Steganography Techniques for Digital Images

Nonfiction, Science & Nature, Technology, Telecommunications, Electronics
Cover of the book Steganography Techniques for Digital Images by Abid Yahya, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Abid Yahya ISBN: 9783319785974
Publisher: Springer International Publishing Publication: June 12, 2018
Imprint: Springer Language: English
Author: Abid Yahya
ISBN: 9783319785974
Publisher: Springer International Publishing
Publication: June 12, 2018
Imprint: Springer
Language: English

This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding.  

  • Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption;

  • Provides a variety of methods to achieve characteristic region Steganography synchronization;

  • Shows how Steganography improves upon cryptography by using obscurity features.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding.  

More books from Springer International Publishing

Cover of the book Assessment in Education by Abid Yahya
Cover of the book Teaching Postdramatic Theatre by Abid Yahya
Cover of the book Youth and Substance Abuse by Abid Yahya
Cover of the book Guide to Clinical Management of Idiopathic Pulmonary Fibrosis by Abid Yahya
Cover of the book Music and the Generosity of God by Abid Yahya
Cover of the book Crystallization of Nanoscaled Colloids by Abid Yahya
Cover of the book Spectroscopy of Complex Oxide Interfaces by Abid Yahya
Cover of the book Information-Theoretic Evaluation for Computational Biomedical Ontologies by Abid Yahya
Cover of the book Difficult Decisions in Vascular Surgery by Abid Yahya
Cover of the book The Internal Impact and External Influence of the Greek Financial Crisis by Abid Yahya
Cover of the book Medical Computer Vision and Bayesian and Graphical Models for Biomedical Imaging by Abid Yahya
Cover of the book Theory of Hematopoiesis Control by Abid Yahya
Cover of the book The Psychology of Love and Hate in Intimate Relationships by Abid Yahya
Cover of the book Legume Nitrogen Fixation in Soils with Low Phosphorus Availability by Abid Yahya
Cover of the book Marion and Derrida on The Gift and Desire: Debating the Generosity of Things by Abid Yahya
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy