Data Hiding and Its Applications Digital Watermarking and Steganography
Material type:
- text
- computer
- online resource
- 9783036529363
- 9783036529370
- books978-3-0365-2937-0
- Information technology industries
- 3D model
- AMBTC
- audibility
- block embedding
- blockchain
- capacity
- carrier file
- covert channel
- cryptographic hash function
- cryptography
- cyber terrorist networks
- cyber-criminality
- data hiding
- deep learning models
- detection
- DFT
- digital copyright protection
- digital fingerprinting
- digital forensics
- digital rights management
- digital watermarking
- embedding capacity
- embedding efficiency
- file-size change-rate
- fragile watermarking
- genetic algorithm
- hash chain
- high capacity
- integrity protection
- intellectual property
- internet-based crimes
- Karhunen-Loève transform
- local square feature region
- machine learning
- mean absolute error
- MIDI
- mixed-code identification
- n/a
- network covert channels
- normalization
- optimal selection
- ownership
- parity assignment
- peak signal-to-noise ratio
- plausible deniability
- private model
- propaganda detection
- quantization level difference
- reversible data hiding
- robust watermarking
- screen-cam process
- security and privacy
- steganalysis
- steganalysis resilience
- steganograph
- steganography
- stegdetect
- stego file
- stegomalware
- synchronization
- text analysis
- traffic sanitization
- velocity values
- watermarking
- watermarking protocols
Open Access Unrestricted online access star
Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others.
Creative Commons https://creativecommons.org/licenses/by/4.0/ cc
https://creativecommons.org/licenses/by/4.0/
English
There are no comments on this title.