Robust Image Authentication in the Presence of Noise

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compared and, furthermore, innovative approaches and algorithms are introduced. The introduced algorithms are applied to improve image authentication, watermarking and biometry.

Aside from presenting new directions and algorithms for robust image authentication in the presence of noise, as well as image correction, this book also:

  • Provides an overview of the state of the art algorithms for image authentication in the presence of noise and modifications, as well as a comparison of these algorithms,
  • Presents novel algorithms for robust image authentication, whereby the image is tried to be corrected and authenticated,
  • Examines different views for the solution of problems connected to image authentication in the presence of noise,
  • Shows examples, how the new techniques can be applied to image authentication, watermarking and biometry.
This book is written on the one hand for students, who want to learn about image processing, authentication, watermarking and biometry, and on the other hand for engineers and researchers, who work on aspects of robustness against modifications of secure images.

Author(s): Nataša Živić (eds.)
Edition: 1
Publisher: Springer International Publishing
Year: 2015

Language: English
Pages: 187
Tags: Signal, Image and Speech Processing; Multimedia Information Systems; Communications Engineering, Networks

Front Matter....Pages i-xv
Hash-Based Authentication of Digital Images in Noisy Channels....Pages 1-42
Watermarking for Image Authentication....Pages 43-73
Perceptual Image Hashing Technique for Image Authentication in WMSNs....Pages 75-103
A Review of Approximate Message Authentication Codes....Pages 105-127
Fuzzy Image Authentication with Error Localization and Correction....Pages 129-154
Robustness of Biometrics by Image Processing Technology....Pages 155-187