LEADER 00000cam a2200433Ii 4500 003 OCoLC 005 20240129213017.0 006 m o d 007 cr cnu|||unuuu 008 220323s2022 enk ob 001 0 eng d 020 9781119901808|q(electronic bk. : oBook) 020 1119901804|q(electronic bk. : oBook) 024 7 10.1002/9781119901808|2doi 029 1 AU@|b000071498471 035 (OCoLC)1305059757 037 9781789450262|bO'Reilly Media 040 DG1|beng|erda|epn|cDG1|dOCLCO|dORMDA|dOCLCQ 049 INap 082 04 006.7 082 04 006.7|223 099 eBook O'Reilly for Public Libraries 245 00 Multimedia security.|n1,|pAuthentication and data hiding / |ccoordinated by William Puech.|h[O'Reilly electronic resource] 246 30 Authentication and data hiding 264 1 London, UK :|bISTE, Ltd. ;|aHoboken, NJ :|bWiley,|c2022. 300 1 online resource. 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 490 0 Sciences. Images. Compression, coding and protection of images and videos 504 Includes bibliographical references and index. 505 0 How to Reconstruct the History of a Digital Image, and of Its Alterations / Quentin Bammey, Miguel Colom, Thibaud Ehret, Marina Gardella, Rafael Grompone, Jean-Michel Morel, Tina Nikoukhah, Denis Perraud -- Deep Neural Network Attacks and Defense: The Case of Image Classification / Hanwei Zhang, Teddy Furon, Laurent Amsaleg, Yannis Avrithis -- Codes and Watermarks / Pascal Lefèvre, Philippe Carré, Philippe Gaborit -- Invisibility / Pascal Lefèvre, Philippe Carré, David Alleysson -- Steganography: Embedding Data Into Multimedia Content / Patrick Bas, Rémi Cogranne, Marc Chaumont -- Traitor Tracing / Teddy Furon - - 3D Watermarking / Sébastien Beugnon, Vincent Itier, William Puech -- Steganalysis: Detection of Hidden Data in Multimedia Content / Rémi Cogranne, Marc Chaumont, Patrick Bas. 520 Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis. 588 0 Online resource; title from PDF title page (John Wiley, viewed March 23, 2022). 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 650 0 Multimedia systems|xSecurity measures. 650 6 Multimédia|xSécurité|xMesures. 700 1 Puech, William,|eeditor. 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/library/view/~/9781789450262/?ar |zAvailable on O'Reilly for Public Libraries 994 92|bJFN