Robust Image Authentication in the Presence of Noise

This book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compar...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Živić, Nataša (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2015.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03363nam a22004935i 4500
001 978-3-319-13156-6
003 DE-He213
005 20151204141242.0
007 cr nn 008mamaa
008 150406s2015 gw | s |||| 0|eng d
020 |a 9783319131566  |9 978-3-319-13156-6 
024 7 |a 10.1007/978-3-319-13156-6  |2 doi 
040 |d GrThAP 
050 4 |a TK5102.9 
050 4 |a TA1637-1638 
050 4 |a TK7882.S65 
072 7 |a TTBM  |2 bicssc 
072 7 |a UYS  |2 bicssc 
072 7 |a TEC008000  |2 bisacsh 
072 7 |a COM073000  |2 bisacsh 
082 0 4 |a 621.382  |2 23 
245 1 0 |a Robust Image Authentication in the Presence of Noise  |h [electronic resource] /  |c edited by Nataša Živić. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2015. 
300 |a XV, 187 p. 79 illus., 33 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Introduction -- Watermarking for Image Authentication -- Perceptual image hashing technique for image authentication in WMSNs -- A Review of Approximate Message Authentication Codes -- Fuzzy Image Authentication with Error Localization and Correction -- Robustness of Biometrics by Image Processing Technology. 
520 |a This book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compared and, furthermore, innovative approaches and algorithms are introduced. The introduced algorithms are applied to improve image authentication, watermarking and biometry.    Aside from presenting new directions and algorithms for robust image authentication in the presence of noise, as well as image correction, this book also:   Provides an overview of the state of the art algorithms for image authentication in the presence of noise and modifications, as well as a comparison of these algorithms, Presents novel algorithms for robust image authentication, whereby the image is tried to be corrected and authenticated, Examines different views for the solution of problems connected to image authentication in the presence of noise, Shows examples, how the new techniques can be applied to image authentication, watermarking and biometry. This book is written on the one hand for students, who want to learn about image processing, authentication, watermarking and biometry, and on the other hand for engineers and researchers, who work on aspects of robustness against modifications of secure images. 
650 0 |a Engineering. 
650 0 |a Multimedia information systems. 
650 0 |a Electrical engineering. 
650 1 4 |a Engineering. 
650 2 4 |a Signal, Image and Speech Processing. 
650 2 4 |a Multimedia Information Systems. 
650 2 4 |a Communications Engineering, Networks. 
700 1 |a Živić, Nataša.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783319131559 
856 4 0 |u http://dx.doi.org/10.1007/978-3-319-13156-6  |z Full Text via HEAL-Link 
912 |a ZDB-2-ENG 
950 |a Engineering (Springer-11647)