Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Reversible Steganography and Authentication via Transform Encoding

Best Price (Coupon Required):
Buy Reversible Steganography and Authentication via Transform Encoding for $125.10 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $139.00 - $139.00
BEST PRICE

Single Product Purchase

$125.10
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$139.00 $139.00

10% OFF
This deals requires coupon
$125.10
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9789811543968
Condition
New
Product Description

This book focuses on reversible steganography and authentication via transform encoding, fully discussing in detail the reversibility computation of six transformation techniques: DFT, DCT, wavelets, Z, binomial and grouplet, as well as chaos-based authentication. The book also describes algorithmic approaches based on all transformations along with implementation details and results. Further topics include embedding and extraction into the spatial domain, tuning using GA-based approaches and embedding into imaginary coefficients of the Z domain. Featuring detailed algorithms for encryption and descriptions of all techniques, including embedding techniques for all transform-based steganographic processes, the book also explores the adjustment of pixel values after embedding and presents numerical examples of reversible computations. In the context of chaos-based authentication, it also describes testing the quality of generator is using Monobit, Serial and Poker tests. The book then outlines 15 test cases recommended by NIST fifteen test cases, along with their implementation on six evolutionary algorithms for neural cryptographic systems in the context of wireless computations TPM, KSOMSCT, DHLPSCT, CHDLPSCT, CTHLPSCT and CGTHLPSCT and verifies their satisfiability based on the implementations of these six techniques. Lastly it presents various metrics of image processing systems. This book is a valuable reference resource for research scholars, PG/UG students and practicing engineers.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Social Justice in Practice

Social Justice in Practice

$109.99
Die Abhngigkeit des norddeutschen Eisenbahnnetzes von der Gelndegestaltung

Die Abhngigkeit des norddeutschen Eisenbahnnetzes von der Gelndegestaltung

$44.99
Information Security Practice and Experience

Information Security Practice and Experience

$54.99
Musikcomputer - Computermusik

Musikcomputer - Computermusik

$69.99
LEGO MINDSTORMS NXT 2.0

LEGO MINDSTORMS NXT 2.0

$19.99
Law and Semiotics

Law and Semiotics

$84.99
Politics in Software Development

Politics in Software Development

$37.99
Wooden Domes

Wooden Domes

$109.99
Brgerschaftliches Engagement und Erwerbsarbeit

Brgerschaftliches Engagement und Erwerbsarbeit

$64.99
Period Mappings with Applications to Symplectic Complex Spaces

Period Mappings with Applications to Symplectic Complex Spaces

$39.99
Auxin and Its Role in Plant Development

Auxin and Its Role in Plant Development

$169.99
Early Diagnosis and Preventive Therapy in Parkinsons Disease

Early Diagnosis and Preventive Therapy in Parkinsons Disease

$54.99
Kompendium der Psychiatrischen Pharmakotherapie

Kompendium der Psychiatrischen Pharmakotherapie

$69.99
Frischer Wind in der Fabrik

Frischer Wind in der Fabrik

$69.99
Rational and Applied Mechanics

Rational and Applied Mechanics

$99.99
Femorale Revisionsendoprothetik

Femorale Revisionsendoprothetik

$99.99
Higher Education Leadership Strategy in the Public Affairs Triumvirate

Higher Education Leadership Strategy in the Public Affairs Triumvirate

$64.99
Clinical Ophthalmic Oncology

Clinical Ophthalmic Oncology

$109.99
Green Approaches To Asymmetric Catalytic Synthesis

Green Approaches To Asymmetric Catalytic Synthesis

$49.95
Hochschul-PR in Deutschland

Hochschul-PR in Deutschland

$64.99
Strafrechtliche Produktverantwortung bei Arzneimittelschden

Strafrechtliche Produktverantwortung bei Arzneimittelschden

$99.99
Anesthesiology

Anesthesiology

$199.99
Ruby and the Booker Boys: Trivia Queen, 3rd Grade Supreme

Ruby and the Booker Boys: Trivia Queen, 3rd Grade Supreme

$4.49
National Strategies to Harness Information Technology

National Strategies to Harness Information Technology

$109.99
Trkeistmmige Eigentmer in Migrantenvierteln

Trkeistmmige Eigentmer in Migrantenvierteln

$64.99
Fault-Tolerant Distributed Computing

Fault-Tolerant Distributed Computing

$39.99
NanoCarbon 2011

NanoCarbon 2011

$109.99
Die britische Europapolitik zwischen imperialem Mandat und innerer Reform 18561876

Die britische Europapolitik zwischen imperialem Mandat und innerer Reform 18561876

$39.99
Contemporary Management of Temporomandibular Disorders

Contemporary Management of Temporomandibular Disorders

$119.00
Dynamic Factor Demand in a Rationing Context

Dynamic Factor Demand in a Rationing Context

$109.99
Water, State and the City

Water, State and the City

$54.99
Relativistische Quantentheorie

Relativistische Quantentheorie

$54.99
The Influence Line Approach to the Analysis of Rigid Frames

The Influence Line Approach to the Analysis of Rigid Frames

$109.99
Prostatitis and Its Management

Prostatitis and Its Management

$54.99
Lehrbuch der Chemie und Mineralogie

Lehrbuch der Chemie und Mineralogie

$59.99
Die Selbstanzeige

Die Selbstanzeige

$44.99
Jugendliche im Spannungsfeld von Schule und Lebenswelt

Jugendliche im Spannungsfeld von Schule und Lebenswelt

$64.99
Ayatollah Khomeini Through the Lens of the Iran-Iraq War

Ayatollah Khomeini Through the Lens of the Iran-Iraq War

$109.00
Sealing of Boreholes and Underground Excavations in Rock

Sealing of Boreholes and Underground Excavations in Rock

$169.00
Using MVVM Light with your Xamarin Apps

Using MVVM Light with your Xamarin Apps

$44.99
previous
next