logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Steganography Techniques For Digital Images 1st Edition Abid Yahya

  • SKU: BELL-146595586
Steganography Techniques For Digital Images 1st Edition Abid Yahya
$ 31.00 $ 45.00 (-31%)

4.3

98 reviews

Steganography Techniques For Digital Images 1st Edition Abid Yahya instant download after payment.

Publisher: Springer
File Extension: EPUB
File size: 15.79 MB
Pages: 131
Author: Abid Yahya
ISBN: 9783319785974, 3319785974
Language: English
Year: 2018
Edition: 1

Product desciption

Steganography Techniques For Digital Images 1st Edition Abid Yahya by Abid Yahya 9783319785974, 3319785974 instant download after payment.

This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding. Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption; Provides a variety of methods to achieve characteristic region Steganography synchronization; Shows how Steganography improves upon cryptography by using obscurity features.

Related Products