The consideration of the book is to give a comprehensive reversible computation, embedding, extraction and authentication of information based on transform domain computations. This book contains transform encoding-based image authentication systems in detail. Six transformation techniques are given here in terms of reversible computations, embedding, extractions and authentication along with testability metrics. For the entire computations of this book, we have subdivided the image matrix in 2 × 2. This book did not consider other subimage size like 1 × 1, 1 × 2, 3 × 3, 4 × 4, etc. Particularly, to avoid generation of imaginary components in transform domain for higher window size of subimages. Only in case of Z transformation, transformation computations, embedding, extraction are done in complex conjugate pair with a complete encoding scheme.
CITATION STYLE
Mandal, J. K. (2020). Future Directions. In Studies in Computational Intelligence (Vol. 901, p. 317). Springer. https://doi.org/10.1007/978-981-15-4397-5_14
Mendeley helps you to discover research relevant for your work.