Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next

Title Multimedia security. 1, Authentication and data hiding / coordinated by William Puech. [O'Reilly electronic resource]

Publication Info. London, UK : ISTE, Ltd. ; Hoboken, NJ : Wiley, 2022.
QR Code
Description 1 online resource.
Series Sciences. Images. Compression, coding and protection of images and videos
Contents How to Reconstruct the History of a Digital Image, and of Its Alterations / Quentin Bammey, Miguel Colom, Thibaud Ehret, Marina Gardella, Rafael Grompone, Jean-Michel Morel, Tina Nikoukhah, Denis Perraud -- Deep Neural Network Attacks and Defense: The Case of Image Classification / Hanwei Zhang, Teddy Furon, Laurent Amsaleg, Yannis Avrithis -- Codes and Watermarks / Pascal Lefèvre, Philippe Carré, Philippe Gaborit -- Invisibility / Pascal Lefèvre, Philippe Carré, David Alleysson -- Steganography: Embedding Data Into Multimedia Content / Patrick Bas, Rémi Cogranne, Marc Chaumont -- Traitor Tracing / Teddy Furon -- 3D Watermarking / Sébastien Beugnon, Vincent Itier, William Puech -- Steganalysis: Detection of Hidden Data in Multimedia Content / Rémi Cogranne, Marc Chaumont, Patrick Bas.
Bibliography Includes bibliographical references and index.
Summary Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis.
Subject Multimedia systems -- Security measures.
Multimédia -- Sécurité -- Mesures.
Added Author Puech, William, editor.
Added Title Authentication and data hiding
ISBN 9781119901808 (electronic bk. : oBook)
1119901804 (electronic bk. : oBook)
Standard No. 10.1002/9781119901808 doi
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information