000726438 000__ 03415cam\a2200457Ii\4500 000726438 001__ 726438 000726438 005__ 20230306140821.0 000726438 006__ m\\\\\o\\d\\\\\\\\ 000726438 007__ cr\cn\nnnunnun 000726438 008__ 150408s2015\\\\sz\a\\\\ob\\\\000\0\eng\d 000726438 020__ $$a9783319131566$$qelectronic book 000726438 020__ $$a3319131567$$qelectronic book 000726438 020__ $$z9783319131559 000726438 0247_ $$a10.1007/978-3-319-13156-6$$2doi 000726438 035__ $$aSP(OCoLC)ocn906804049 000726438 035__ $$aSP(OCoLC)906804049 000726438 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dN$T$$dGW5XE$$dE7B$$dYDXCP$$dIDEBK$$dCOO$$dUPM 000726438 049__ $$aISEA 000726438 050_4 $$aTK5105.2 000726438 08204 $$a006.3/7$$223 000726438 24500 $$aRobust image authentication in the presence of noise$$h[electronic resource] /$$cNataša Živić, editor. 000726438 264_1 $$aCham :$$bSpringer,$$c[2015] 000726438 300__ $$a1 online resource :$$billustrations. 000726438 336__ $$atext$$btxt$$2rdacontent 000726438 337__ $$acomputer$$bc$$2rdamedia 000726438 338__ $$aonline resource$$bcr$$2rdacarrier 000726438 504__ $$aIncludes bibliographical references. 000726438 5050_ $$aIntroduction -- Watermarking for Image Authentication -- Perceptual image hashing technique for image authentication in WMSNs -- A Review of Approximate Message Authentication Codes -- Fuzzy Image Authentication with Error Localization and Correction -- Robustness of Biometrics by Image Processing Technology. 000726438 506__ $$aAccess limited to authorized users. 000726438 520__ $$aThis book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compared and, furthermore, innovative approaches and algorithms are introduced. The introduced algorithms are applied to improve image authentication, watermarking and biometry. Aside from presenting new directions and algorithms for robust image authentication in the presence of noise, as well as image correction, this book also: Provides an overview of the state of the art algorithms for image authentication in the presence of noise and modifications, as well as a comparison of these algorithms, Presents novel algorithms for robust image authentication, whereby the image is tried to be corrected and authenticated, Examines different views for the solution of problems connected to image authentication in the presence of noise, Shows examples, how the new techniques can be applied to image authentication, watermarking and biometry. This book is written on the one hand for students, who want to learn about image processing, authentication, watermarking and biometry, and on the other hand for engineers and researchers, who work on aspects of robustness against modifications of secure images. 000726438 588__ $$aOnline resource; title from PDF title page (viewed April 9, 2015). 000726438 650_0 $$aImage transmission. 000726438 650_0 $$aDigital signatures. 000726438 650_0 $$aElectronic noise. 000726438 650_0 $$aRobust control. 000726438 7001_ $$aŽivić, Nataša,$$d1975-$$eeditor. 000726438 77608 $$iPrint version:$$aZivić, Natasa.$$tRobust image authentication in the presence of noise.$$dCham, Switzerland : Springer, c2015$$z9783319131559$$w2015935937 000726438 852__ $$bebk 000726438 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-13156-6$$zOnline Access$$91397441.1 000726438 909CO $$ooai:library.usi.edu:726438$$pGLOBAL_SET 000726438 980__ $$aEBOOK 000726438 980__ $$aBIB 000726438 982__ $$aEbook 000726438 983__ $$aOnline 000726438 994__ $$a92$$bISE