Multimedia Security: Watermarking, Steganography, and Forensics

Author:   Frank Y. Shih (New Jersey Institute of Technology, Newark, NJ, USA)
Publisher:   Taylor & Francis Ltd
ISBN:  

9781138072541


Pages:   424
Publication Date:   29 March 2017
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $168.00 Quantity:  
Add to Cart

Share |

Multimedia Security: Watermarking, Steganography, and Forensics


Add your own review!

Overview

Full Product Details

Author:   Frank Y. Shih (New Jersey Institute of Technology, Newark, NJ, USA)
Publisher:   Taylor & Francis Ltd
Imprint:   CRC Press
Weight:   0.612kg
ISBN:  

9781138072541


ISBN 10:   1138072540
Pages:   424
Publication Date:   29 March 2017
Audience:   College/higher education ,  General/trade ,  Tertiary & Higher Education ,  General
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Part I: Multimedia Mining and Classification Multimedia Duplicate Mining toward Knowledge Discovery. Discriminative Learning-Assisted Video Semantic Concept Classification. An Improved Feature Vocabulary-Based Method for Image Categorization. Part II: Watermarking Automatic Detection and Removal of Visible Image Watermarks. Digital Watermarking Based on Chaotic Map and Reference Register. A Pseudo-Random Pixel Rearrangement Algorithm Based on Gaussian Integers for Image Watermarking. Reversible Data-Hiding Techniques for Digital Images. Watermarking Based on Local Binary Pattern Operators. Authentication of JPEG Images Based on Genetic Algorithms. An Efficient Block-Based Fragile Watermarking System for Tamper Localization and Recovery. Part III: Steganography Survey of Image Steganography and Steganalysis. Digital Steganographic Schemes Based on Image Vector Quantization. A Differential Evolution-Based Algorithm for Breaking the Visual Steganalytic System. Genetic Algorithm-Based Methodology for Breaking the Steganalytic Systems. Part IV: Forensics Image Inpainting Using an Enhanced Exemplar-Based Algorithm. A Comparison Study on Copy-Cover Image Forgery Detection. A Chaos-Based Hash Function with Both Modification Detection and Localization Capabilities. Video Forensics. Using the Self-Synchronizing Method to Improve Security of the Multi-Chaotic Systems-Based Image Encryption. Behavior Modeling of Human Objects in Multimedia Content.

Reviews

Author Information

Internationally renowned scholar Frank Y. Shih received his BS degree from the National Cheng Kung University, Taiwan, in 1980. He earned an MS degree from the State University of New York, Stony Brook, USA, in 1983, and a Ph.D from Purdue University, West Lafayette, Indiana, USA, in 1987. He is currently a professor at New Jersey Institute of Technology, Newark, jointly appointed in the departments of Computer Science, Electrical and Computer Engineering, and Biomedical Engineering. He is also director of the school’s Computer Vision Laboratory.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List