Limit search to available items
Book Cover
E-book

Title Robust image authentication in the presence of noise / Nataša Živić, editor
Published Cham : Springer, [2015]
©2015

Copies

Description 1 online resource : illustrations (some color)
Contents 880-01 Introduction -- Watermarking for Image Authentication -- Perceptual image hashing technique for image authentication in WMSNs -- A Review of Approximate Message Authentication Codes -- Fuzzy Image Authentication with Error Localization and Correction -- Robustness of Biometrics by Image Processing Technology
880-01/(S Machine generated contents note: 1.1. Introduction / Fawad Ahmed / Amir Anees -- 1.1.1. Basic Requirements of Data Security / Fawad Ahmed / Amir Anees -- 1.1.2. Multimedia Security / Fawad Ahmed / Amir Anees -- 1.1.3. Image Hash / Fawad Ahmed / Amir Anees -- 1.1.4. Basic Requirements of Image Hashing / Fawad Ahmed / Amir Anees -- 1.2. Review of Image Hashing Schemes / Fawad Ahmed / Amir Anees -- 1.2.1. Statistic-Based Schemes / Fawad Ahmed / Amir Anees -- 1.2.2. Relation-Based Schemes / Fawad Ahmed / Amir Anees -- 1.2.3. Coarse Representation-Based Schemes / Fawad Ahmed / Amir Anees -- 1.2.4. Matrix-Based Schemes / Fawad Ahmed / Amir Anees -- 1.2.5. Low-Level Feature-Based Schemes / Fawad Ahmed / Amir Anees -- 1.3. Illustration of an Image Hashing Scheme / Fawad Ahmed / Amir Anees -- 1.3.1. Hash Generation Module / Fawad Ahmed / Amir Anees -- 1.3.2. Image Verification Module / Fawad Ahmed / Amir Anees -- 1.4. Reducing Size of Image Hash Using Quantization / Fawad Ahmed / Amir Anees -- 1.4.1. Hash Generation Using 3-Bit Quantization / Fawad Ahmed / Amir Anees -- 1.4.2. Image Verification Using 3-Bit Quantization / Fawad Ahmed / Amir Anees -- 1.4.3. 3-Bit Quantization Example / Fawad Ahmed / Amir Anees -- 1.4.4. 4-Bit Quantization Scheme / Fawad Ahmed / Amir Anees -- 1.4.4.1. Hash Generation Using 4-Bit Quantization / Fawad Ahmed / Amir Anees -- 1.4.4.2. Image Verification Using 4-Bit Quantization / Fawad Ahmed / Amir Anees -- 1.4.4.3. Reduction in Hash Size Due to 4-Bit Quantization / Fawad Ahmed / Amir Anees -- 1.4.4.4. Effect on Robustness and Tamper Detection Due to 4-Bit Quantization / Fawad Ahmed / Amir Anees -- 1.5. Performance Evaluation / Fawad Ahmed / Amir Anees -- 1.5.1. Effect of Beta (β) on Hash Collision / Fawad Ahmed / Amir Anees -- 1.5.2. Robustness to Channel Noise and JPEG Compression / Fawad Ahmed / Amir Anees -- 1.5.3. Threshold Selection / Fawad Ahmed / Amir Anees -- 1.5.4. Detection of Tampering / Fawad Ahmed / Amir Anees -- 1.5.5. Receiver Operating Characteristic Curve / Fawad Ahmed / Amir Anees -- 1.5.6. Hash Size / Fawad Ahmed / Amir Anees -- 1.6. Security Analysis / Fawad Ahmed / Amir Anees -- 1.6.1. Impact of Randomized Pixel Modulation on System's Security / Fawad Ahmed / Amir Anees -- 1.6.2. Statistical Analysis / Fawad Ahmed / Amir Anees -- 1.6.3. Effect of Secret Key on the Hash / Fawad Ahmed / Amir Anees -- 1.6.4. Probability of Hash Collision / Fawad Ahmed / Amir Anees -- 1.6.5. Quantization and System's Security / Fawad Ahmed / Amir Anees -- 1.7. Conclusion / Fawad Ahmed / Amir Anees -- References / Fawad Ahmed / Amir Anees -- 2.1. Basis of Watermarking / Chen Ling / Obaid Ur-Rehman -- 2.2. Classification / Chen Ling / Obaid Ur-Rehman -- 