Robust Image Authentication in the Presence of Noise

Nonfiction, Computers, Application Software, Multimedia, Science & Nature, Technology, Electronics
Cover of the book Robust Image Authentication in the Presence of Noise by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319131566
Publisher: Springer International Publishing Publication: April 6, 2015
Imprint: Springer Language: English
Author:
ISBN: 9783319131566
Publisher: Springer International Publishing
Publication: April 6, 2015
Imprint: Springer
Language: English

This book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compared and, furthermore, innovative approaches and algorithms are introduced. The introduced algorithms are applied to improve image authentication, watermarking and biometry.

Aside from presenting new directions and algorithms for robust image authentication in the presence of noise, as well as image correction, this book also:

  • Provides an overview of the state of the art algorithms for image authentication in the presence of noise and modifications, as well as a comparison of these algorithms,
  • Presents novel algorithms for robust image authentication, whereby the image is tried to be corrected and authenticated,
  • Examines different views for the solution of problems connected to image authentication in the presence of noise,
  • Shows examples, how the new techniques can be applied to image authentication, watermarking and biometry.

This book is written on the one hand for students, who want to learn about image processing, authentication, watermarking and biometry, and on the other hand for engineers and researchers, who work on aspects of robustness against modifications of secure images.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compared and, furthermore, innovative approaches and algorithms are introduced. The introduced algorithms are applied to improve image authentication, watermarking and biometry.

Aside from presenting new directions and algorithms for robust image authentication in the presence of noise, as well as image correction, this book also:

This book is written on the one hand for students, who want to learn about image processing, authentication, watermarking and biometry, and on the other hand for engineers and researchers, who work on aspects of robustness against modifications of secure images.

More books from Springer International Publishing

Cover of the book Advances in The Human Side of Service Engineering by
Cover of the book Beyond Bureaucracy by
Cover of the book Lévy Matters IV by
Cover of the book Multidisciplinary Approaches to Neural Computing by
Cover of the book Clinical Cases in Integrative Dermatology by
Cover of the book PET/MR Imaging: Current and Emerging Applications by
Cover of the book Integral Methods in Science and Engineering, Volume 2 by
Cover of the book Satureja: Ethnomedicine, Phytochemical Diversity and Pharmacological Activities by
Cover of the book Collective Rights and Digital Content by
Cover of the book Cyber Physical Systems. Design, Modeling, and Evaluation by
Cover of the book Non-Pharmacological Management of Osteoporosis by
Cover of the book Hyperelasticity Primer by
Cover of the book Continuum Mechanics through the Ages - From the Renaissance to the Twentieth Century by
Cover of the book Automation Control Theory Perspectives in Intelligent Systems by
Cover of the book Directed Algebraic Topology and Concurrency by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy