7 Chapter 7Figure 7.1 Classification of data hiding methods, based on the work of Petitcola...Figure 7.2 Data hiding trade-offFigure 7.3 The Stanford Bunny in low-resolution, 1,889 vertices and 3,851 faces,...Figure 7.4 a) 3006 3D point cloud, and b) MST built on the point cloudFigure 7.5 The problem of sensitivity of EMSTsFigure 7.6 Structure at the i stage. The vertices and edges in red are already c...Figure 7.7 State of the sets at step i: vi the current vertexFigure 7.8 a) vi+1 is moved too close to the sub-path, and b) vi+1 is placed too...Figure 7.9 Embedding method of the algorithm of Cayre and Macq (2003), the bit “...Figure 7.10 Overview of a data hiding method in a point cloud in the spatial dom...Figure 7.11 Representation of a K-d-B-TreeFigure 7.12 Example of data hiding in a 3D Bunny object with ∆= 10−4: a) origina...
8 Chapter 8Figure 8.1 Illustration of the impact of steganography by LSBR and its detection...Figure 8.2 Illustration of probability distributions (empirical and theoretical)...Figure 8.3 Results of the application of the LRG test, equation [8.14]Figure 8.4. Illustration of the supervised learning principal, which aims to det...Figure 8.5 Illustration of the principle of extraction of RM characteristics (Sp...Figure 8.6 The Yedroudj-Net (Yedroudj et al. 2018b) network
1 Cover
2 Table of Contents
3 Title Page SCIENCES Image, Field Director – Laure Blanc-Feraud Compression, Coding and Protection of Images and Videos , Subject Head – Christine Guillemot
4 Copyright First published 2022 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc. Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licenses issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned address: ISTE Ltd 27-37 St George’s Road London SW19 4EU UK www.iste.co.uk John Wiley & Sons, Inc. 111 River Street Hoboken, NJ 07030 USA www.wiley.com © ISTE Ltd 2022 The rights of William Puech to be identified as the author of this work have been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s), contributor(s) or editor(s) and do not necessarily reflect the views of ISTE Group. Library of Congress Control Number: 2021948467 British Library Cataloguing-in-Publication Data A CIP record for this book is available from the British Library ISBN 978-1-78945-026-2 ERC code: PE6 Computer Science and Informatics PE6_5 Cryptology, security, privacy, quantum cryptography PE6_8 Computer graphics, computer vision, multi media, computer games
5 Foreword by Gildas Avoine
6 Foreword by Cédric Richard
7 Preface
8 Begin Reading
9 List of Authors
10 Index
11 End User License Agreement
1 v
2 iii
3 iv
4 xi
5 xii
6 xiii
7 xiv
8 xv
9 xvi
10 xvii
11 1
12 2
13 3
14 4
15 5
16 6
17 7
18 8
19 9
20 10
21 11
22 12
23 13
24 14
25 15
26 16
27 17
28 18
29 19
30 20
31 21
32 22
33 23
34 24
35 25
36 26
37 27
38 28
39 29
40 30
41 31
42 32
43 33
44 34
45 35
46 36
47 37
48 38
49 39
50 40
51 41
52 42
53 43
54 44
55 45
56 46
57 47
58 48
59 49
60 50
61 51
62 52
63 53
64 54
65 55
66 56
67 57
68 58
69 59
70 60
71 61
72 62
73 63
74 64
75 65
76 66
77 67
78 68
79 69
80 70
81 71
82 72
83 73
84 74
85 75
86 77
87 78
88 79
89 80
90 81
91 82
92 83
93 84
94 85
95 86
96 87
97 88
98 89
99 90
100 91
101 92
102 93
103 94
104 95
105 96
106 97
107 98
108 99
109 100
110 101
111 102
112 103
113 104
114 105
115 106
116 107
117 108
118 109
119 110
120 111
121 112
122 113
123 114
124 115
125 116
126 117
127 118
128 119
129 120
130 121
131 122
132 123
133 124
134 125
135 126
136 127
137 129
138 130
139 131
140 132
141 133
142 134
143 135
144 136
145 137
146 138
147 139
148 140
149 141
150 142
151 143
152 144
153 145
154 146
155 147
156 148
157 149
158 150
159 151
160 152
161 153
162 154
163 155
164 156
165 157
166 158
167 159
168 160
169 161
170 162
171 163
172 164
173 165
174 166
175 167
176 168
177 169
178 170
179 171
180 172
181 173
182 174
183 175
184 176
185 177
186 178
187 179
188 180
189 181
190 182
191 183
192 184
193 185
194 186
195 187
196 188
197 189
198 190
199 191
200 192
201 193
202 194
203 195
204 196
205 197
206 198
207 199
208 200
209 201
210 202
211 203
212 204
213 205
214 206
215 207
216 208
217 209
218 210
219 211
220 212
221 213
222 214
223 215
224 216
225 217
226 218
227 219
228 220
229 221
230 222
231 223
232 224
233 225
234 226
235 227
236 228
237 229
238 230
239 231
240 232
241 233
242 234
243 235
244 236
245 237
246 238
247 239
248 240
249 241
250 242
251 243
252 244
253 245
254 246
255 247
256 248
257 249
258 250
259 251
260 252
261 253
262 254
263 255
264 256
265 257
266 258
267 259
268 260
269 261
270 262
271 263
272 264
273 265
274 266
275 267
276 268
277 269
278 270
279 271
280 272
281 273
282 274
283 275
284 276
285 277
286 278
287 279
288 280
289 281
290 282
291 283
292 284
293 285
294 286
295 287
296 289
297 290
298 291
299 293
300 294
301 295
SCIENCES
Image, Field Director – Laure Blanc-Feraud
Compression, Coding and Protection of Images and Videos , Subject Head – Christine Guillemot
Multimedia Security 1
Authentication and Data Hiding
Coordinated by
William Puech
First published 2022 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc.
Читать дальше