Coverart for item
The Resource Robust Image Authentication in the Presence of Noise

Robust Image Authentication in the Presence of Noise

Label
Robust Image Authentication in the Presence of Noise
Title
Robust Image Authentication in the Presence of Noise
Creator
Subject
Language
eng
Cataloging source
MiAaPQ
Literary form
non fiction
Nature of contents
dictionaries
Robust Image Authentication in the Presence of Noise
Label
Robust Image Authentication in the Presence of Noise
Link
http://libproxy.rpi.edu/login?url=https://ebookcentral.proquest.com/lib/rpi/detail.action?docID=3109312
Publication
Copyright
Related Contributor
Related Location
Related Agents
Related Authorities
Related Subjects
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Preface -- Contents -- Contributors -- Chapter 1 Hash-Based Authentication of Digital Images in Noisy Channels -- 1.1 Introduction -- 1.1.1 Basic Requirements of Data Security -- 1.1.2 Multimedia Security -- 1.1.3 Image Hash -- 1.1.4 Basic Requirements of Image Hashing -- 1.2 Review of Image Hashing Schemes -- 1.2.1 Statistic-Based Schemes -- 1.2.2 Relation-Based Schemes -- 1.2.3 Coarse Representation-Based Schemes -- 1.2.4 Matrix-Based Schemes -- 1.2.5 Low-Level Feature-Based Schemes -- 1.3 Illustration of an Image Hashing Scheme -- 1.3.1 Hash Generation Module -- 1.3.2 Image Verification Module -- 1.4 Reducing Size of Image Hash Using Quantization -- 1.4.1 Hash Generation Using 3-Bit Quantization -- 1.4.2 Image Verification Using 3-Bit Quantization -- 1.4.3 3-Bit Quantization Example -- 1.4.4 A 4-Bit Quantization Scheme -- 1.4.4.1 Hash Generation Using 4-Bit Quantization -- 1.4.4.2 Image Verification Using 4-Bit Quantization -- 1.4.4.3 Reduction in Hash Size Due to 4-Bit Quantization -- 1.4.4.4 Effect on Robustness and Tamper Detection Due to 4-Bit Quantization -- 1.5 Performance Evaluation -- 1.5.1 The Effect of Beta (Ý) on Hash Collision -- 1.5.2 Robustness to Channel Noise and JPEG Compression -- 1.5.3 Threshold Selection -- 1.5.4 Detection of Tampering -- 1.5.5 The Receiver Operating Characteristic Curve -- 1.5.6 Hash Size -- 1.6 Security Analysis -- 1.6.1 The Impact of Randomized Pixel Modulation on System's Security -- 1.6.2 Statistical Analysis -- 1.6.3 Effect of Secret Key on the Hash -- 1.6.4 Probability of Hash Collision -- 1.6.5 Quantization and System's Security -- 1.7 Conclusion -- References -- Chapter 2 Watermarking for Image Authentication -- 2.1 The Basis of Watermarking -- 2.2 Classification -- 2.2.1 Perceptibility -- 2.2.2 Detection Types -- 2.2.3 System Platform -- 2.2.4 Image Compression -- 2.2.5 Embedding Domain
  • 2.2.5.1 LSB -- 2.2.5.2 SS -- 2.2.5.3 DCT -- 2.2.5.4 DWT -- 2.2.6 Robustness -- 2.2.7 Lossless -- 2.3 Requirements of Watermarking -- 2.3.1 Fidelity -- 2.3.2 Capacity -- 2.3.3 Robustness -- 2.3.4 Security -- 2.3.4.1 Malicious Attacks -- 2.3.4.2 Incidental Attack -- 2.3.4.3 Secret Key -- 2.3.5 Tamper Detection, Location, and Recovery -- 2.4 A Watermarking Algorithm for Image Authentication -- 2.4.1 Watermark Design -- 2.4.1.1 Feature Extraction -- 2.4.1.2 Watermark Embedding Approach -- 2.4.2 An Example Design Case -- 2.4.2.1 Goals -- 2.4.2.2 Hybrid Feature Watermark Generation -- 2.4.2.3 Watermark Embedding -- 2.4.2.4 Watermark Extraction and Authentication Procedure -- References -- Chapter 3 Perceptual Image Hashing Technique for Image Authentication in WMSNs -- 3.1 Introduction -- 3.2 High Level Requirements for Image Authenticationin WMSNs -- 3.3 Previous Works on Data Authentication in WMSNs -- 3.4 Perceptual Image Hashing -- 3.4.1 Basic Concept -- 3.4.2 Desirable Properties -- 3.4.2.1 Perceptual Robustness -- 3.4.2.2 Fragility to Visual Distinct Image -- 3.4.2.3 Unpredictability of the Hash -- 3.5 Content Based Image Authentication Using Perceptual Image Hashing Technique -- 3.5.1 Image Statistics Based Approach -- 3.5.2 Relation Based Approach -- 3.5.3 Coarse Image Representation Based Approach -- 3.5.4 Low-level Image Representation Based Approach -- 3.6 Experiment Results -- 3.6.1 Robustness -- 3.6.2 Discriminability -- 3.6.3 Security -- 3.7 Conclusion -- References -- Chapter 4 A Review of Approximate Message Authentication Codes -- 4.1 Introduction -- 4.1.1 Definitions and Notations -- 4.2 Dedicated AMAC Schemes -- 4.2.1 Majority-Based AMACs -- 4.2.1.1 Shifting Attack -- 4.2.1.2 Security Enhancement -- 4.2.1.3 Analysis of the Majority-Based AMACs -- 4.2.2 Noise Tolerant Message Authentication Codes (NTMACs)
