• Complain

Yahya - Steganography Techniques for Digital Images

Here you can read online Yahya - Steganography Techniques for Digital Images full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Cham;Switzerland, year: 2019, publisher: Springer, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Yahya Steganography Techniques for Digital Images
  • Book:
    Steganography Techniques for Digital Images
  • Author:
  • Publisher:
    Springer
  • Genre:
  • Year:
    2019
  • City:
    Cham;Switzerland
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Steganography Techniques for Digital Images: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Steganography Techniques for Digital Images" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Yahya: author's other books


Who wrote Steganography Techniques for Digital Images? Find out the surname, the name of the author of the book and a list of all author's works by series.

Steganography Techniques for Digital Images — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Steganography Techniques for Digital Images" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Abid Yahya Steganography Techniques for Digital Images Abid Yahya - photo 1
Abid Yahya
Steganography Techniques for Digital Images
Abid Yahya Faculty of Engineering Technology Botswana International - photo 2
Abid Yahya
Faculty of Engineering & Technology, Botswana International University of Science and Technology, Palapye, Botswana
ISBN 978-3-319-78535-6 e-ISBN 978-3-319-78597-4
https://doi.org/10.1007/978-3-319-78597-4
Library of Congress Control Number: 2018937085
Springer International Publishing AG, part of Springer Nature 2019
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer International Publishing AG part of Springer Nature.

The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

Dedicated to my family for their love, support, and sacrifice along the path of my academic pursuits, especially to my father, who took me to school.

Abid Yahya

Preface

Transmitting data over a public networkfor instance, the Internetnecessitates increasing the security of data communications, especially within the extremely sensitive category of file transfers. Steganography systems have been presented and established to offer security for these applications. Profoundly, the steganography objective is not only to obstruct the adversary from decrypting a hidden message, but also to divert an adversary from even suspecting the presence of concealed communications. It does not constitute cryptography ; however, it improves security using its obscurity features. If an adversarys suspicion is aroused while examining a document where steganography has been employed, the goal of the latter objective will be overpowered, irrespective of whether or not any plaintext is discovered.

This book is comprised of five (5) chapters, and is prepared as follows:
  • Chapter presents an overview and the challenges in the field of steganography that clarify the driving force and motivating aspect, in conjunction with the objectives, and a book outline.

  • Chapter describes the background and history of digital-image steganography. The evaluation jumps by connecting the present work to other existing investigations in the literature. This is achieved by up-to-date high-tech improvement in the field of digital-image steganography. Assessments and analyses of each process are also delivered where possible. Furthermore, the chapter gives a taxonomy of the present steganographic systems on image files.

  • Chapter gives a detailed explanation of the design of a new image steganography algorithm, known as CR-BIS . The proposed scheme takes advantage of the characteristic region-detection algorithm and content-based embedding technique. Moreover, the chapter discusses in detail the processes and stages of the algorithm and the benefits it brings over existing algorithms.

  • Chapter inspects in detail the theoretical features of an improved robust and reliable steganographic system, by considering the advantages of CR-BIS algorithm along with applying the insertion of an embedding map. Moreover, the chapter demonstrates the ability to enhance the stego-system robustness either by ECC inclusion or by adding redundant bits to the secret message to be embedded.

  • Chapter concludes the book by summarizing the most important ideas, conclusions, contributions, and future direction in the field of hidden communication.

Abid Yahya
Nagham Hamid
R. Badlishah Ahmad
Joseph M. Chuma
Palapye, Botswana
Acknowledgments
Thank you to the following personalities without their contributions and support, this book could not have been written.
  • The authors are interested in expressing their extraordinary appreciation and obligations to Botswana International University of Science and Technology (BIUST), Universiti Malaysia Perlis (UniMAP), Sarhad University of Science & Information Technology, Peshawar, Pakistan (SUIT) and Muni University, Arua, Uganda for giving us the consideration, time, and opportunity to publish this book.

  • We would also like to take this opportunity to express our gratitude to all those people who provided us with invaluable help in the writing and publication of this book.

List of Abbreviations
ADR

Accuracy of Correctly Detected Characteristic Regions

AES

Advanced Encryption Standard

AET

Image Adaptive Energy Thresholding

A-MSPU

Adaptive More Surrounding Pixels Using

ANNTS

Artificial Neural Network Technology for Steganography

AWGN

Additive White Gaussian Noise

BER

Bit Error Rate

BCH

Bose-Chaudhuri-Hochquenghem

BMP

Bitmap Format

BSSIS

Blind Spread Spectrum Image Steganography

bpp

Bit per Pixel

CD

Compact Disc

CDF

Cohen-Daubechies-Feauveau

CDMA

Code Division Multiple Access

CPA

Chosen-Plaintext Attack

CR-BIS

Characteristic Region-Based Image Steganography

dB

Decibel

DCT

Discrete Cosine Transform

DES

Data Encryption Standard

DFT

Discrete Fourier Transforms

DoG

Difference-of-Gaussian

DS/FH

Direct Sequence/Frequency Hopping

DVD

Digital Video Disc

DWT

Discrete Wavelet Transforms

ECC

Error Correcting Coding

FCM

Fuzzy C-Means

GA

Genetic Algorithm

GF

Galois Field

GIF

Graphics Interchange Format

HC-RIOT

Homogenous Connected-Region Interested Ordered

HCSSD

High Capacity and High Security Steganography System

HVS

Human Visual System

ID

Identity Card

IRSS

Improved Robust And Secured Steganography

JPEG

Joint Photographic Experts Group

LDPC

Low-Density Parity-Check

LSB

Least Significant Bit

MB

Model-Based Steganography

MBNS

Multiple Base Notational Systems

MLE

Maximum Length Embeddable

MMS

Multimedia Messaging Service

MSE

Mean Squared Error

MVE

Mean Value of Energy

PNG

Portable Network Graphics

PSNR

Peak Signal to Noise Ratio

PRNG

Pseudo-Random Number Generator

PVD

Pixel-Value Differencing

QF

Quality Factor

RBGC

Reflected Binary Gray Code

RGB

Red Green and Blue

RS-Code

ReedSolomon Code

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Steganography Techniques for Digital Images»

Look at similar books to Steganography Techniques for Digital Images. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Steganography Techniques for Digital Images»

Discussion, reviews of the book Steganography Techniques for Digital Images and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.