIDING BASED ON VQ; ABSTRACT; INTRODUCTION; RELATED WORKS; 3. THE PROPOSED SCHEME; 4. EXPERIMENTAL RESULTS; CONCLUSION; REFERENCES.
  • Chapter 5: A HIGH QUALITY STEGANOGRAPHIC SCHEME WITH PIXEL-VALUE DIFFERENCING1. INTRODUCTION; 2. PREVIOUS WORKS; 3. THE PROPOSED STEGANOGRAPHY SCHEME; 4. EXPERIMENT AND COMPARISON; CONCLUSION; REFERENCES; APPENDIX; Chapter 6: REVERSIBLE DATA HIDING BASED ON HISTOGRAM TECHNIQUE; ABSTRACT; 1. INTRODUCTION; 2. RDH USING HISTOGRAM-SHIFTING; 3. RDH BY ADJUSTING THE AUXILIARY INFORMATION; 4. HIGH-CAPACITY RDH BASED ON HISTOGRAM MODIFICATION; 5. HISTOGRAM-BASED RDH WITH MINOR DISTORTION; CONCLUSION; ACKNOWLEDGMENTS; REFERENCES; Chapter 7: STEGANOGRAPHY IN SCRIPT FILES; 7.1. INTRODUCTION.
  • 7.2. STEGANOGRAPHY SCHEMES USING SCRIPT FILES7.3. HYBRID STEGANOGRAPHIC FRAMEWORK; 7.4. EXPERIMENTAL RESULTS AND ANALYSIS; CONCLUSIONS; REFERENCES; Chapter 8: THE STATE-OF-THE-ART STEGANOGRAPHY FOR 3D MESHES; 1. INTRODUCTION; 2. DISTORTION STEGANOGRAPHY; 3. REPRESENTATION STEGANOGRAPHY; 4. PERMUTATION STEGANOGRAPHY; CONCLUSION; REFERENCES; Chapter 9: STEGANALYSIS ALGORITHM FOR DETECTING THE HIDDEN INFORMATION IN IMAGES; 1. INTRODUCTION; 2. RELATED WORKS; 3. PROPOSED SCHEME; 4. EXPERIMENT RESULT; CONCLUSION; REFERENCES; Chapter 10: SVD-BASED DIGITAL IMAGE WATERMARKING; 1. INTRODUCTION.
  • 2. IMAGE FEATURES EXTRACTION AND SVD TRANSFORMATION3. GENERAL METHOD OF SVD-BASED DIGITAL WATERMARKING; 4. COMPARISON BETWEEN SVD-BASED AND DWT-BASED WATERMARKING; CONCLUSIONS; ACKNOWLEDGMENTS; REFERENCES; Chapter 11: ROBUST SVD-DCT DOMAIN IMAGE WATERMARKING; 11.1. INTRODUCTION; 11.2. SVD-BASED ROBUST WATERMARKING; 11.3. SVD-DCT HYBRID DOMAIN WATERMARKING SCHEMES; 11.4. EXPERIMENTAL RESULTS; 11.5. DISCUSSION; REFERENCES; Chapter 12: FRAGILE WATERMARKING FOR CONTENT AUTHENTICATION WITH TAMPER LOCALIZATION; 1. INTRODUCTION; 2. OVERVIEW OF DIGITAL HALFTONING AND INVERSE HALFTONING.