Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Steganalysis and authentication of b...
~
Jiang, Ming.
Linked to FindBook
Google Book
Amazon
博客來
Steganalysis and authentication of binary document images.
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Steganalysis and authentication of binary document images./
Author:
Jiang, Ming.
Description:
108 p.
Notes:
Advisers: Edward K. Wong; Nasir Memon.
Contained By:
Dissertation Abstracts International67-07B.
Subject:
Computer Science. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3223920
ISBN:
9780542777882
Steganalysis and authentication of binary document images.
Jiang, Ming.
Steganalysis and authentication of binary document images.
- 108 p.
Advisers: Edward K. Wong; Nasir Memon.
Thesis (Ph.D.)--Polytechnic University, 2006.
This dissertation research addresses two important problems in document image security: steganalysis and authentication. We have developed four novel steganalysis techniques for binary document images, and a robust technique for the authentication of documents.
ISBN: 9780542777882Subjects--Topical Terms:
626642
Computer Science.
Steganalysis and authentication of binary document images.
LDR
:02994nam 2200313 a 45
001
965625
005
20110906
008
110906s2006 eng d
020
$a
9780542777882
035
$a
(UMI)AAI3223920
035
$a
AAI3223920
040
$a
UMI
$c
UMI
100
1
$a
Jiang, Ming.
$3
1021898
245
1 0
$a
Steganalysis and authentication of binary document images.
300
$a
108 p.
500
$a
Advisers: Edward K. Wong; Nasir Memon.
500
$a
Source: Dissertation Abstracts International, Volume: 67-07, Section: B, page: 3901.
502
$a
Thesis (Ph.D.)--Polytechnic University, 2006.
520
$a
This dissertation research addresses two important problems in document image security: steganalysis and authentication. We have developed four novel steganalysis techniques for binary document images, and a robust technique for the authentication of documents.
520
$a
The steganalysis techniques we developed can be used as a counter measure to steganography when document images are used as cover media. The first steganalysis technique uses a cubic curve model to estimate pixel positions along character or symbol boundaries. Then the statistics of estimation errors are used to detect stegoimages and to estimate the length of the hidden messages. The second steganalysis technique uses compression bit rate as a distinguishing statistic to distinguish stego images from unmarked images. We specifically used the JBIG-2 binary image compression algorithm to derive a quantitative relation between compression bit rate and embedding rate. The third steganalysis technique was developed for detecting stego images when document images degraded with print and scan noise are used as cover media. This technique makes use of a document degradation model for print and scan processes. The fourth steganalysis technique was developed for detecting stego images when halftone images are used as cover media. We first convert a halftone image into grayscale-like images using low-pass filtering. A set of statistical features are then extracted for classifying candidate images into stego or unmarked images.
520
$a
In the document authentication method we developed, characters and symbols are first grouped into different classes based on k-means clustering in the feature space. Labels are then assigned to the different classes. The ordered sequence of labels for the characters and symbols is then used to compute a hash code for the document by using a cryptographic hash function and a private key. The proposed technique tolerates noise introduced by print and scan operations, but is capable of detecting intentional content alternations done to a document.
590
$a
School code: 0179.
650
4
$a
Computer Science.
$3
626642
650
4
$a
Engineering, Electronics and Electrical.
$3
626636
690
$a
0544
690
$a
0984
710
2 0
$a
Polytechnic University.
$3
1249856
773
0
$t
Dissertation Abstracts International
$g
67-07B.
790
$a
0179
790
1 0
$a
Memon, Nasir,
$e
advisor
790
1 0
$a
Wong, Edward K.,
$e
advisor
791
$a
Ph.D.
792
$a
2006
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3223920
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9125226
電子資源
11.線上閱覽_V
電子書
EB W9125226
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login