close
1.

図書

図書
edited by Kiyoharu Aizawa, Katsuhiko Sakaue, Yashuhito Suenaga
出版情報: New York : Marcel Dekker, c2004  x, 282 p. ; 24 cm
シリーズ名: Signal processing and communications series ; 23
所蔵情報: loading…
目次情報: 続きを見る
Series Introduction
Preface
Passive Range Sensing Techniques: Depth from Images
Optimization Approaches in Computer Vision and Image Processing Katsuhiko / 1.:
Motion and Shape from Sequences of Images under Feature Correspondences / Naokazu Yokoya
Compression and Representation of 3-D Images
Omnidirectional Sensing and Its Applications / Takeshi Shakunaga
Computational Sensors: Vision VLSI
Processing of Face Images and Its Applications / Masayuki Kanbara
Document Analysis and Recognition
Recent Progress in Medical Image Processing-Virtualized Human Body and Computer-Aided Surgery
Image Processing for Intelligent Transport Systems
Optimization Approaches in Computer Vision and Image Processing / Katsuhiko Sakaue ; Akira Amano2.:
Motion and Shape from Sequences of Images Under Feature Correspondences / Jun Fujiki3.:
Processing and Recognition of Face Images and Its Applications / Takeshi Naemura ; Masahide Kaneko ; Hiroshi Harashima ; Yasushi Yagi ; Kiyoharu Aizawa ; Osamu Hasegawa4.:
Recent Progress in Medical Image Processing / Toyohide Watanabe ; Junichiro Toriwaki ; Kensaku Mori ; Jun-ichi Hasegawa8.:
Index / Shinji Ozawa10.:
Series Introduction
Preface
Passive Range Sensing Techniques: Depth from Images
2.

