top of page

Handbook of Image-based Security Techniques

Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri

​

Publisher: CRC Press (Taylor & Francis Group)

Features

 

 

  • Provides a comprehensive introduction to visual cryptography, digital watermarking and steganography in one book

  • Includes real-life examples and applications throughout

  • Presents the implementation of all important concepts in MATLAB

  • Covers theoretical and practical concepts related to security of other multimedia objects using image based security techniques

  • Supplements the text with MATLAB code

  • Provides the concept of hybrid approach of all image based security techniques

Summary

This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book is divided into four sections. The first section explores basic to advanced concepts of visual cryptography.

The second section of the book covers Digital Image Watermarking including watermarking algorithms, frameworks for modeling watermarking systems, and the evaluation of watermarking techniques. The next section analyzes Steganography and Steganalysis, including the notion, terminology and building blocks of steganographic communication.

The final section of the book describes the concept of hybrid approaches, which includes all image-based security techniques. One can also explore various advanced research domains related to the multimedia security field in the final section. The book includes many examples and applications, as well as implementation using MATLAB, wherever required.

Features:

 

  • Provides a comprehensive introduction to visual cryptography, digital watermarking and steganography in one book

  • Includes real-life examples and applications throughout

  • Covers theoretical and practical concepts related to security of other multimedia objects using image based security techniques

  • Presents the implementation of all important concepts in MATLAB

  • Table of Contents

  • Section- I (Visual Cryptography)

  • Visual Cryptography: An Introduction. Various Dimensions of Visual Cryptography. Development of Visual Cryptography approaches with Computation-less Recovery of Secrets . Development of Visual Cryptography approaches with Computation based Recovery of Secrets.

  • Section- II (Digital Image Watermarking)

  • Digital Image Watermarking: Introduction . Fragile Watermarking. Fragile Watermarking with Recovery Capabilities in Spatial Domain. Fragile Watermarking with Recovery Capabilities in Frequency Domain. Robust Watermarking. Dual Watermarking.

  • Section III (Steganography)

  • Steganography: Introduction. Development of Steganography and Steganalysis.

  • Section IV (Hybrid approach and Advanced Topics)

  • Hybrid approach for Image based Security using VC, Watermarking and Steganography. Protection of Other Multimedia Objects using Image based Security Techniques.

Book

Book Chapters

Pattern Recognition and Image Analysis

Book Name:
Chapter Name:
Publisher:

Springer : LNCS

Book Name:

Intelligent interactive technologies and multimedia

Chapter Name:

Self-embedding pixel wise fragile watermarking scheme for image authentication

Springer : CCIS

Publisher:
bottom of page