  • 4.2.2.1 Analysis of the NTMAC-Based AMACs -- 4.2.3 AMACs Based on Computational Security -- 4.2.3.1 Analysis of the Computational Security Based AMACs -- 4.2.4 Unconditionally Secure AMAC -- 4.2.4.1 Analysis of Unconditionally Secure AMAC -- 4.2.5 Comparison -- 4.3 Applications of Dedicated AMACs in Image Authentication Techniques -- 4.3.1 Extension of the MAJORITY-Based AMACs and the NTMACs -- 4.3.2 Extension of AMAC1 and AMAC2 -- 4.4 Conclusion -- References -- Chapter 5 Fuzzy Image Authentication with Error Localization and Correction -- 5.1 Introduction -- 5.2 Building Blocks of the Fuzzy Image Authentication Algorithms -- 5.2.1 Content Based Authentication -- 5.2.2 Discrete Cosine Transform -- 5.2.3 Error Correcting Codes -- 5.2.3.1 Error Correcting Codes in Image Authentication -- 5.2.3.2 Reed--Solomon Codes -- 5.2.3.3 Turbo Codes -- 5.3 Applications of Error Correcting Codes in Image Authentication -- 5.4 Fuzzy Image Authentication Codes with Error Localization and Correction -- 5.4.1 Fuzzy Authentication Based on Image Features -- 5.4.2 Image Error Correcting Column-Wise Message Authentication Code (IECC-MAC) -- 5.4.3 Image Error Correction Noise Tolerant Message Authentication Code (IEC-NTMAC) -- 5.5 Performance and Security Analysis of the Proposed Fuzzy Authentication Algorithms -- 5.5.1 Performance Study -- 5.5.2 Security Analysis -- 5.6 Simulation Results -- 5.6.1 Simulation Parameters -- 5.6.2 Data Rate Analysis -- 5.6.3 Simulation Results for IECC-MAC -- 5.6.4 Simulation Results Using IEC-NTMAC -- 5.6.5 Image Error Rate (IER) -- References -- Chapter 6 Robustness of Biometrics by Image Processing Technology -- 6.1 Introduction -- 6.2 Pattern Recognition and Biometric Authentication -- 6.2.1 Pattern Recognition Systems -- 6.2.2 Affine Invariant Pattern Recognition -- 6.2.2.1 The Problem of Affine Invariant Pattern Recognition
  • 6.2.2.2 Alignment-Free Features -- 6.2.3 Biometric Authentication -- 6.2.3.1 Biometric Systems -- 6.2.3.2 Template Protection -- 6.2.3.3 Fingerprint Recognition -- 6.2.3.4 Vein Pattern Recognition -- 6.3 Feature Extraction in Fingerprint Biometrics -- 6.3.1 Global Features -- 6.3.2 Minutiae Based Feature Extraction -- 6.3.2.1 General -- 6.3.2.2 Minutiae Detection -- 6.3.2.3 Minutiae Description -- 6.3.3 Image Based Feature Extraction -- 6.3.3.1 Image Based Feature Detection -- 6.3.3.2 Image-Based Feature Description -- 6.4 A Comparison of Alignment-Free Biometric Systems -- 6.4.1 Global Methods -- 6.4.2 Image Based Methods -- 6.4.3 Minutiae-Based Methods -- 6.4.4 Summary -- 6.5 An Evaluation Strategy for Local Features -- 6.5.1 Evaluation of Local Feature Extractors -- 6.5.2 Repeatability -- 6.5.3 1-Precision-Recall -- 6.6 Conclusion -- References
http://library.link/vocab/cover_art
https://contentcafe2.btol.com/ContentCafe/Jacket.aspx?Return=1&Type=S&Value=9783319131566&userID=ebsco-test&password=ebsco-test
Dimensions
unknown
http://library.link/vocab/discovery_link
{'f': 'http://opac.lib.rpi.edu/record=b4383709'}
Extent
1 online resource (197 pages)
Form of item
online
Isbn
9783319131566
Media category
computer
Media MARC source
rdamedia
Media type code
c
Sound
unknown sound
Specific material designation
remote

Library Locations

    • Folsom LibraryBorrow it
      110 8th St, Troy, NY, 12180, US
      42.729766 -73.682577
Processing Feedback ...