000 | 03364nam a22005055i 4500 | ||
---|---|---|---|
001 | 978-3-319-13156-6 | ||
003 | DE-He213 | ||
005 | 20200421111701.0 | ||
007 | cr nn 008mamaa | ||
008 | 150406s2015 gw | s |||| 0|eng d | ||
020 |
_a9783319131566 _9978-3-319-13156-6 |
||
024 | 7 |
_a10.1007/978-3-319-13156-6 _2doi |
|
050 | 4 | _aTK5102.9 | |
050 | 4 | _aTA1637-1638 | |
050 | 4 | _aTK7882.S65 | |
072 | 7 |
_aTTBM _2bicssc |
|
072 | 7 |
_aUYS _2bicssc |
|
072 | 7 |
_aTEC008000 _2bisacsh |
|
072 | 7 |
_aCOM073000 _2bisacsh |
|
082 | 0 | 4 |
_a621.382 _223 |
245 | 1 | 0 |
_aRobust Image Authentication in the Presence of Noise _h[electronic resource] / _cedited by Nataša Živić. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2015. |
|
300 |
_aXV, 187 p. 79 illus., 33 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aIntroduction -- Watermarking for Image Authentication -- Perceptual image hashing technique for image authentication in WMSNs -- A Review of Approximate Message Authentication Codes -- Fuzzy Image Authentication with Error Localization and Correction -- Robustness of Biometrics by Image Processing Technology. | |
520 | _aThis book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compared and, furthermore, innovative approaches and algorithms are introduced. The introduced algorithms are applied to improve image authentication, watermarking and biometry. Aside from presenting new directions and algorithms for robust image authentication in the presence of noise, as well as image correction, this book also: Provides an overview of the state of the art algorithms for image authentication in the presence of noise and modifications, as well as a comparison of these algorithms, Presents novel algorithms for robust image authentication, whereby the image is tried to be corrected and authenticated, Examines different views for the solution of problems connected to image authentication in the presence of noise, Shows examples, how the new techniques can be applied to image authentication, watermarking and biometry. This book is written on the one hand for students, who want to learn about image processing, authentication, watermarking and biometry, and on the other hand for engineers and researchers, who work on aspects of robustness against modifications of secure images. | ||
650 | 0 | _aEngineering. | |
650 | 0 | _aMultimedia information systems. | |
650 | 0 | _aElectrical engineering. | |
650 | 1 | 4 | _aEngineering. |
650 | 2 | 4 | _aSignal, Image and Speech Processing. |
650 | 2 | 4 | _aMultimedia Information Systems. |
650 | 2 | 4 | _aCommunications Engineering, Networks. |
700 | 1 |
_aŽivić, Nataša. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319131559 |
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-13156-6 |
912 | _aZDB-2-ENG | ||
942 | _cEBK | ||
999 |
_c54998 _d54998 |