Multimedia security watermarking, steganography, and forensics

This book provides technical information on multimedia security and steganography as well as the fundamental theoretical framework for developing the extensive advanced techniques. By comprehensively considering the essential principles of the multimedia security and steganographic systems, readers...

Descripción completa

Detalles Bibliográficos
Otros Autores: Shih, Frank Y. (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boca Raton, FL : Taylor & Francis 2012, c2013.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628219206719
Tabla de Contenidos:
  • Front Cover; Dedication; Contents; Preface; Acknowledgments; Editor; Contributors; Part I: Multimedia Mining and Classification; Chapter 1: Multimedia Duplicate Mining toward Knowledge Discovery; Chapter 2: Discriminative Learning-Assisted Video Semantic Concept Classification; Chapter 3: Improved Feature Vocabulary-Based Method for Image Categorization; Part II: Watermarking; Chapter 4: Automatic Detection and Removal of Visible Image Watermarks; Chapter 5: Digital Watermarking Based on Chaotic Map and Reference Register
  • Chapter 6: Pseudo-Random Pixel Rearrangement Algorithm Based on Gaussian Integers for Image WatermarkingChapter 7: Reversible Data-Hiding Techniques for Digital Images; Chapter 8: Watermarking Based on Local Binary Pattern Operators; Chapter 9: Authentication of JPEG Images Based on Genetic Algorithms; Chapter 10: An Efficient Block-Based Fragile Watermarking System for Tamper Localization and Recovery; Part III: Steganography; Chapter 11: Survey of Image Steganography and Steganalysis; Chapter 12: Digital Steganographic Schemes Based on Image Vector Quantization
  • Chapter 13: Differential Evolution-Based Algorithm for Breaking the Visual Steganalytic SystemChapter 14: Genetic Algorithm-Based Methodology for Breaking the Steganalytic Systems; Part IV: Forensics; Chapter 15: Image Inpainting Using an Enhanced Exemplar-Based Algorithm; Chapter 16: A Comparison Study on Copy-Cover Image Forgery Detection; Chapter 17: Chaos-Based Hash Function with Both Modification Detection and Localization Capabilities; Chapter 18: Video Forensics; Chapter 19: Using the Self-Synchronizing Method to Improve Security of the Multi-Chaotic Systems-Based Image Encryption
  • Chapter 20: Behavior Modeling of Human Objects in Multimedia Content