HOME > 상세정보

상세정보

Robust image authentication in the presence of noise [electronic resource]

Robust image authentication in the presence of noise [electronic resource]

자료유형
E-Book(소장)
개인저자
Živić, Nataša.
서명 / 저자사항
Robust image authentication in the presence of noise [electronic resource] / Nataša Živić, editor.
발행사항
Cham :   Springer International Publishing :   Imprint: Springer,   2015.  
형태사항
1 online resource (xv, 187 p.) : ill. (some col.).
ISBN
9783319131566
요약
This book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compared and, furthermore, innovative approaches and algorithms are introduced. The introduced algorithms are applied to improve image authentication, watermarking and biometry.    Aside from presenting new directions and algorithms for robust image authentication in the presence of noise, as well as image correction, this book also:   Provides an overview of the state of the art algorithms for image authentication in the presence of noise and modifications, as well as a comparison of these algorithms, Presents novel algorithms for robust image authentication, whereby the image is tried to be corrected and authenticated, Examines different views for the solution of problems connected to image authentication in the presence of noise, Shows examples, how the new techniques can be applied to image authentication, watermarking and biometry. This book is written on the one hand for students, who want to learn about image processing, authentication, watermarking and biometry, and on the other hand for engineers and researchers, who work on aspects of robustness against modifications of secure images.
일반주기
Title from e-Book title page.  
내용주기
Introduction -- Watermarking for Image Authentication -- Perceptual image hashing technique for image authentication in WMSNs -- A Review of Approximate Message Authentication Codes -- Fuzzy Image Authentication with Error Localization and Correction -- Robustness of Biometrics by Image Processing Technology.
서지주기
Includes bibliographical references.
이용가능한 다른형태자료
Issued also as a book.  
일반주제명
Engineering. Image transmission. Digital signatures. Electronic noise. Robust control.
바로가기
URL
000 00000nam u2200205 a 4500
001 000046035425
005 20200716104809
006 m d
007 cr
008 200702s2015 sz a ob 000 0 eng d
020 ▼a 9783319131566
040 ▼a 211009 ▼c 211009 ▼d 211009
050 4 ▼a TK5102.9
082 0 4 ▼a 006.3/7 ▼2 23
084 ▼a 006.37 ▼2 DDCK
090 ▼a 006.37
245 0 0 ▼a Robust image authentication in the presence of noise ▼h [electronic resource] / ▼c Nataša Živić, editor.
260 ▼a Cham : ▼b Springer International Publishing : ▼b Imprint: Springer, ▼c 2015.
300 ▼a 1 online resource (xv, 187 p.) : ▼b ill. (some col.).
500 ▼a Title from e-Book title page.
504 ▼a Includes bibliographical references.
505 0 ▼a Introduction -- Watermarking for Image Authentication -- Perceptual image hashing technique for image authentication in WMSNs -- A Review of Approximate Message Authentication Codes -- Fuzzy Image Authentication with Error Localization and Correction -- Robustness of Biometrics by Image Processing Technology.
520 ▼a This book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compared and, furthermore, innovative approaches and algorithms are introduced. The introduced algorithms are applied to improve image authentication, watermarking and biometry.    Aside from presenting new directions and algorithms for robust image authentication in the presence of noise, as well as image correction, this book also:   Provides an overview of the state of the art algorithms for image authentication in the presence of noise and modifications, as well as a comparison of these algorithms, Presents novel algorithms for robust image authentication, whereby the image is tried to be corrected and authenticated, Examines different views for the solution of problems connected to image authentication in the presence of noise, Shows examples, how the new techniques can be applied to image authentication, watermarking and biometry. This book is written on the one hand for students, who want to learn about image processing, authentication, watermarking and biometry, and on the other hand for engineers and researchers, who work on aspects of robustness against modifications of secure images.
530 ▼a Issued also as a book.
538 ▼a Mode of access: World Wide Web.
650 0 ▼a Engineering.
650 0 ▼a Image transmission.
650 0 ▼a Digital signatures.
650 0 ▼a Electronic noise.
650 0 ▼a Robust control.
700 1 ▼a Živić, Nataša.
856 4 0 ▼u https://oca.korea.ac.kr/link.n2s?url=http://dx.doi.org/10.1007/978-3-319-13156-6
945 ▼a KLPA
991 ▼a E-Book(소장)

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 중앙도서관/e-Book 컬렉션/ 청구기호 CR 006.37 등록번호 E14026504 도서상태 대출불가(열람가능) 반납예정일 예약 서비스 M

관련분야 신착자료

양성봉 (2025)