William Puech

Multimedia Security, Volume 1


Скачать книгу

method in a point cloud in the spatial dom...Figure 7.11 Representation of a K-d-B-TreeFigure 7.12 Example of data hiding in a 3D Bunny object with ∆= 10−4: a) origina...

      8 Chapter 8Figure 8.1 Illustration of the impact of steganography by LSBR and its detection...Figure 8.2 Illustration of probability distributions (empirical and theoretical)...Figure 8.3 Results of the application of the LRG test, equation [8.14]Figure 8.4. Illustration of the supervised learning principal, which aims to det...Figure 8.5 Illustration of the principle of extraction of RM characteristics (Sp...Figure 8.6 The Yedroudj-Net (Yedroudj et al. 2018b) network

      Guide

      1  Cover

      2  Table of Contents

      3  Title Page

      4  Copyright

      5  Foreword by Gildas Avoine

      6  Foreword by Cédric Richard

      7  Preface

      8  Begin Reading

      9  List of Authors

      10  Index

      11  End User License Agreement

      Pages

      1  v

      2  iii

      3  iv

      4  xi

      5  xii

      6  xiii

      7  xiv

      8  xv

      9  xvi

      10  xvii

      11  1

      12  2

      13  3

      14  4

      15  5

      16  6

      17  7

      18  8

      19  9

      20  10

      21  11

      22  12

      23  13

      24  14

      25  15

      26  16

      27  17

      28  18

      29  19

      30  20

      31  21

      32  22

      33  23

      34  24

      35  25

      36  26

      37  27

      38  28

      39  29

      40  30

      41  31

      42  32

      43  33

      44  34

      45  35

      46