Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Robust image authentication in the p...
~
SpringerLink (Online service)
Robust image authentication in the presence of noise
Record Type:
Electronic resources : Monograph/item
Title/Author:
Robust image authentication in the presence of noiseedited by Natasa Zivic.
other author:
Zivic, Natasa.
Published:
Cham :Springer International Publishing :2015.
Description:
xv, 187 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Image transmission.
Online resource:
http://dx.doi.org/10.1007/978-3-319-13156-6
ISBN:
9783319131566 (electronic bk.)
Robust image authentication in the presence of noise
Robust image authentication in the presence of noise
[electronic resource] /edited by Natasa Zivic. - Cham :Springer International Publishing :2015. - xv, 187 p. :ill., digital ;24 cm.
Introduction -- Watermarking for Image Authentication -- Perceptual image hashing technique for image authentication in WMSNs -- A Review of Approximate Message Authentication Codes -- Fuzzy Image Authentication with Error Localization and Correction -- Robustness of Biometrics by Image Processing Technology.
This book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compared and, furthermore, innovative approaches and algorithms are introduced. The introduced algorithms are applied to improve image authentication, watermarking and biometry. Aside from presenting new directions and algorithms for robust image authentication in the presence of noise, as well as image correction, this book also: Provides an overview of the state of the art algorithms for image authentication in the presence of noise and modifications, as well as a comparison of these algorithms, Presents novel algorithms for robust image authentication, whereby the image is tried to be corrected and authenticated, Examines different views for the solution of problems connected to image authentication in the presence of noise, Shows examples, how the new techniques can be applied to image authentication, watermarking and biometry. This book is written on the one hand for students, who want to learn about image processing, authentication, watermarking and biometry, and on the other hand for engineers and researchers, who work on aspects of robustness against modifications of secure images.
ISBN: 9783319131566 (electronic bk.)
Standard No.: 10.1007/978-3-319-13156-6doiSubjects--Topical Terms:
185590
Image transmission.
LC Class. No.: TK5105.2
Dewey Class. No.: 006.37
Robust image authentication in the presence of noise
LDR
:02696nmm a2200337 a 4500
001
465646
003
DE-He213
005
20151123112433.0
006
m d
007
cr nn 008maaau
008
151222s2015 gw s 0 eng d
020
$a
9783319131566 (electronic bk.)
020
$a
9783319131559 (paper)
024
7
$a
10.1007/978-3-319-13156-6
$2
doi
035
$a
978-3-319-13156-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.2
072
7
$a
TTBM
$2
bicssc
072
7
$a
UYS
$2
bicssc
072
7
$a
TEC008000
$2
bisacsh
072
7
$a
COM073000
$2
bisacsh
082
0 4
$a
006.37
$2
23
090
$a
TK5105.2
$b
.R667 2015
245
0 0
$a
Robust image authentication in the presence of noise
$h
[electronic resource] /
$c
edited by Natasa Zivic.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2015.
300
$a
xv, 187 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Introduction -- Watermarking for Image Authentication -- Perceptual image hashing technique for image authentication in WMSNs -- A Review of Approximate Message Authentication Codes -- Fuzzy Image Authentication with Error Localization and Correction -- Robustness of Biometrics by Image Processing Technology.
520
$a
This book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compared and, furthermore, innovative approaches and algorithms are introduced. The introduced algorithms are applied to improve image authentication, watermarking and biometry. Aside from presenting new directions and algorithms for robust image authentication in the presence of noise, as well as image correction, this book also: Provides an overview of the state of the art algorithms for image authentication in the presence of noise and modifications, as well as a comparison of these algorithms, Presents novel algorithms for robust image authentication, whereby the image is tried to be corrected and authenticated, Examines different views for the solution of problems connected to image authentication in the presence of noise, Shows examples, how the new techniques can be applied to image authentication, watermarking and biometry. This book is written on the one hand for students, who want to learn about image processing, authentication, watermarking and biometry, and on the other hand for engineers and researchers, who work on aspects of robustness against modifications of secure images.
650
0
$a
Image transmission.
$3
185590
650
0
$a
Digital signatures.
$3
484889
650
0
$a
Electronic noise.
$3
215315
650
0
$a
Robust control.
$3
278860
650
1 4
$a
Engineering.
$3
210888
650
2 4
$a
Signal, Image and Speech Processing.
$3
273768
650
2 4
$a
Multimedia Information Systems.
$3
274489
650
2 4
$a
Communications Engineering, Networks.
$3
273745
700
1
$a
Zivic, Natasa.
$3
719499
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-13156-6
950
$a
Engineering (Springer-11647)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000114087
電子館藏
1圖書
電子書
EB TK5105.2 R667 2015
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://dx.doi.org/10.1007/978-3-319-13156-6
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login