Home Page Icon
Home Page
Table of Contents for
PART IV Forensics
Close
PART IV Forensics
by Frank Y. Shih
Multimedia Security
Cover
Title Page
Copyright Page
Dedication
Table of Contents
Preface
Acknowledgments
Editor
Contributors
PART I Multimedia Mining and Classification
Chapter 1 Multimedia Duplicate Mining toward Knowledge Discovery
Chapter 2 Discriminative Learning-Assisted Video Semantic Concept Classification
Chapter 3 Improved Feature Vocabulary-Based Method for Image Categorization
PART II Watermarking
Chapter 4 Automatic Detection and Removal of Visible Image Watermarks
Chapter 5 Digital Watermarking Based on Chaotic Map and Reference Register
Chapter 6 Pseudo-Random Pixel Rearrangement Algorithm Based on Gaussian Integers for Image Watermarking
Chapter 7 Reversible Data-Hiding Techniques for Digital Images
Chapter 8 Watermarking Based on Local Binary Pattern Operators
Chapter 9 Authentication of JPEG Images Based on Genetic Algorithms
Chapter 10 An Efficient Block-Based Fragile Watermarking System for Tamper Localization and Recovery
PART III Steganography
Chapter 11 Survey of Image Steganography and Steganalysis
Chapter 12 Digital Steganographic Schemes Based on Image Vector Quantization
Chapter 13 Differential Evolution-Based Algorithm for Breaking the Visual Steganalytic System
Chapter 14 Genetic Algorithm-Based Methodology for Breaking the Steganalytic Systems
PART IV Forensics
Chapter 15 Image Inpainting Using an Enhanced Exemplar-Based Algorithm
Chapter 16 A Comparison Study on Copy-Cover Image Forgery Detection
Chapter 17 Chaos-Based Hash Function with Both Modification Detection and Localization Capabilities
Chapter 18 Video Forensics
Chapter 19 Using the Self-Synchronizing Method to Improve Security of the Multi-Chaotic Systems-Based Image Encryption
Chapter 20 Behavior Modeling of Human Objects in Multimedia Content
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Chapter 14 Genetic Algorithm-Based Methodology for Breaking the Steganalytic Systems
Next
Next Chapter
Chapter 15 Image Inpainting Using an Enhanced Exemplar-Based Algorithm
Part IV
Forensics
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset