Steganography Techniques for Digital Images (Record no. 79163)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03634nam a22006135i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-319-78597-4 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220801221003.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 180612s2019 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783319785974 |
-- | 978-3-319-78597-4 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 621.382 |
100 1# - AUTHOR NAME | |
Author | Yahya, Abid. |
245 10 - TITLE STATEMENT | |
Title | Steganography Techniques for Digital Images |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2019. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XVI, 122 p. 51 illus., 39 illus. in color. |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Chapter1: Introduction to steganography -- Chapter2: Steganography techniques -- Chapter3: Characteristic region-based image steganography -- Chapter4: An enhanced robust and protected image steganographic system -- Chapter5: Conclusion towards hidden communication. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding. Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption; Provides a variety of methods to achieve characteristic region Steganography synchronization; Shows how Steganography improves upon cryptography by using obscurity features. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-3-319-78597-4 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2019. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Signal processing. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Telecommunication. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computational intelligence. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Image processing—Digital techniques. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer vision. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Cryptography. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data encryption (Computer science). |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Signal, Speech and Image Processing . |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Communications Engineering, Networks. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computational Intelligence. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Imaging, Vision, Pattern Recognition and Graphics. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Cryptology. |
912 ## - | |
-- | ZDB-2-ENG |
912 ## - | |
-- | ZDB-2-SXE |
No items available.