47,95 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 1-2 Wochen
  • Broschiertes Buch

Document from the year 2023 in the subject Computer Sciences - Artificial Intelligence, Amity University (Amity School of Engineering and Technology), course: Information Security, Machine Learning, language: English, abstract: Information security is a challenging issue with the high growth rate of the internet. Cryptography, Steganography, and Digital watermarking techniques are widely used for information security for different purposes. In this book, we discuss various methods of hiding information using machine learning techniques. Chapter one is the foundation of the research conducted…mehr

Produktbeschreibung
Document from the year 2023 in the subject Computer Sciences - Artificial Intelligence, Amity University (Amity School of Engineering and Technology), course: Information Security, Machine Learning, language: English, abstract: Information security is a challenging issue with the high growth rate of the internet. Cryptography, Steganography, and Digital watermarking techniques are widely used for information security for different purposes. In this book, we discuss various methods of hiding information using machine learning techniques. Chapter one is the foundation of the research conducted during the period and dis-cussed in this book. It also overview the problem statement, methodology, objectives, achievements and motivation of the proposed study. It also provides an overview of the organization of this book. In chapter two, the main focus is to review the existing digital image watermarking techniques based on artificial neural network, support vector regression, support vector machines, genetic algorithm and combination of these machine learning algorithms called hybrid techniques based image watermarking. The reviews of these watermarking schemes give the effective solution for copyright protection applications. It is observed that machine learning algorithms are used to reduce the trade-off between robustness and imperceptibility in spatial as well as transform domain. In addition to robustness and imperceptibility, some of the researchers have focused on security of the watermark and how much information is stored in multimedia contents.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Autorenporträt
Dr. Ashok Kumar Yadav is working as Assistant Professor in the Department of Computer Science and Engineering, Amity School of Engineering and Technology, Amity University Uttar Pradesh, Noida, India. Earlier he was working as Assistant Professor in the Department of Computer Science and Engineering at Amity School of Engineering and Technology, New Delhi. He received his B.Sc. in Computer Science in 1999, M.Sc. in Computer Science (Software) in 2001 and M.Tech. in Computer Science and Engineering in 2003 from Kurukshetra University. He has published more than 20 research papers in SCIE, Scopus and UGC-listed journals and conferences. He has an experience of 18 years. He is an Editorial member and Reviewer of many SCI and Internationally reputed journals.