Steganography Techniques for Digital Images
This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding.



• Applies and discusses innovative techniques for hiding text in a digital image fileor even using it as a key to the encryption;

• Provides a variety of methods to achieve characteristic region Steganography synchronization;

• Shows how Steganography improves upon cryptography by using obscurity features.

1133669678
Steganography Techniques for Digital Images
This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding.



• Applies and discusses innovative techniques for hiding text in a digital image fileor even using it as a key to the encryption;

• Provides a variety of methods to achieve characteristic region Steganography synchronization;

• Shows how Steganography improves upon cryptography by using obscurity features.

129.99 In Stock
Steganography Techniques for Digital Images

Steganography Techniques for Digital Images

by Abid Yahya
Steganography Techniques for Digital Images

Steganography Techniques for Digital Images

by Abid Yahya

Paperback(Softcover reprint of the original 1st ed. 2019)

$129.99 
  • SHIP THIS ITEM
    In stock. Ships in 6-10 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding.



• Applies and discusses innovative techniques for hiding text in a digital image fileor even using it as a key to the encryption;

• Provides a variety of methods to achieve characteristic region Steganography synchronization;

• Shows how Steganography improves upon cryptography by using obscurity features.


Product Details

ISBN-13: 9783030132637
Publisher: Springer International Publishing
Publication date: 08/24/2019
Edition description: Softcover reprint of the original 1st ed. 2019
Pages: 122
Product dimensions: 6.10(w) x 9.25(h) x (d)

About the Author

Professor Dr. Abid Yahya began his career on an engineering path that is rare among other Researcher executives and earned his MSc and PhD degree in Wireless & Mobile systems from the Universiti Sains Malaysia, Malaysia. Currently, he is working at Botswana International University of Science & Technology. He has applied this combination of practical and academic experience to a variety of consultancies for major corporations.

He has over 115 research publications to his credit in numerous reputable journals, conference articles and book chapters. He has received several awards and grants from various funding agencies and supervised number of PhD and Master Candidates. His new book “LTE-A Cellular Networks: Multi-hop Relay for Coverage, Capacity and Performance Enhancement” has been published by Springer International Publishing Switzerland in January 2017 and is being followed in national and international universities.

Prof. Abid Yahya was assigned as an external and internal examiner for postgraduate students. He was invited number of times as a speaker and visiting lecturer at different multinational companies. He sits on various panels with the Government and other industry related panels of study.

Prof. Abid Yahya rewarding field research and his academic coursework, made a strong contribution to different research centers. During his work experience, he had collaborated with several international Universities and companies.

Table of Contents

Chapter1: Introduction to steganography.- Chapter2: Steganography techniques.- Chapter3: Characteristic region-based image steganography.- Chapter4: An enhanced robust and protected image steganographic system.- Chapter5: Conclusion towards hidden communication.

From the B&N Reads Blog

Customer Reviews