NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Amazon cover image
Image from Amazon.com

Multimedia security. 1, Authentication and data hiding / coordinated by William Puech.

Contributor(s): Material type: TextTextSeries: Sciences. Images. Compression, coding and protection of images and videosPublisher: London, UK : Hoboken, NJ : ISTE, Ltd. ; Wiley, 2022Description: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781119901808
  • 1119901804
Other title:
  • Authentication and data hiding
Subject(s): DDC classification:
  • 006.7 23
LOC classification:
  • QA76.575
Online resources:
Contents:
How to Reconstruct the History of a Digital Image, and of Its Alterations / Quentin Bammey, Miguel Colom, Thibaud Ehret, Marina Gardella, Rafael Grompone, Jean-Michel Morel, Tina Nikoukhah, Denis Perraud -- Deep Neural Network Attacks and Defense: The Case of Image Classification / Hanwei Zhang, Teddy Furon, Laurent Amsaleg, Yannis Avrithis -- Codes and Watermarks / Pascal Lef�evre, Philippe Carr�e, Philippe Gaborit -- Invisibility / Pascal Lef�evre, Philippe Carr�e, David Alleysson -- Steganography: Embedding Data Into Multimedia Content / Patrick Bas, R�emi Cogranne, Marc Chaumont -- Traitor Tracing / Teddy Furon -- 3D Watermarking / S�ebastien Beugnon, Vincent Itier, William Puech -- Steganalysis: Detection of Hidden Data in Multimedia Content / R�emi Cogranne, Marc Chaumont, Patrick Bas.
Summary: Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

How to Reconstruct the History of a Digital Image, and of Its Alterations / Quentin Bammey, Miguel Colom, Thibaud Ehret, Marina Gardella, Rafael Grompone, Jean-Michel Morel, Tina Nikoukhah, Denis Perraud -- Deep Neural Network Attacks and Defense: The Case of Image Classification / Hanwei Zhang, Teddy Furon, Laurent Amsaleg, Yannis Avrithis -- Codes and Watermarks / Pascal Lef�evre, Philippe Carr�e, Philippe Gaborit -- Invisibility / Pascal Lef�evre, Philippe Carr�e, David Alleysson -- Steganography: Embedding Data Into Multimedia Content / Patrick Bas, R�emi Cogranne, Marc Chaumont -- Traitor Tracing / Teddy Furon -- 3D Watermarking / S�ebastien Beugnon, Vincent Itier, William Puech -- Steganalysis: Detection of Hidden Data in Multimedia Content / R�emi Cogranne, Marc Chaumont, Patrick Bas.

Includes bibliographical references and index.

Online resource; title from PDF title page (John Wiley, viewed March 23, 2022).

Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis.

John Wiley and Sons Wiley Online Library: Complete oBooks

There are no comments on this title.

to post a comment.
© 2022- NLU Meghalaya. All Rights Reserved. || Implemented and Customized by
OPAC Visitors

Powered by Koha