SIX BOOKS

 

1.  F. Y. Shih, Digital Watermarking and Steganography: Fundamentals and Techniques, second edition, Taylor & Francis Group, CRC Press, Boca Raton, FL, ISBN: 978-1-4987-3876-7, 2017 (list price: $129.95).

 

This book intends to provide a comprehensive overview on different aspects of mechanisms and techniques for information security. It is written for students, researchers, and professionals studying in the field of multimedia security and steganography. Multimedia security and steganography is especially relevant due to the global scale of digital multimedia and the rapid growth of the Internet. Digital watermarking technology can be used to guarantee authenticity and can be applied as proof that the content has not been altered since insertion. Updated techniques and advances in watermarking are explored in this new edition. The combinational spatial and frequency domains watermarking technique provides a new concept of enlarging the embedding capacity of watermarks. The genetic algorithm (GA) based watermarking technique solves the rounding error problem and provide an efficient embedding approach. Each chapter provides the reader with a fundamental, theoretical framework, while developing the extensive advanced techniques and considering the essential principles of the digital watermarking and steganographic systems. Several robust algorithms that are presented throughout illustrate the framework and provide assistance and tools in understanding and implementing the fundamental principles.

2.     F. Y. Shih (Author), Marching towards Harvard from Taiwan, 2016, ISBN: 9789574338061.

 

3.     F. Y. Shih (Editor), Multimedia Security: Watermarking, Steganography, and Forensics, 423 pages, Taylor & Francis Group, CRC Press, Boca Raton, FL, 2013, ISBN: 978-1-4398-7331-1 (list price: $129.95).

 

Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, this book presents a wealth of everyday protection application examples in fields including multimedia mining and classification, digital watermarking, steganography, and digital forensics.

Giving readers an in-depth overview of different aspects of information security mechanisms and methods, this resource also serves as an instructional tool on how to use the fundamental theoretical framework required for the development of extensive advanced techniques. The presentation of several robust algorithms illustrates this framework, helping readers to quickly master and apply fundamental principles.

 

4.  F. Y. Shih, Image Processing and Pattern Recognition: Fundamentals and Techniques, 537 pages, Wiley-IEEE Press, ISBN-10: 0-470-40461-2, ISBN-13: 978-0-470-40461-4, 2010 (list price: $125.00).

 

This book offers a comprehensive guide to the essential principles of image processing and pattern recognition. Techniques and in the areas of image processing and pattern recognition are growing at an unprecedented rate. Containing the latest state-of-the-art developments in the field, Image Processing and Pattern Recognition presents clear explanations of the fundamentals as well as the most recent applications. It explains the essential principles so readers will not only be able to easily implement the algorithms and techniques, but also lead themselves to discover new problems and applications.

Unlike other books on the subject, this volume presents numerous fundamental and advanced image processing algorithms and pattern recognition techniques to illustrate the framework. Scores of graphs and examples, technical assistance, and practical tools illustrate the basic principles and help simplify the problems, allowing students as well as professionals to easily grasp even complicated theories. It also features unique coverage of the most interesting developments and updated techniques, such as image watermarking, digital steganography, document processing and classification, solar image processing and event classification, 3-D Euclidean distance transformation, shortest path planning, soft morphology, recursive morphology, regulated morphology, and sweep morphology. Additional topics include enhancement and segmentation techniques, active learning, feature extraction, neural networks, and fuzzy logic.

Featuring supplemental materials for instructors and students, Image Processing and Pattern Recognition is designed for undergraduate seniors and graduate students, engineering and scientific researchers, and professionals who work in signal processing, image processing, pattern recognition, information security, document processing, multimedia systems, and solar physics.

 

5. F. Y. Shih, Image Processing and Mathematical Morphology: Fundamentals and Applications, 439 pages, CRC Press, Boca Raton, FL, Mar. 10, 2009, ISBN-10# 1-4200-8943-9, ISBN-13# 978-1420089431 (list price: $129.95).

 

Editorial Reviews

Product Description
In the development of digital multimedia, the importance and impact of image processing and mathematical morphology are well documented in areas ranging from automated vision detection and inspection to object recognition, image analysis and pattern recognition. Those working in these ever-evolving fields require a solid grasp of basic fundamentals, theory, and related applications—and few books can provide the unique tools for learning contained in this text.

Image Processing and Mathematical Morphology: Fundamentals and Applications is a comprehensive, wide-ranging overview of morphological mechanisms and techniques and their relation to image processing. More than merely a tutorial on vital technical information, the book places this knowledge into a theoretical framework. This helps readers analyze key principles and architectures and then use the author’s novel ideas on implementation of advanced algorithms to formulate a practical and detailed plan to develop and foster their own ideas. The book:

·  Presents the history and state-of-the-art techniques related to image morphological processing, with numerous practical examples

·  Gives readers a clear tutorial on complex technology and other tools that rely on their intuition for a clear understanding of the subject

·  Includes an updated bibliography and useful graphs and illustrations

·  Examines several new algorithms in great detail so that readers can adapt them to derive their own solution approaches

This invaluable reference helps readers assess and simplify problems and their essential requirements and complexities, giving them all the necessary data and methodology to master current theoretical developments and applications, as well as create new ones.

About the Author
New Jersey Institute of Technology, Newark, USA


Product Details

  • Hardcover: 439 pages
  • Publisher: CRC; 1 edition (March 19, 2009)
  • Language: English
  • ISBN-10: 1420089439
  • ISBN-13: 978-1420089431

 


6. Digital Watermarking and Steganography: Fundamentals and Techniques (Hardcover) by Professor Frank Y. Shih (Author), CRC Publisher, ISBN-13: 978-1420047578, December 17, 2007.

 

Editorial Reviews

Book Description
Every day millions of people capture, store, transmit, and manipulate digital data. Unfortunately free access digital multimedia communication also provides virtually unprecedented opportunities to pirate copyrighted material. Providing the theoretical background needed to develop and implement advanced techniques and algorithms, Digital Watermarking and Steganography

· Demonstrates how to develop and implement methods to guarantee the authenticity of digital media

· Explains the categorization of digital watermarking techniques based on characteristics as well as applications

· Presents cutting-edge techniques such as the GA-based breaking algorithm on the frequency-domain steganalytic system.

The popularity of digital media continues to soar. The theoretical foundation presented within this valuable reference will facilitate the creation on new techniques and algorithms to combat present and potential threats against information security.


Product Details

·                  Hardcover: 200 pages

·                  Publisher: CRC (December 17, 2007)

·                  Language: English

·                  ISBN-10: 1420047574

·                  ISBN-13: 978-1420047578

·                  Product Dimensions: 9.3 x 6.2 x 0.6 inches

·                  Shipping Weight: 14.4 ounces