We strive to deliver the best value to our customers and ensure complete satisfaction for all our textbook rentals.
You can return your online books for any reason within our refund period – no questions asked.
Every order is available for express shipping, and return shipping is always free.
You'll be happy with the quality of your books (or we'll ship you another one on our dime).
You can extend your rental at any time – at the same cheap daily rental rate.
If you decide to keep the book it will never cost more than the purchase price.
As always, you have access to over 5 million titles. Plus, you can choose from 5 rental periods, so you only pay for what you’ll use. And if you ever run into trouble, our top-notch U.S. based Customer Service team is ready to help by email, chat or phone.
Supplemental materials are not guaranteed for used textbooks or rentals (access codes, DVDs, workbooks).
Steganography and Steganalysis of JPEG Images: A Statistical Approach to Information Hiding and Detection
Steganography is the art of secret communication between two parties that not only conceals the contents of a message, but also its existence. Steganography has advantages over cryptography since message can be communicated to the desired recipient without raising any suspicion. Steganalysis attempts to detect the existence of embedded data in a...
Steganography is the art of secret communication between two parties that not only conceals the contents of a message, but also its existence. Steganography has advantages over cryptography since message can be communicated to the desired recipient without raising any suspicion. Steganalysis attempts to detect the existence of embedded data in a steganographically altered cover file. This book describes three JPEG steganography algorithms and one steganalysis algorithm. The steganography algorithms are primarily based on restoring the statistics of a JPEG image after embedding data in them which results in low detection rate as compared to other existing algorithms. The steganalysis algorithm uses second order statistical features along with machine learning to train and predict if an image contains embedded message. Steganography can be used in many applications. In commercial sector, data hiding techniques can be used to enforce copyright on a digital medium. The access control information can be embedded inside the digital medium which can eventually be verified by the media player before playing the file.
Since launching the first textbook rental site in 2006, BookRenter has never wavered from our mission to make education more affordable for all students. Every day, we focus on delivering students the best prices, the most flexible options, and the best service on earth. On March 13, 2012 BookRenter.com, Inc. formally changed its name to Rafter, Inc. We are still the same company and the same people, only our corporate name has changed.