Get Free Shipping on orders over $89
Reversible Steganography and Authentication via Transform Encoding : Intelligent Technologies and Robotics (R0) - Jyotsna Kumar Mandal

Reversible Steganography and Authentication via Transform Encoding

By: Jyotsna Kumar Mandal

eText | 1 June 2020

At a Glance

eText


$249.00

or 4 interest-free payments of $62.25 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

This book focuses on reversible steganography and authentication via transform encoding, fully discussing in detail the reversibility computation of six transformation techniques: DFT, DCT, wavelets, Z, binomial and grouplet, as well as chaos-based authentication. The book also describes algorithmic approaches based on all transformations along with implementation details and results. Further topics include embedding and extraction into the spatial domain, tuning using GA-based approaches and embedding into imaginary coefficients of the Z domain.

Featuring detailed algorithms for encryption and descriptions of all techniques, including embedding techniques for all transform-based steganographic processes, the book also explores the adjustment of pixel values after embedding and presents numerical examples of reversible computations. In the context of chaos-based authentication, it also describes testing the quality of generator is using Monobit, Serial and Poker tests. The book then outlines 15 test cases recommended by NIST fifteen test cases, along with their implementation on six evolutionary algorithms for neural cryptographic systems in the context of wireless computations - TPM, KSOMSCT, DHLPSCT, CHDLPSCT, CTHLPSCT and CGTHLPSCT - and verifies their satisfiability based on the implementations of these six techniques. Lastly it presents various metrics of image processing systems.

This book is a valuable reference resource for research scholars, PG/UG students and practicing engineers

on
Desktop
Tablet
Mobile

More in Engineering in General

SAFE : Science and Technology in the Age of Ter - Martha Baer

eBOOK

The Shabby Chic Home - Rachel Ashwell

eBOOK

Shabby Chic - Rachel Ashwell

eBOOK

$13.99

Star Commercial Spaces - Julio Fajardo

eBOOK