Cargando…

Multimedia security. 1, Authentication and data hiding /

Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Puech, William (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: London, UK : Hoboken, NJ : ISTE, Ltd. ; Wiley, 2022.
Colección:Sciences. Images. Compression, coding and protection of images and videos
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_on1305059757
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 220323s2022 enk ob 001 0 eng d
040 |a DG1  |b eng  |e rda  |e pn  |c DG1  |d OCLCO  |d ORMDA  |d OCLCQ 
020 |a 9781119901808  |q (electronic bk. : oBook) 
020 |a 1119901804  |q (electronic bk. : oBook) 
020 |z 9781789450262 
024 7 |a 10.1002/9781119901808  |2 doi 
029 1 |a AU@  |b 000071498471 
035 |a (OCoLC)1305059757 
037 |a 9781789450262  |b O'Reilly Media 
050 4 |a QA76.575 
082 0 4 |a 006.7  |2 23 
049 |a UAMI 
245 0 0 |a Multimedia security.  |n 1,  |p Authentication and data hiding /  |c coordinated by William Puech. 
246 3 0 |a Authentication and data hiding 
264 1 |a London, UK :  |b ISTE, Ltd. ;  |a Hoboken, NJ :  |b Wiley,  |c 2022. 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 0 |a Sciences. Images. Compression, coding and protection of images and videos 
505 0 |a How to Reconstruct the History of a Digital Image, and of Its Alterations / Quentin Bammey, Miguel Colom, Thibaud Ehret, Marina Gardella, Rafael Grompone, Jean-Michel Morel, Tina Nikoukhah, Denis Perraud -- Deep Neural Network Attacks and Defense: The Case of Image Classification / Hanwei Zhang, Teddy Furon, Laurent Amsaleg, Yannis Avrithis -- Codes and Watermarks / Pascal Lefèvre, Philippe Carré, Philippe Gaborit -- Invisibility / Pascal Lefèvre, Philippe Carré, David Alleysson -- Steganography: Embedding Data Into Multimedia Content / Patrick Bas, Rémi Cogranne, Marc Chaumont -- Traitor Tracing / Teddy Furon -- 3D Watermarking / Sébastien Beugnon, Vincent Itier, William Puech -- Steganalysis: Detection of Hidden Data in Multimedia Content / Rémi Cogranne, Marc Chaumont, Patrick Bas. 
504 |a Includes bibliographical references and index. 
588 0 |a Online resource; title from PDF title page (John Wiley, viewed March 23, 2022). 
520 |a Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Multimedia systems  |x Security measures. 
650 6 |a Multimédia  |x Sécurité  |x Mesures. 
700 1 |a Puech, William,  |e editor. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781789450262/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP