An edition of Multimedia Data Hiding (2003)

Multimedia Data Hiding

Not in Library

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today


Buy this book

Last edited by ImportBot
August 2, 2020 | History
An edition of Multimedia Data Hiding (2003)

Multimedia Data Hiding

The digital revolution has brought about profound changes in our society and our lives. This book discusses the issues regarding multimedia data hiding and its application to multimedia security and communication, addressing both theoretical and practical aspects and tackling both design and attack problems. The book is organized into three parts. In the fundamental issues part, a few key elements of data hiding are identified through a layered structure; data hiding is modeled as a communication problem where the embedded data is the signal to be transmitted. A comprehensive solution is proposed that addresses considerations for choosing constant- or variable embedding rate and enhancing performance in each case. Algorithm and system designs are presented in the second part for binary images, grayscale and color images, and videos. The designs provide concrete examples, such as annotation, tamper detection, copy/access control, fingerprinting, and ownership protection. Finally, in the third part, attacks and countermeasures for both known and unknown data-hiding algorithms are considered, respectively, for problems surrounding digital watermarking and digital music.

Publish Date
Publisher
Springer New York
Language
English
Pages
219

Buy this book

Previews available in: English

Edition Availability
Cover of: Multimedia Data Hiding
Multimedia Data Hiding
2003, Springer New York
electronic resource / in English

Add another edition?

Book Details


Table of Contents

Introduction
Preliminaries
Classification and capacity of embedding
Handling uneven embedding capacity
Data hiding in binary images
Multilevel data hiding for image & video
Data hiding for image authentication
Data hiding for video communication
Attacks on known data-hiding algorithms
Attacks on unknown data-hiding algorithms
Conclusions and perspectives.

Edition Notes

Online full text is restricted to subscribers.

Also available in print.

Mode of access: World Wide Web.

Published in
New York, NY

Classifications

Dewey Decimal Class
003.54
Library of Congress
QA268, QA76.9.D335QA268QA75

The Physical Object

Format
[electronic resource] /
Pagination
1 online resource (xix, 219 p.)
Number of pages
219

ID Numbers

Open Library
OL27076198M
Internet Archive
multimediadatahi00wumi_603
ISBN 10
1441929940, 0387217541
ISBN 13
9781441929945, 9780387217543
OCLC/WorldCat
853263249

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON
August 2, 2020 Edited by ImportBot import existing book
July 5, 2019 Created by MARC Bot import new book