000 | 03634nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-319-78597-4 | ||
003 | DE-He213 | ||
005 | 20220801221003.0 | ||
007 | cr nn 008mamaa | ||
008 | 180612s2019 sz | s |||| 0|eng d | ||
020 |
_a9783319785974 _9978-3-319-78597-4 |
||
024 | 7 |
_a10.1007/978-3-319-78597-4 _2doi |
|
050 | 4 | _aTK5102.9 | |
072 | 7 |
_aTJF _2bicssc |
|
072 | 7 |
_aUYS _2bicssc |
|
072 | 7 |
_aTEC008000 _2bisacsh |
|
072 | 7 |
_aTJF _2thema |
|
072 | 7 |
_aUYS _2thema |
|
082 | 0 | 4 |
_a621.382 _223 |
100 | 1 |
_aYahya, Abid. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _918076 |
|
245 | 1 | 0 |
_aSteganography Techniques for Digital Images _h[electronic resource] / _cby Abid Yahya. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2019. |
|
300 |
_aXVI, 122 p. 51 illus., 39 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aChapter1: Introduction to steganography -- Chapter2: Steganography techniques -- Chapter3: Characteristic region-based image steganography -- Chapter4: An enhanced robust and protected image steganographic system -- Chapter5: Conclusion towards hidden communication. | |
520 | _aThis book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding. Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption; Provides a variety of methods to achieve characteristic region Steganography synchronization; Shows how Steganography improves upon cryptography by using obscurity features. | ||
650 | 0 |
_aSignal processing. _94052 |
|
650 | 0 |
_aTelecommunication. _910437 |
|
650 | 0 |
_aComputational intelligence. _97716 |
|
650 | 0 |
_aImage processing—Digital techniques. _931565 |
|
650 | 0 |
_aComputer vision. _953513 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 1 | 4 |
_aSignal, Speech and Image Processing . _931566 |
650 | 2 | 4 |
_aCommunications Engineering, Networks. _931570 |
650 | 2 | 4 |
_aComputational Intelligence. _97716 |
650 | 2 | 4 |
_aComputer Imaging, Vision, Pattern Recognition and Graphics. _931569 |
650 | 2 | 4 |
_aCryptology. _931769 |
710 | 2 |
_aSpringerLink (Online service) _953514 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319785356 |
776 | 0 | 8 |
_iPrinted edition: _z9783319785363 |
776 | 0 | 8 |
_iPrinted edition: _z9783030132637 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-78597-4 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c79163 _d79163 |