Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia
Autor Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansuen Limba Engleză Hardback – 8 sep 2004
Data Hiding Fundamentals and Applications focuses on the theory and state-of-the-art applications of content security and data hiding in digital multimedia. One of the pillars of content security solutions is the imperceptible insertion of information into multimedia data for security purposes; the idea is that this inserted information will allow detection of unauthorized usage.
- Provides a theoretical framework for data hiding, in a signal processing context
- Realistic applications in secure, multimedia delivery
- Compression robust data hiding
- Data hiding for proof of ownership--WATERMARKING
- Data hiding algorithms for image and video watermarking
Preț: 344.61 lei
Preț vechi: 508.71 lei
-32% Nou
Puncte Express: 517
Preț estimativ în valută:
65.97€ • 68.84$ • 55.30£
65.97€ • 68.84$ • 55.30£
Carte tipărită la comandă
Livrare economică 06-20 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780120471447
ISBN-10: 0120471442
Pagini: 272
Ilustrații: Approx. 100 illustrations
Dimensiuni: 152 x 229 x 23 mm
Greutate: 0.55 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 0120471442
Pagini: 272
Ilustrații: Approx. 100 illustrations
Dimensiuni: 152 x 229 x 23 mm
Greutate: 0.55 kg
Editura: ELSEVIER SCIENCE
Public țintă
Engineers, computer scientists, and students doing research in multimedia signal processing, content security, and digital rights management (DRM) systems.Cuprins
Introduction. Frameworks for Data Hiding. Communication with Side Information and Data Hiding. Type-I (Linear) Data Hiding. Type-II and Type-III (Non-Linear) Data Hiding Methods. Advanced Implementations. Major Design Issues. Data Hiding Applications.
Recenzii
“ ... this book is recommended to computer programming professionals, technical intelligence personnel, and select students in the hard sciences. It is also recommended to data-hiding professionals who wish to expand or refresh their skills in this vital and rapidly expanding field. —Dan Bergevin of Catfield International, Security Management
“This is a readable book and of importance to those with a special interest in the growing number of multimediea technologies now being applied to the internet services. Cyberneticians and systemists will find the book of interest and those who are directly involved with these online activities need to read it. —D.M. Hutton, Kybernetes, Volume 34, Issue 7+8, 2005
"With Data Hiding Fundamentals and Applications, the three authors seek to fill a broad gap in the literature of digital multimedia security. Steganography, the art of hiding information in multimedia content, is discussed in meticulous detail in various contexts. But if you don’t savor complex equations and block diagrams, this book isn’t for you... Because of its high level of information, this book is recommended to computer programming professionals, technical intelligence personnel, and select students in the hard sciences. It is also recommended to data-hiding professionals who wish to expand or refresh their skills in this vital and rapidly expanding field." —Security Management
“This is a readable book and of importance to those with a special interest in the growing number of multimediea technologies now being applied to the internet services. Cyberneticians and systemists will find the book of interest and those who are directly involved with these online activities need to read it. —D.M. Hutton, Kybernetes, Volume 34, Issue 7+8, 2005
"With Data Hiding Fundamentals and Applications, the three authors seek to fill a broad gap in the literature of digital multimedia security. Steganography, the art of hiding information in multimedia content, is discussed in meticulous detail in various contexts. But if you don’t savor complex equations and block diagrams, this book isn’t for you... Because of its high level of information, this book is recommended to computer programming professionals, technical intelligence personnel, and select students in the hard sciences. It is also recommended to data-hiding professionals who wish to expand or refresh their skills in this vital and rapidly expanding field." —Security Management