Handbook of Image-based Security Techniques
Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri
​
Publisher: CRC Press (Taylor & Francis Group)
Features
-
Provides a comprehensive introduction to visual cryptography, digital watermarking and steganography in one book
-
Includes real-life examples and applications throughout
-
Presents the implementation of all important concepts in MATLAB
-
Covers theoretical and practical concepts related to security of other multimedia objects using image based security techniques
-
Supplements the text with MATLAB code
-
Provides the concept of hybrid approach of all image based security techniques
Summary
This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book is divided into four sections. The first section explores basic to advanced concepts of visual cryptography.
The second section of the book covers Digital Image Watermarking including watermarking algorithms, frameworks for modeling watermarking systems, and the evaluation of watermarking techniques. The next section analyzes Steganography and Steganalysis, including the notion, terminology and building blocks of steganographic communication.
The final section of the book describes the concept of hybrid approaches, which includes all image-based security techniques. One can also explore various advanced research domains related to the multimedia security field in the final section. The book includes many examples and applications, as well as implementation using MATLAB, wherever required.
Features:
-
Provides a comprehensive introduction to visual cryptography, digital watermarking and steganography in one book
-
Includes real-life examples and applications throughout
-
Covers theoretical and practical concepts related to security of other multimedia objects using image based security techniques
-
Presents the implementation of all important concepts in MATLAB
-
Table of Contents
-
Section- I (Visual Cryptography)
-
Visual Cryptography: An Introduction. Various Dimensions of Visual Cryptography. Development of Visual Cryptography approaches with Computation-less Recovery of Secrets . Development of Visual Cryptography approaches with Computation based Recovery of Secrets.
-
Section- II (Digital Image Watermarking)
-
Digital Image Watermarking: Introduction . Fragile Watermarking. Fragile Watermarking with Recovery Capabilities in Spatial Domain. Fragile Watermarking with Recovery Capabilities in Frequency Domain. Robust Watermarking. Dual Watermarking.
-
Section III (Steganography)
-
Steganography: Introduction. Development of Steganography and Steganalysis.
-
Section IV (Hybrid approach and Advanced Topics)
-
Hybrid approach for Image based Security using VC, Watermarking and Steganography. Protection of Other Multimedia Objects using Image based Security Techniques.
Book
Book Chapters
Pattern Recognition and Image Analysis
Book Name:
Chapter Name:
Publisher:
Springer : LNCS
Book Name:
Intelligent interactive technologies and multimedia
Chapter Name:
Self-embedding pixel wise fragile watermarking scheme for image authentication
Springer : CCIS