Get Free Shipping on orders over $79
Multimedia Security : Watermarking, Steganography, and Forensics - FRANK Y. SHIH

Multimedia Security

Watermarking, Steganography, and Forensics

By: FRANK Y. SHIH

eText | 19 December 2017 | Edition Number 1

At a Glance

eText


$188.10

or 4 interest-free payments of $47.02 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, this book presents a wealth of everyday protection application examples in fields including multimedia mining and classification, digital watermarking, steganography, and digital forensics.

Giving readers an in-depth overview of different aspects of information security mechanisms and methods, this resource also serves as an instructional tool on how to use the fundamental theoretical framework required for the development of extensive advanced techniques. The presentation of several robust algorithms illustrates this framework, helping readers to quickly master and apply fundamental principles.

Presented case studies cover:

  • The execution (and feasibility) of techniques used to discover hidden knowledge by applying multimedia duplicate mining methods to large multimedia content
  • Different types of image steganographic schemes based on vector quantization
  • Techniques used to detect changes in human motion behavior and to classify different types of small-group motion behavior

Useful for students, researchers, and professionals, this book consists of a variety of technical tutorials that offer an abundance of graphs and examples to powerfully convey the principles of multimedia security and steganography. Imparting the extensive experience of the contributors, this approach simplifies problems, helping readers more easily understand even the most complicated theories. It also enables them to uncover novel concepts involved in the implementation of algorithms, which can lead to the discovery of new problems and new means of solving them.

on
Desktop
Tablet
Mobile

Other Editions and Formats

Paperback

Published: 29th March 2017

More in Graphical & Digital Media Applications

Typography 34 - Type Directors Club

eBOOK

$25.99

On Designing Well - Pree Kolari

eBOOK

Artificial Intelligence and Photography - Stuart Oring

eBOOK

How a Game Lives - Jacob Geller

eBOOK

$12.99

Beryl - Joanna Quinn

eBOOK

eBook

$31.49