|
|
|
|
LEADER |
03807nam a2200577 4500 |
001 |
978-3-319-78597-4 |
003 |
DE-He213 |
005 |
20191029032856.0 |
007 |
cr nn 008mamaa |
008 |
180612s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319785974
|9 978-3-319-78597-4
|
024 |
7 |
|
|a 10.1007/978-3-319-78597-4
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK5102.9
|
050 |
|
4 |
|a TA1637-1638
|
072 |
|
7 |
|a TTBM
|2 bicssc
|
072 |
|
7 |
|a TEC008000
|2 bisacsh
|
072 |
|
7 |
|a TTBM
|2 thema
|
072 |
|
7 |
|a UYS
|2 thema
|
082 |
0 |
4 |
|a 621.382
|2 23
|
100 |
1 |
|
|a Yahya, Abid.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Steganography Techniques for Digital Images
|h [electronic resource] /
|c by Abid Yahya.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a XVI, 122 p. 51 illus., 39 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Chapter1: Introduction to steganography -- Chapter2: Steganography techniques -- Chapter3: Characteristic region-based image steganography -- Chapter4: An enhanced robust and protected image steganographic system -- Chapter5: Conclusion towards hidden communication.
|
520 |
|
|
|a This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding. Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption; Provides a variety of methods to achieve characteristic region Steganography synchronization; Shows how Steganography improves upon cryptography by using obscurity features.
|
650 |
|
0 |
|a Signal processing.
|
650 |
|
0 |
|a Image processing.
|
650 |
|
0 |
|a Speech processing systems.
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
|
0 |
|a Computational intelligence.
|
650 |
|
0 |
|a Optical data processing.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
1 |
4 |
|a Signal, Image and Speech Processing.
|0 http://scigraph.springernature.com/things/product-market-codes/T24051
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/T24035
|
650 |
2 |
4 |
|a Computational Intelligence.
|0 http://scigraph.springernature.com/things/product-market-codes/T11014
|
650 |
2 |
4 |
|a Computer Imaging, Vision, Pattern Recognition and Graphics.
|0 http://scigraph.springernature.com/things/product-market-codes/I22005
|
650 |
2 |
4 |
|a Cryptology.
|0 http://scigraph.springernature.com/things/product-market-codes/I28020
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319785356
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319785363
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030132637
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-78597-4
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|