000 03403cam a2200457 i 4500
001 on1305059757
003 OCoLC
005 20240523125544.0
006 m o d
007 cr cnu|||unuuu
008 220323s2022 enk ob 001 0 eng d
040 _aDG1
_beng
_erda
_epn
_cDG1
_dOCLCO
_dORMDA
_dOCLCQ
020 _a9781119901808
_q(electronic bk. : oBook)
020 _a1119901804
_q(electronic bk. : oBook)
020 _z9781789450262
024 7 _a10.1002/9781119901808
_2doi
029 1 _aAU@
_b000071498471
035 _a(OCoLC)1305059757
037 _a9781789450262
_bO'Reilly Media
050 4 _aQA76.575
082 0 4 _a006.7
_223
049 _aMAIN
245 0 0 _aMultimedia security.
_n1,
_pAuthentication and data hiding /
_ccoordinated by William Puech.
246 3 0 _aAuthentication and data hiding
264 1 _aLondon, UK :
_bISTE, Ltd. ;
_aHoboken, NJ :
_bWiley,
_c2022.
300 _a1 online resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 0 _aSciences. Images. Compression, coding and protection of images and videos
505 0 _aHow to Reconstruct the History of a Digital Image, and of Its Alterations / Quentin Bammey, Miguel Colom, Thibaud Ehret, Marina Gardella, Rafael Grompone, Jean-Michel Morel, Tina Nikoukhah, Denis Perraud -- Deep Neural Network Attacks and Defense: The Case of Image Classification / Hanwei Zhang, Teddy Furon, Laurent Amsaleg, Yannis Avrithis -- Codes and Watermarks / Pascal Lef�evre, Philippe Carr�e, Philippe Gaborit -- Invisibility / Pascal Lef�evre, Philippe Carr�e, David Alleysson -- Steganography: Embedding Data Into Multimedia Content / Patrick Bas, R�emi Cogranne, Marc Chaumont -- Traitor Tracing / Teddy Furon -- 3D Watermarking / S�ebastien Beugnon, Vincent Itier, William Puech -- Steganalysis: Detection of Hidden Data in Multimedia Content / R�emi Cogranne, Marc Chaumont, Patrick Bas.
504 _aIncludes bibliographical references and index.
588 0 _aOnline resource; title from PDF title page (John Wiley, viewed March 23, 2022).
520 _aToday, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis.
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aMultimedia systems
_xSecurity measures.
650 6 _aMultim�edia
_xS�ecurit�e
_xMesures.
700 1 _aPuech, William,
_eeditor.
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119901808
994 _a92
_bINLUM
999 _c12876
_d12876