Contents

Preface

Acknowledgments

Editor

Contributors

PART I    Multimedia Mining and Classification

Chapter 1    Multimedia Duplicate Mining toward Knowledge Discovery

Xiaomeng Wu, Sebastien Poullot, and Shin’ichi Satoh

Chapter 2    Discriminative Learning-Assisted Video Semantic Concept Classification

Qiusha Zhu, Mei-Ling Shyu, and Shu-Ching Chen

Chapter 3    Improved Feature Vocabulary-Based Method for Image Categorization

Frank Y. Shih and Alexander Sheppard

PART II    Watermarking

Chapter 4    Automatic Detection and Removal of Visible Image Watermarks

Hong-Ren Su, Ya-Yun Cheng, and Shang-Hong Lai

Chapter 5    Digital Watermarking Based on Chaotic Map and Reference Register

Yi-Ta Wu and Frank Y. Shih

Chapter 6    Pseudo-Random Pixel Rearrangement Algorithm Based on Gaussian Integers for Image Watermarking

Aleksey Koval, Frank Y. Shih, and Boris S. Verkhovsky

Chapter 7    Reversible Data-Hiding Techniques for Digital Images

Zhi-Hui Wang, Ming-Ting Sun, and Chin-Chen Chang

Chapter 8    Watermarking Based on Local Binary Pattern Operators

Wenyin Zhang and Frank Y. Shih

Chapter 9    Authentication of JPEG Images Based on Genetic Algorithms

Venkata Gopal Edupuganti and Frank Y. Shih

Chapter 10  An Efficient Block-Based Fragile Watermarking System for Tamper Localization and Recovery

Venkata Gopal Edupuganti, Frank Y. Shih, and I-Cheng Chang

PART III    Steganography

Chapter 11  Survey of Image Steganography and Steganalysis

Mayra Bachrach and Frank Y. Shih

Chapter 12  Digital Steganographic Schemes Based on Image Vector Quantization

Shinfeng D. Lin and Shih-Chieh Shie

Chapter 13  Differential Evolution-Based Algorithm for Breaking the Visual Steganalytic System

Frank Y. Shih and Venkata Gopal Edupuganti

Chapter 14  Genetic Algorithm-Based Methodology for Breaking the Steganalytic Systems

Yi-Ta Wu and Frank Y. Shih

PART IV    Forensics

Chapter 15  Image Inpainting Using an Enhanced Exemplar-Based Algorithm

I-Cheng Chang and Chia-We Hsu

Chapter 16  A Comparison Study on Copy-Cover Image Forgery Detection

Frank Y. Shih and Yuan Yuan

Chapter 17  Chaos-Based Hash Function with Both Modification Detection and Localization Capabilities

Di Xiao, Frank Y. Shih, and Xiaofeng Liao

Chapter 18  Video Forensics

Hsiao-Rong Tyan and Hong-Yuan Mark Liao

Chapter 19  Using the Self-Synchronizing Method to Improve Security of the Multi-Chaotic Systems-Based Image Encryption

Di Xiao and Frank Y. Shih

Chapter 20  Behavior Modeling of Human Objects in Multimedia Content

Yafeng Yin and Hong Man

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
52.15.214.27