Yahya - Steganography Techniques for Digital Images
Here you can read online Yahya - Steganography Techniques for Digital Images full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Cham;Switzerland, year: 2019, publisher: Springer, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:
Romance novel
Science fiction
Adventure
Detective
Science
History
Home and family
Prose
Art
Politics
Computer
Non-fiction
Religion
Business
Children
Humor
Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.
Steganography Techniques for Digital Images: summary, description and annotation
We offer to read an annotation, description, summary or preface (depends on what the author of the book "Steganography Techniques for Digital Images" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.
Yahya: author's other books
Who wrote Steganography Techniques for Digital Images? Find out the surname, the name of the author of the book and a list of all author's works by series.
Steganography Techniques for Digital Images — read online for free the complete book (whole text) full work
Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Steganography Techniques for Digital Images" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.
Font size:
Interval:
Bookmark:
This Springer imprint is published by the registered company Springer International Publishing AG part of Springer Nature.
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Dedicated to my family for their love, support, and sacrifice along the path of my academic pursuits, especially to my father, who took me to school.
Abid Yahya
Transmitting data over a public networkfor instance, the Internetnecessitates increasing the security of data communications, especially within the extremely sensitive category of file transfers. Steganography systems have been presented and established to offer security for these applications. Profoundly, the steganography objective is not only to obstruct the adversary from decrypting a hidden message, but also to divert an adversary from even suspecting the presence of concealed communications. It does not constitute cryptography ; however, it improves security using its obscurity features. If an adversarys suspicion is aroused while examining a document where steganography has been employed, the goal of the latter objective will be overpowered, irrespective of whether or not any plaintext is discovered.
Chapter presents an overview and the challenges in the field of steganography that clarify the driving force and motivating aspect, in conjunction with the objectives, and a book outline.
Chapter describes the background and history of digital-image steganography. The evaluation jumps by connecting the present work to other existing investigations in the literature. This is achieved by up-to-date high-tech improvement in the field of digital-image steganography. Assessments and analyses of each process are also delivered where possible. Furthermore, the chapter gives a taxonomy of the present steganographic systems on image files.
Chapter gives a detailed explanation of the design of a new image steganography algorithm, known as CR-BIS . The proposed scheme takes advantage of the characteristic region-detection algorithm and content-based embedding technique. Moreover, the chapter discusses in detail the processes and stages of the algorithm and the benefits it brings over existing algorithms.
Chapter inspects in detail the theoretical features of an improved robust and reliable steganographic system, by considering the advantages of CR-BIS algorithm along with applying the insertion of an embedding map. Moreover, the chapter demonstrates the ability to enhance the stego-system robustness either by ECC inclusion or by adding redundant bits to the secret message to be embedded.
Chapter concludes the book by summarizing the most important ideas, conclusions, contributions, and future direction in the field of hidden communication.
The authors are interested in expressing their extraordinary appreciation and obligations to Botswana International University of Science and Technology (BIUST), Universiti Malaysia Perlis (UniMAP), Sarhad University of Science & Information Technology, Peshawar, Pakistan (SUIT) and Muni University, Arua, Uganda for giving us the consideration, time, and opportunity to publish this book.
We would also like to take this opportunity to express our gratitude to all those people who provided us with invaluable help in the writing and publication of this book.
Accuracy of Correctly Detected Characteristic Regions
AESAdvanced Encryption Standard
AETImage Adaptive Energy Thresholding
A-MSPUAdaptive More Surrounding Pixels Using
ANNTSArtificial Neural Network Technology for Steganography
AWGNAdditive White Gaussian Noise
BERBit Error Rate
BCHBose-Chaudhuri-Hochquenghem
BMPBitmap Format
BSSISBlind Spread Spectrum Image Steganography
bppBit per Pixel
CDCompact Disc
CDFCohen-Daubechies-Feauveau
CDMACode Division Multiple Access
CPAChosen-Plaintext Attack
CR-BISCharacteristic Region-Based Image Steganography
dBDecibel
DCTDiscrete Cosine Transform
DESData Encryption Standard
DFTDiscrete Fourier Transforms
DoGDifference-of-Gaussian
DS/FHDirect Sequence/Frequency Hopping
DVDDigital Video Disc
DWTDiscrete Wavelet Transforms
ECCError Correcting Coding
FCMFuzzy C-Means
GAGenetic Algorithm
GFGalois Field
GIFGraphics Interchange Format
HC-RIOTHomogenous Connected-Region Interested Ordered
HCSSDHigh Capacity and High Security Steganography System
HVSHuman Visual System
IDIdentity Card
IRSSImproved Robust And Secured Steganography
JPEGJoint Photographic Experts Group
LDPCLow-Density Parity-Check
LSBLeast Significant Bit
MBModel-Based Steganography
MBNSMultiple Base Notational Systems
MLEMaximum Length Embeddable
MMSMultimedia Messaging Service
MSEMean Squared Error
MVEMean Value of Energy
PNGPortable Network Graphics
PSNRPeak Signal to Noise Ratio
PRNGPseudo-Random Number Generator
PVDPixel-Value Differencing
QFQuality Factor
RBGCReflected Binary Gray Code
RGBRed Green and Blue
RS-CodeReedSolomon Code
Font size:
Interval:
Bookmark:
Similar books «Steganography Techniques for Digital Images»
Look at similar books to Steganography Techniques for Digital Images. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.
Discussion, reviews of the book Steganography Techniques for Digital Images and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.