Multimedia Data Hiding
Seiten
2011
|
Softcover reprint of hardcover 1st ed. 2003
Springer-Verlag New York Inc.
978-1-4419-2994-5 (ISBN)
Springer-Verlag New York Inc.
978-1-4419-2994-5 (ISBN)
The digital information revolution has brought about profound changes in our society and our life. New devices and powerful software have made it possible for consumers worldwide to create, manipulate, share, and enjoy the multimedia information. Internet and wireless networks offer ubiquitous channels to deliver and to exchange multimedia information for such pur poses as remote collaboration, distant learning, and entertainment. With all these advances in multimedia coding and communication technologies over the past decade, the major hurdle for allowing much broader access of multimedia assets and deployment of multimedia services no longer lies with bandwidth-related issues, but with how to make sure that content is used for its intended purpose by its intended recipients. The core issue then be comes the development of secure management of content usage and delivery across communication networks. Data hiding and digital watermarking are promising new technologies for multimedia information protection and rights management. Secondary data can be embedded imperceptibly in digital multimedia signals for a variety of applications, including ownership protection, authentication, access con trol, and annotation. Data hiding can also be used to send side information in multimedia communication for providing additional functionalities or for enhancing performance. The extraction of the embedded data mayor may not need knowledge of the original host media data. In addition to im perceptibility, robustness against moderate processing such as compression is also an important consideration.
1 Introduction.- 1.1 Overview of Multimedia Data Hiding.- 1.2 Book Organization.- I Fundamental Issues.- 2 Preliminaries.- 3 Basic Embedding Mechanisms.- 4 Handling Uneven Embedding Capacity.- II Algorithm and System Designs.- 5 Data Hiding in Binary Image.- 6 Multilevel Data Hiding for Image and Video.- 7 Data Hiding for Image Authentication.- 8 Data Hiding for Video Communications.- III Attacks and Countermeasures.- 9 Attacks on Known Data Hiding Algorithms.- 10 Attacks on Unknown Data Hiding Algorithms.- 11 Conclusions and Perspectives.- References.- About the Authors.
Zusatzinfo | 55 Illustrations, black and white; XIX, 219 p. 55 illus. |
---|---|
Verlagsort | New York, NY |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Datenbanken ► Data Warehouse / Data Mining |
Mathematik / Informatik ► Informatik ► Grafik / Design | |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 1-4419-2994-0 / 1441929940 |
ISBN-13 | 978-1-4419-2994-5 / 9781441929945 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Daten importieren, bereinigen, umformen und visualisieren
Buch | Softcover (2024)
O'Reilly (Verlag)
54,90 €
eine Einführung mit Python, Scikit-Learn und TensorFlow
Buch | Softcover (2024)
O'Reilly (Verlag)
19,90 €