Data Hiding and Its Applications
Digital Watermarking and Steganography

Download Url(s)
https://mdpi.com/books/pdfview/book/4867Contributor(s)
Megías, David (editor)
Mazurczyk, Wojciech (editor)
Kuribayashi, Minoru (editor)
Language
EnglishAbstract
Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others.
Keywords
3D model; integrity protection; fragile watermarking; data hiding; genetic algorithm; Karhunen–Loève transform; screen-cam process; local square feature region; synchronization; DFT; robust watermarking; watermarking protocols; digital copyright protection; blockchain; block embedding; embedding capacity; embedding efficiency; optimal selection; parity assignment; steganograph; steganalysis; stegdetect; digital forensics; digital watermarking; digital rights management; digital fingerprinting; cryptography; MIDI; velocity values; carrier file; stego file; capacity; steganalysis resilience; audibility; file-size change-rate; mean absolute error; peak signal-to-noise ratio; quantization level difference; AMBTC; reversible data hiding; high capacity; cryptographic hash function; hash chain; plausible deniability; steganography; covert channel; deep learning models; ownership; intellectual property; watermarking; security and privacy; private model; network covert channels; detection; stegomalware; traffic sanitization; normalization; propaganda detection; mixed-code identification; text analysis; machine learning; internet-based crimes; cyber terrorist networks; cyber-criminality; n/aWebshop link
https://mdpi.com/books/pdfview ...ISBN
9783036529370, 9783036529363Publisher website
www.mdpi.com/booksPublication date and place
Basel, 2022Classification
Information technology industries

