logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Handbook of Image-based Security Techniques by Agarwal, Suneeta; Shivani, Shivendra; Suri, Jasjit S ISBN 9781315166964, 9781351681568, 1315166968, 1351681567

  • SKU: EBN-7160176
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

4.6

34 reviews
Instant download (eBook) Handbook of Image-based Security Techniques after payment.
Authors:Agarwal, Suneeta; Shivani, Shivendra; Suri, Jasjit S
Pages:0 pages.
Year:2018
Editon:First edition
Publisher:CRC Press
Language:english
File Size:9.54 MB
Format:pdf
ISBNS:9781315166964, 9781351681568, 1315166968, 1351681567
Categories: Ebooks

Product desciption

(Ebook) Handbook of Image-based Security Techniques by Agarwal, Suneeta; Shivani, Shivendra; Suri, Jasjit S ISBN 9781315166964, 9781351681568, 1315166968, 1351681567

"This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book is divided into four sections. The first section explores basic to advanced concepts of visual cryptography. The second section of the book covers digital image watermarking including watermarking algorithms, frameworks for modeling watermarking systems, and the evaluation of watermarking techniques. The next section analyzes steganography and steganalysis, including the notion, terminology and building blocks of steganographic communication. The final section of the book describes the concept of hybrid approaches which includes all image-based security techniques. One can also explore various advanced research domains related to the multimedia security field in the final section. The book includes many examples and applications, as well as implementation using MATLAB, wherever required.Features:Provides a comprehensive introduction to visual cryptography, digital watermarking and steganography in one bookIncludes real-life examples and applications throughoutCovers theoretical and practical concepts related to security of other multimedia objects using image based security techniquesPresents the implementation of all important concepts in MATLAB"--Provided by publisher.
Abstract: "This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book is divided into four sections. The first section explores basic to advanced concepts of visual cryptography. The second section of the book covers digital image watermarking including watermarking algorithms, frameworks for modeling watermarking systems, and the evaluation of watermarking techniques. The next section analyzes steganography and steganalysis, including the notion, terminology and building blocks of steganographic communication. The final section of the book describes the concept of hybrid approaches which includes all image-based security techniques. One can also explore various advanced research domains related to the multimedia security field in the final section. The book includes many examples and applications, as well as implementation using MATLAB, wherever required.Features:Provides a comprehensive introduction to visual cryptography, digital watermarking and steganography in one bookIncludes real-life examples and applications throughoutCovers theoretical and practical concepts related to security of other multimedia objects using image based security techniquesPresents the implementation of all important concepts in MATLAB"--Provided by publisher
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products