Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200433Ii 4500 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr cnu|||unuuu 
008    220323s2022    enk     ob    001 0 eng d 
020    9781119901808|q(electronic bk. : oBook) 
020    1119901804|q(electronic bk. : oBook) 
024 7  10.1002/9781119901808|2doi 
029 1  AU@|b000071498471 
035    (OCoLC)1305059757 
037    9781789450262|bO'Reilly Media 
040    DG1|beng|erda|epn|cDG1|dOCLCO|dORMDA|dOCLCQ 
049    INap 
082 04 006.7 
082 04 006.7|223 
099    eBook O'Reilly for Public Libraries 
245 00 Multimedia security.|n1,|pAuthentication and data hiding /
       |ccoordinated by William Puech.|h[O'Reilly electronic 
       resource] 
246 30 Authentication and data hiding 
264  1 London, UK :|bISTE, Ltd. ;|aHoboken, NJ :|bWiley,|c2022. 
300    1 online resource. 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
490 0  Sciences. Images. Compression, coding and protection of 
       images and videos 
504    Includes bibliographical references and index. 
505 0  How to Reconstruct the History of a Digital Image, and of 
       Its Alterations / Quentin Bammey, Miguel Colom, Thibaud 
       Ehret, Marina Gardella, Rafael Grompone, Jean-Michel Morel,
       Tina Nikoukhah, Denis Perraud -- Deep Neural Network 
       Attacks and Defense: The Case of Image Classification / 
       Hanwei Zhang, Teddy Furon, Laurent Amsaleg, Yannis 
       Avrithis -- Codes and Watermarks / Pascal Lefèvre, 
       Philippe Carré, Philippe Gaborit -- Invisibility / Pascal 
       Lefèvre, Philippe Carré, David Alleysson -- Steganography:
       Embedding Data Into Multimedia Content / Patrick Bas, Rémi
       Cogranne, Marc Chaumont -- Traitor Tracing / Teddy Furon -
       - 3D Watermarking / Sébastien Beugnon, Vincent Itier, 
       William Puech -- Steganalysis: Detection of Hidden Data in
       Multimedia Content / Rémi Cogranne, Marc Chaumont, Patrick
       Bas. 
520    Today, more than 80% of the data transmitted over networks
       and archived on our computers, tablets, cell phones or 
       clouds is multimedia data - images, videos, audio, 3D 
       data. The applications of this data range from video games
       to healthcare, and include computer-aided design, video 
       surveillance and biometrics. It is becoming increasingly 
       urgent to secure this data, not only during transmission 
       and archiving, but also during its retrieval and use. 
       Indeed, in today's "all-digital" world, it is becoming 
       ever-easier to copy data, view it unrightfully, steal it 
       or falsify it. Multimedia Security 1 analyzes the issues 
       of the authentication of multimedia data, code and the 
       embedding of hidden data, both from the point of view of 
       defense and attack. Regarding the embedding of hidden data,
       it also covers invisibility, color, tracing and 3D data, 
       as well as the detection of hidden messages in an image by
       steganalysis. 
588 0  Online resource; title from PDF title page (John Wiley, 
       viewed March 23, 2022). 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Multimedia systems|xSecurity measures. 
650  6 Multimédia|xSécurité|xMesures. 
700 1  Puech, William,|eeditor. 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9781789450262/?ar
       |zAvailable on O'Reilly for Public Libraries 
994    92|bJFN