Text
Digital watermarking and steganography: fundamentals and techniques
Contents:
Chapter 1 Introduction
1.1 Digital watermarking
1.2 Digital steganography
1.3 Differences between watermarking and steganography
1.4 A brief history
Chapter 2 Classification in digital watermarking
2.1 Classification based on characteristics
2.2 Classification based on applications
Chapter 3 Mathematical preliminaries
3.1 Least-significant-bit substitution
3.2 Discere fourier transform
3.3 Discere cosine transform
3.4 Discere wavelet transform
3.5 Random sequence generation
3.6 Chaotic map
3.7 Error correction code
3.8 Set partitioning in hierarchical tree
Chapter 4 Digital watermarking fundamentals
4.1 Spatial domain watermarking
4.2 Frequency domain watermarking
4.3 Fragile watermarks
4.4 Robust watermarks
Chapter 5 Watermarking attacks and tools
5.1 Image-processing attacks
5.2 Geometric attacks
5.3 Cryptographic attacks
5.4 Protocol attack
5.5 Watermarking tools
5.6 Anefficient block-based fragile watermarking system for tamper localization and recovery
Chapter 6 Combinational domain digiral watermarking
6.1 Overview of combinational watermarking
6.2 Watermarking in the spatial domain
6.3 Watermarking in the frequency domain
6.4 Experimental results
6.5 Further encryption of combinational watermarking
Chapter 7 Watermarking based on genetic algorithms
7.1 Introduction to genetic algorithms
7.2 Concept of GA-based watermarking
7.3 GA-based rounding error correction watermarking
7.4 Applications to medical image watermarking
7.5 Authentication of JPEG images based of genetic
Chapter 8 Adjisted-purpose watermarking
8.1 An adjisted-purpose digital watermarking technique
8.2 Adjisted-purpose watermarking using particle swarm optimization
Chapter 9 High-capacity watermarking
9.1 Robust high-capacity digital watermarking
9.2 High-capacity multiple-regions-of-interest
Chapter 10 Reversible watermarking
10.1 Reversible image authentication schema based on chaotic fragile watermarks
10.2 Reversible data- hiding techniques using multiple-scan
Chapter 11 Steganography and steganalysis
11.1 Steganography
11.2 Steganalysis
Chapter 12 Steganography based on genetic algorithms and differential evolution
12.1 Steganography based on genecit algorithms
12.2 Steganography based on differential evolution
Index
No other version available