9783319785356-3319785354-Steganography Techniques for Digital Images

Steganography Techniques for Digital Images

ISBN-13: 9783319785356
ISBN-10: 3319785354
Edition: 1st ed. 2019
Author: Abid Yahya
Publication date: 2018
Publisher: Springer
Format: Hardcover 138 pages
FREE US shipping
Buy

From $29.70

Book details

ISBN-13: 9783319785356
ISBN-10: 3319785354
Edition: 1st ed. 2019
Author: Abid Yahya
Publication date: 2018
Publisher: Springer
Format: Hardcover 138 pages

Summary

Steganography Techniques for Digital Images (ISBN-13: 9783319785356 and ISBN-10: 3319785354), written by authors Abid Yahya, was published by Springer in 2018. With an overall rating of 4.3 stars, it's a notable title among other books. You can easily purchase or rent Steganography Techniques for Digital Images (Hardcover) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding.

  • Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption;
  • Provides a variety of methods to achieve characteristic region Steganography synchronization;
  • Shows how Steganography improves upon cryptography by using obscurity features.
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book