000 03634nam a22006135i 4500
001 978-3-319-78597-4
003 DE-He213
005 20220801221003.0
007 cr nn 008mamaa
008 180612s2019 sz | s |||| 0|eng d
020 _a9783319785974
_9978-3-319-78597-4
024 7 _a10.1007/978-3-319-78597-4
_2doi
050 4 _aTK5102.9
072 7 _aTJF
_2bicssc
072 7 _aUYS
_2bicssc
072 7 _aTEC008000
_2bisacsh
072 7 _aTJF
_2thema
072 7 _aUYS
_2thema
082 0 4 _a621.382
_223
100 1 _aYahya, Abid.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_918076
245 1 0 _aSteganography Techniques for Digital Images
_h[electronic resource] /
_cby Abid Yahya.
250 _a1st ed. 2019.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2019.
300 _aXVI, 122 p. 51 illus., 39 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aChapter1: Introduction to steganography -- Chapter2: Steganography techniques -- Chapter3: Characteristic region-based image steganography -- Chapter4: An enhanced robust and protected image steganographic system -- Chapter5: Conclusion towards hidden communication.
520 _aThis book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding. Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption; Provides a variety of methods to achieve characteristic region Steganography synchronization; Shows how Steganography improves upon cryptography by using obscurity features.
650 0 _aSignal processing.
_94052
650 0 _aTelecommunication.
_910437
650 0 _aComputational intelligence.
_97716
650 0 _aImage processing—Digital techniques.
_931565
650 0 _aComputer vision.
_953513
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 1 4 _aSignal, Speech and Image Processing .
_931566
650 2 4 _aCommunications Engineering, Networks.
_931570
650 2 4 _aComputational Intelligence.
_97716
650 2 4 _aComputer Imaging, Vision, Pattern Recognition and Graphics.
_931569
650 2 4 _aCryptology.
_931769
710 2 _aSpringerLink (Online service)
_953514
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319785356
776 0 8 _iPrinted edition:
_z9783319785363
776 0 8 _iPrinted edition:
_z9783030132637
856 4 0 _uhttps://doi.org/10.1007/978-3-319-78597-4
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c79163
_d79163