2.2.1. Perceptibility / Chen Ling / Obaid Ur-Rehman -- 2.2.2. Detection Types / Chen Ling / Obaid Ur-Rehman -- 2.2.3. System Platform / Chen Ling / Obaid Ur-Rehman -- 2.2.4. Image Compression / Chen Ling / Obaid Ur-Rehman -- 2.2.5. Embedding Domain / Chen Ling / Obaid Ur-Rehman -- 2.2.5.1. LSB / Chen Ling / Obaid Ur-Rehman -- 2.2.5.2. SS / Chen Ling / Obaid Ur-Rehman -- 2.2.5.3. DCT / Chen Ling / Obaid Ur-Rehman -- 2.2.5.4. DWT / Chen Ling / Obaid Ur-Rehman -- 2.2.6. Robustness / Chen Ling / Obaid Ur-Rehman -- 2.2.7. Lossless / Chen Ling / Obaid Ur-Rehman -- 2.3. Requirements of Watermarking / Chen Ling / Obaid Ur-Rehman -- 2.3.1. Fidelity / Obaid Ur-Rehman / Chen Ling -- 2.3.2. Capacity / Obaid Ur-Rehman / Chen Ling -- 2.3.3. Robustness / Chen Ling / Obaid Ur-Rehman -- 2.3.4. Security / Chen Ling / Obaid Ur-Rehman -- 2.3.4.1. Malicious Attacks / Chen Ling / Obaid Ur-Rehman -- 2.3.4.2. Incidental Attack / Obaid Ur-Rehman / Chen Ling -- 2.3.4.3. Secret Key / Chen Ling / Obaid Ur-Rehman -- 2.3.5. Tamper Detection, Location, and Recovery / Obaid Ur-Rehman / Chen Ling -- 2.4. Watermarking Algorithm for Image Authentication / Chen Ling / Obaid Ur-Rehman -- 2.4.1. Watermark Design / Obaid Ur-Rehman / Chen Ling -- 2.4.1.1. Feature Extraction / Chen Ling / Obaid Ur-Rehman -- 2.4.1.2. Watermark Embedding Approach / Obaid Ur-Rehman / Chen Ling -- 2.4.2. Example Design Case / Chen Ling / Obaid Ur-Rehman -- 2.4.2.1. Goals / Obaid Ur-Rehman / Chen Ling -- 2.4.2.2. Hybrid Feature Watermark Generation / Chen Ling / Obaid Ur-Rehman -- 2.4.2.3. Watermark Embedding / Obaid Ur-Rehman / Chen Ling -- 2.4.2.4. Watermark Extraction and Authentication Procedure / Chen Ling / Obaid Ur-Rehman -- References / Chen Ling / Obaid Ur-Rehman -- 3.1. Introduction / Jinse Shin / Christoph Ruland -- 3.2. High Level Requirements for Image Authentication in WMSNs / Jinse Shin / Christoph Ruland -- 3.3. Previous Works on Data Authentication in WMSNs / Jinse Shin / Christoph Ruland -- 3.4. Perceptual Image Hashing / Jinse Shin / Christoph Ruland -- 3.4.1. Basic Concept / Jinse Shin / Christoph Ruland -- 3.4.2. Desirable Properties / Jinse Shin / Christoph Ruland -- 3.4.2.1. Perceptual Robustness / Jinse Shin / Christoph Ruland -- 3.4.2.2. Fragility to Visual Distinct Image / Jinse Shin / Christoph Ruland -- 3.4.2.3. Unpredictability of the Hash / Jinse Shin / Christoph Ruland -- 3.5. Content Based Image Authentication Using Perceptual Image Hashing Technique / Jinse Shin / Christoph Ruland -- 3.5.1. Image Statistics Based Approach / Jinse Shin / Christoph Ruland -- 3.5.2. Relation Based Approach / Jinse Shin / Christoph Ruland -- 3.5.3. Coarse Image Representation Based Approach / Jinse Shin / Christoph Ruland -- 3.5.4. Low-level Image Representation Based Approach / Jinse Shin / Christoph Ruland -- 3.6. Experiment Results / Jinse Shin / Christoph Ruland -- 3.6.1. Robustness / Jinse Shin / Christoph Ruland -- 3.6.2. Discriminability / Jinse Shin / Christoph Ruland -- 3.6.3. Security / Jinse Shin / Christoph Ruland -- 3.7. Conclusion / Jinse Shin / Christoph Ruland -- References / Christoph Ruland / Jinse Shin -- 4.1. Introduction / S. Amir Hossein Tabatabaei / NataKa Zivic -- 4.1.1. Definitions and Notations / S. Amir Hossein Tabatabaei / NataKa Zivic -- 4.2. Dedicated AMAC Schemes / NataKa Zivic / S. Amir Hossein Tabatabaei -- 4.2.1. Majority-Based AMACs / S. Amir Hossein Tabatabaei / NataKa Zivic -- 4.2.1.1. Shifting Attack / S. Amir Hossein Tabatabaei / NataKa Zivic -- 4.2.1.2. Security Enhancement / S. Amir Hossein Tabatabaei / NataKa Zivic -- 4.2.1.3. Analysis of the Majority-Based AMACs / S. Amir Hossein Tabatabaei / NataKa Zivic -- 4.2.2. Noise Tolerant Message Authentication Codes (NTMACs) / S. Amir Hossein Tabatabaei / NataKa Zivic -- 4.2.2.1. Analysis of the NTMAC-Based AMACs / S. Amir Hossein Tabatabaei / NataKa Zivic -- 4.2.3. AMACs Based on Computational Security / S. Amir Hossein Tabatabaei / NataKa Zivic -- 4.2.3.1. Analysis of the Computational Security Based AMACs / S. Amir Hossein Tabatabaei / NataKa Zivic -- 4.2.4. Unconditionally Secure AMAC / S. Amir Hossein Tabatabaei / NataKa Zivic -- 4.2.4.1. Analysis of Unconditionally Secure AMAC / S. Amir Hossein Tabatabaei / NataKa Zivic -- 4.2.5. Comparison / S. Amir Hossein Tabatabaei / NataKa Zivic -- 4.3. Applications of Dedicated AMACs in Image Authentication Techniques / S. Amir Hossein Tabatabaei / NataKa Zivic -- 4.3.1. Extension of the MAJORITY-Based AMACs and the NTMACs / S. Amir Hossein Tabatabaei / NataKa Zivic -- 4.3.2. Extension of AMAC1 and AMAC2 / S. Amir Hossein Tabatabaei / NataKa Zivic -- 4.4. Conclusion / S. Amir Hossein Tabatabaei / NataKa Zivic -- References / S
Summary This book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compared and, furthermore, innovative approaches and algorithms are introduced. The introduced algorithms are applied to improve image authentication, watermarking and biometry. Aside from presenting new directions and algorithms for robust image authentication in the presence of noise, as well as image correction, this book also: Provides an overview of the state of the art algorithms for image authentication in the presence of noise and modifications, as well as a comparison of these algorithms, Presents novel algorithms for robust image authentication, whereby the image is tried to be corrected and authenticated, Examines different views for the solution of problems connected to image authentication in the presence of noise, Shows examples, how the new techniques can be applied to image authentication, watermarking and biometry. This book is written on the one hand for students, who want to learn about image processing, authentication, watermarking and biometry, and on the other hand for engineers and researchers, who work on aspects of robustness against modifications of secure images
Analysis engineering
beeldverwerking
image processing
spraak
speech
informatiesystemen
information systems
massamedia
mass media
Engineering (General)
Techniek (algemeen)
Bibliography Includes bibliographical references
Notes Online resource; title from PDF title page (Ebsco, viewed April 9, 2015)
Subject Image transmission.
Digital signatures.
Electronic noise.
Robust control.
Graphical & digital media applications.
Communications engineering -- telecommunications.
Imaging systems & technology.
COMPUTERS -- Computer Vision & Pattern Recognition.
Digital signatures
Electronic noise
Image transmission
Robust control
Form Electronic book
Author Živić, Nataša, 1975- editor.
ISBN 9783319131566
3319131567
3319131559
9783319131559