図書

図書
Mauro Barni, Franco Bartolini
出版情報: New York : Marcel Dekker, c2004  xv, 466 p. ; 24 cm
シリーズ名: Signal processing and communications series ; 21
所蔵情報: loading…
目次情報: 続きを見る
Series introduction
Preface
Introduction / 1:
Elements of a watermarking system / 1.1:
Information coding / 1.1.1:
Embedding / 1.1.2:
Concealment / 1.1.3:
Watermark impairments / 1.1.4:
Recovery of the hidden information / 1.1.5:
Protocol considerations / 1.2:
Capacity of watermarking techniques / 1.2.1:
Multiple embedding / 1.2.2:
Robustness / 1.2.3:
Blind vs. non-blind recovery / 1.2.4:
Private vs. public watermarking / 1.2.5:
Readable vs. detectable watermarks / 1.2.6:
Invertibility and quasi-invertibility / 1.2.7:
Reversibility / 1.2.8:
Asymmetric watermarking / 1.2.9:
Audio vs image vs video assets / 1.3:
Further reading / 1.4:
Applications / 2:
IPR protection / 2.1:
Demonstration of rightful ownership / 2.1.1:
Fingerprinting / 2.1.2:
Copy control / 2.1.3:
Authentication / 2.2:
Cryptography vs watermarking / 2.2.1:
A general authentication framework / 2.2.2:
Requirements of data-hiding-based authentication / 2.2.3:
Data hiding for multimedia transmission / 2.3:
Data compression / 2.3.1:
Error recovery / 2.3.2:
Annotation watermarks / 2.4:
Labelling for data retrieval / 2.4.1:
Bridging the gap between analog and digital objects / 2.4.2:
Covert communications / 2.5:
Information coding in detectable watermarking / 2.6:
Spread spectrum watermarking / 3.1.1:
Orthogonal waveforms watermarking / 3.1.2:
Orthogonal vs PN watermarking / 3.1.3:
Self-synchronizing PN sequences / 3.1.4:
Power spectrum shaping / 3.1.5:
Chaotic sequences / 3.1.6:
Direct embedding / 3.1.7:
Waveform-based readable watermarking / 3.2:
Information coding through M-ary signaling / 3.2.1:
Position encoding / 3.2.2:
Binary signaling / 3.2.3:
Direct embedding readable watermarking / 3.3:
Direct embedding binary signalling with bit repetition / 3.3.1:
Channel coding / 3.4:
Block codes / 3.4.1:
Convolutional codes / 3.4.2:
Coding vs bit repetition / 3.4.3:
Channel coding vs orthogonal signaling / 3.4.4:
Informed coding / 3.4.5:
Data embedding / 3.5:
Feature selection / 4.1:
Watermarking in the asset domain / 4.1.1:
Watermarking in a transformed domain / 4.1.2:
Hybrid techniques / 4.1.3:
Watermarking in the compressed domain / 4.1.4:
Miscellaneous non-conventional choices of the feature set / 4.1.5:
Blind embedding / 4.2:
Additive watermarking / 4.2.1:
Multiplicative watermarking / 4.2.2:
Informed embedding / 4.3:
Detectable watermarking / 4.3.1:
Readable watermarking / 4.3.2:
Data concealment / 4.4:
The Human Visual System / 5.1:
The Weber law and the contrast / 5.1.1:
The contrast sensitivity function / 5.1.2:
The masking effect / 5.1.3:
Mapping luminance to images / 5.1.4:
Perception of color stimuli / 5.1.5:
Perception of time-varying stimuli / 5.1.6:
The Human Auditory System (HAS) / 5.2:
Concealment through feature selection / 5.2.1:
Concealment through signal adaptation / 5.4:
Concealment through perceptual masks / 5.4.1:
Concealment relying on visibility thresholds / 5.4.2:
Heuristic approaches for still images / 5.4.3:
A theoretically funded perceptual threshold for still images / 5.4.4:
MPEG-based concealment for audio / 5.4.5:
Application oriented concealment / 5.5:
Video surveillance systems / 5.5.1:
Remote sensing images / 5.5.2:
Data recovery / 5.6:
Watermark detection / 6.1:
A hypothesis testing problem / 6.1.1:
AWGN channel / 6.1.2:
Additive / Generalized Gaussian channel / 6.1.3:
Signal dependent noise with host rejection at the embedder / 6.1.4:
Taking perceptual masking into account / 6.1.5:
Multiplicative Gaussian channel / 6.1.6:
Multiplicative Weibull channel / 6.1.7:
Multichannel detection / 6.1.8:
Decoding / 6.2:
General problem for binary signalling / 6.2.1:
Binary signaling through AWGN channel / 6.2.2:
Generalized Gaussian channel / 6.2.3:
Multiplicative watermarking with Gaussian noise / 6.2.4:
Multiplicative watermarking of Weibull-distributed features / 6.2.5:
Quantization Index Modulation / 6.2.6:
Decoding in the presence of channel coding / 6.2.7:
Assessment of watermark presence / 6.2.8:
Watermark impairments and benchmarking / 6.3:
Classification of attacks / 7.1:
Measuring obtrusiveness and attack strength / 7.2:
Gaussian noise addition / 7.3:
Additive vs multiplicative watermarking / 7.3.1:
Spread Spectrum vs QIM watermarking / 7.3.2:
Conventional signal processing / 7.4:
The gain attack / 7.4.1:
Histogram equalization / 7.4.2:
Filtering / 7.4.3:
Lossy coding / 7.5:
Quantization of the watermarked features / 7.5.1:
Geometric manipulations / 7.6:
Asset translation / 7.6.1:
Asset zooming / 7.6.2:
Image rotation / 7.6.3:
More complex geometric transformations / 7.6.4:
Countermeasures against geometric manipulations / 7.6.5:
Editing / 7.7:
Digital to analog and analog to digital conversion / 7.8:
Malicious attacks / 7.9:
Attack estimation / 7.10:
Benchmarking / 7.11:
Early benchmarking systems / 7.11.1:
StirMark / 7.11.2:
Improving conventional systems / 7.11.3:
A new benchmarking structure / 7.11.4:
Security issues / 7.12:
Security by obscurity / 8.1:
The symmetric case / 8.2:
The asymmetric case / 8.3:
Playing open cards / 8.4:
Security based on protocol design / 8.5:
An information theoretic perspective / 8.6:
Some historical notes / 9.1:
The watermarking game / 9.2:
The rules of the game / 9.2.1:
Some selected results / 9.2.2:
Capacity under average distortion constraints / 9.2.3:
The additive attack watermarking game / 9.3:
Game definition and main results / 9.3.1:
Costa's writing on dirty paper / 9.3.2:
Lattice-based capacity-achieving watermarking / 9.4:
Equi-energetic structured code-books / 9.5:
Bibliography / 9.6:
Index
Series introduction
Preface
Introduction / 1:
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