A, B
- attack, 10–12, 14, 15, 22, 47, 50, 52, 60, 68, 73, 74, 91, 98, 100, 105, 108, 111, 113, 138, 140, 149, 150, 155, 165, 177, 190, 191, 259
- AVC (Advanced Video Coding), 113, 130, 131, 137, 141, 143–145
- biometrics, 1
C
- capacity, 3, 12, 24, 50, 66, 68, 71, 110, 136, 181, 192, 195, 219, 221, 234, 239, 269, 271
- cloud, 23, 24, 91, 113, 114, 196, 197, 215, 219, 220
- code, 33–36, 41, 42, 44, 45, 47, 49, 50, 71, 92, 108, 235, 275, 278
- bar, 42
- two-level, 44
- watermarked, 47
- copy-sensitive graphical code, 33, 41
- copy detection, 35, 42, 43,
- compression, 12, 66, 68, 73, 74, 91, 92, 94, 105–108, 110, 114–116, 123, 129, 130, 134, 135, 201, 202, 216
- computation techniques using encrypted data, 196
- confidentiality, 92, 99, 113, 114, 129, 165, 173, 178, 193, 200, 215, 220
- convolutional neural networks, 50, 78, 80
- counterfeit, 11, 31, 50, 52
- crypto-compression, 91, 106–108, 110, 113, 114, 116, 123, 129
- cryptography, 91, 96, 98, 129, 131, 176, 178, 216, 272, 273
D
- data aging, 24
- DCT (discrete cosine transform), 43, 93, 95, 106, 109, 113, 121, 135, 202
- detection of graphic clues, 77
- digital signature, 33, 68, 73, 82
- document
E
- encryption, 22, 99, 103, 104, 123, 129, 132–136, 139, 140, 143, 144, 146–149, 151, 154, 156, 158, 161, 162, 222, 223, 225, 237, 259
- homomorphic, 23, 113, 173, 175, 176, 186, 201, 202
- selective, 91, 100, 101, 105, 108, 113, 129, 131, 135, 136, 139, 140, 143, 144, 146–149, 158
- video, 132, 134, 135
- visual, 132, 151, 165
- exclusive-or, 99, 102, 106–108, 117, 121, 217, 224, 225
F, G, H
- facial recognition, 4–7, 10, 11, 193, 194, 196
- falsification, 39
- glyphs, 34–36, 38, 71
- guilloches, 34–36, 39–41
- HEVC (High Efficiency Video Coding), 113, 130, 131, 137–140, 142–145, 149, 150, 154, 157, 163
- hidden data insertion, 237, 275
- hierarchy, 264–266
I, J, K
- identification, 3–5, 7, 9, 25, 34, 45, 77, 220
- interpolation, 63, 217, 235, 236, 262, 263, 269, 281
- JPEG, 91–96, 105, 113, 117, 119–121
- key, 1–3, 6, 10, 22, 24, 41, 65, 67, 113, 136, 140, 142, 143, 145, 148, 174, 175, 192, 194, 197, 223, 225, 231, 242, 259
L, M
- levels, 18, 35, 36, 41, 42, 49, 77, 153, 161, 227, 228, 236
- medical, 4, 92, 196–198, 200, 217, 219, 220
- modalities, 1, 2, 6, 8, 9, 13
- MSB (most significant bit), 219, 231, 235, 237, 239–242
P
- payload, 199, 219, 221, 222, 227, 232, 234, 238, 250, 252
- polynomial, 99, 175, 177, 178, 180, 270, 274
- prediction, 13, 43, 96, 137, 141, 232, 235, 236, 239, 243, 252
- print test signatures, 36
- printing and scanning noise, 71
- PRNG (pseudo-random number generator), 98, 141, 224
- protection, 22, 24, 31, 33, 44, 68, 80, 143, 200, 259
Q, R
- quality, 14, 15, 19, 41, 150, 154–156, 221, 227
- recompression, 12, 93, 114–118, 215, 216
- reconstruction, 63, 144, 146, 150, 204, 223, 228, 232, 235, 243, 245, 260, 273, 275, 279
- reversible, 95, 143, 222, 224, 227, 228, 232, 235, 239, 249, 251
- ROI (region of interest), 13, 14, 78, 108, 288
S
- secret, 22–24, 48, 98–100, 102, 105, 114, 117, 119, 121, 174, 179, 190, 194, 216, 217, 222, 223, 259–261, 265, 266, 269, 285
- security aspects, 48, 131
- shares, 217, 260–262, 266, 268, 270, 272, 286
- sharing, 91, 92, 111, 113, 130, 131, 147, 215–217, 259–261, 265, 266, 274, 276, 279
- social networks, 7, 91, 130, 131, 146, 261, 280, 286, 288
T, W
- threshold, 7, 8, 43, 47, 51, 151, 179, 184, 194, 195, 260, 261, 265, 267, 268
- watermarking, 40, 47, 68, 69, 71–73
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.