Robust Image Authentication in the Presence of Noise

Nonfiction, Computers, Application Software, Multimedia, Science & Nature, Technology, Electronics
Cover of the book Robust Image Authentication in the Presence of Noise by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319131566
Publisher: Springer International Publishing Publication: April 6, 2015
Imprint: Springer Language: English
Author:
ISBN: 9783319131566
Publisher: Springer International Publishing
Publication: April 6, 2015
Imprint: Springer
Language: English

This book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compared and, furthermore, innovative approaches and algorithms are introduced. The introduced algorithms are applied to improve image authentication, watermarking and biometry.

Aside from presenting new directions and algorithms for robust image authentication in the presence of noise, as well as image correction, this book also:

  • Provides an overview of the state of the art algorithms for image authentication in the presence of noise and modifications, as well as a comparison of these algorithms,
  • Presents novel algorithms for robust image authentication, whereby the image is tried to be corrected and authenticated,
  • Examines different views for the solution of problems connected to image authentication in the presence of noise,
  • Shows examples, how the new techniques can be applied to image authentication, watermarking and biometry.

This book is written on the one hand for students, who want to learn about image processing, authentication, watermarking and biometry, and on the other hand for engineers and researchers, who work on aspects of robustness against modifications of secure images.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compared and, furthermore, innovative approaches and algorithms are introduced. The introduced algorithms are applied to improve image authentication, watermarking and biometry.

Aside from presenting new directions and algorithms for robust image authentication in the presence of noise, as well as image correction, this book also:

This book is written on the one hand for students, who want to learn about image processing, authentication, watermarking and biometry, and on the other hand for engineers and researchers, who work on aspects of robustness against modifications of secure images.

More books from Springer International Publishing

Cover of the book Interdisciplinary Perspectives on Trust by
Cover of the book Logic Programming and Nonmonotonic Reasoning by
Cover of the book Landed Estates and Rural Inequality in English History by
Cover of the book Statecraft and Liberal Reform in Advanced Democracies by
Cover of the book Subsidies in the Context of the WTO's Free Trade System by
Cover of the book Spatial Cognition X by
Cover of the book Human-Computer Interaction - INTERACT 2017 by
Cover of the book Perturbative and Non-perturbative Approaches to String Sigma-Models in AdS/CFT by
Cover of the book Vasovagal Syncope by
Cover of the book Treating Opioid Addiction by
Cover of the book Mathematical and Engineering Methods in Computer Science by
Cover of the book Communicable Diseases of the Developing World by
Cover of the book Epistemic Virtues in the Sciences and the Humanities by
Cover of the book Traumatic Memory and the Ethical, Political and Transhistorical Functions of Literature by
Cover of the book Leadership and Role Modelling by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy