Эротические рассказы

Multimedia Security, Volume 1. William PuechЧитать онлайн книгу.

Multimedia Security, Volume 1 - William Puech


Скачать книгу
n id="u23f3158a-79c1-52ca-87d0-c34699d31490">

      

      1  Cover

      2  Title Page

      3  Copyright

      4  Foreword by Gildas Avoine

      5  Foreword by Cédric Richard

      6  Preface

      7  1 How to Reconstruct the History of a Digital Image, and of Its Alterations 1.1. Introduction 1.2. Describing the image processing chain 1.3. Traces left on noise by image manipulation 1.4. Demosaicing and its traces 1.5. JPEG compression, its traces and the detection of its alterations 1.6. Internal similarities and manipulations 1.7. Direct detection of image manipulation 1.8. Conclusion 1.9. References

      8  2 Deep Neural Network Attacks and Defense: The Case of Image Classification 2.1. Introduction 2.2. Adversarial images: definition 2.3. Attacks: making adversarial images 2.4. Defenses 2.5. Conclusion 2.6. References

      9  3 Codes and Watermarks 3.1. Introduction 3.2. Study framework: robust watermarking 3.3. Index modulation 3.4. Error-correcting codes approach 3.5. Contradictory objectives of watermarking: the impact of codes 3.6. Latest developments in the use of correction codes for watermarking 3.7. Illustration of the influence of the type of code, according to the attacks 3.8. Using the rank metric 3.9. Conclusion 3.10. References

      10  4 Invisibility 4.1. Introduction 4.2. Color watermarking: an approach history? 4.3. Quaternionic context for watermarking color images 4.4. Psychovisual approach to color watermarking 4.5. Conclusion 4.6. References

      11  5 Steganography: Embedding Data Into Multimedia Content 5.1. Introduction and theoretical foundations 5.2. Fundamental principles 5.3. Digital image steganography: basic methods 5.4. Advanced principles in steganography 5.5. Conclusion 5.6. References

      12  6 Traitor Tracing 6.1. Introduction 6.2. The original Tardos code 6.3. Tardos and his successors 6.4. Research of better score functions 6.5. How to find a better threshold 6.6. Conclusion 6.7. References

      13  7 3D Watermarking 7.1. Introduction 7.2. Preliminaries 7.3. Synchronization 7.4. 3D data hiding 7.5. Presentation of a high-capacity data hiding method 7.6. Improvements 7.7. Experimental results 7.8. Trends in high-capacity 3D data hiding 7.9. Conclusion 7.10. References

      14  8 Steganalysis: Detection of Hidden Data in Multimedia Content 8.1.


Скачать книгу
Яндекс.Метрика