Robust Image Authentication in the Presence of Noise - Nataša Živi?

Robust Image Authentication in the Presence of Noise

By: Nataša Živi? (Editor)

eText | 6 April 2015

At a Glance

eText


$159.01

or 4 interest-free payments of $39.75 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Read online on
Desktop
Tablet
Mobile

Not downloadable to your eReader or an app

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

This book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compared and, furthermore, innovative approaches and algorithms are introduced. The introduced algorithms are applied to improve image authentication, watermarking and biometry.

Aside from presenting new directions and algorithms for robust image authentication in the presence of noise, as well as image correction, this book also:

  • Provides an overview of the state of the art algorithms for image authentication in the presence of noise and modifications, as well as a comparison of these algorithms,
  • Presents novel algorithms for robust image authentication, whereby the image is tried to be corrected and authenticated,
  • Examines different views for the solution of problems connected to image authentication in the presence of noise,
  • Shows examples, how the new techniques can be applied to image authentication, watermarking and biometry.

This book is written on the one hand for students, who want to learn about image processing, authentication, watermarking and biometry, and on the other hand for engineers and researchers, who work on aspects of robustness against modifications of secure images.

Read online on
Desktop
Tablet
Mobile

More in Graphical & Digital Media Applications