Data Hiding and Its Applications
Digital Watermarking and Steganography
| dc.contributor.editor | Megías, David | |
| dc.contributor.editor | Mazurczyk, Wojciech | |
| dc.contributor.editor | Kuribayashi, Minoru | |
| dc.date.accessioned | 2022-02-24T10:36:01Z | |
| dc.date.available | 2022-02-24T10:36:01Z | |
| dc.date.issued | 2022 | |
| dc.identifier | ONIX_20220224_9783036529370_72 | |
| dc.identifier.uri | https://directory.doabooks.org/handle/20.500.12854/78774 | |
| dc.description.abstract | Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others. | |
| dc.language | English | |
| dc.subject.classification | thema EDItEUR::K Economics, Finance, Business and Management::KN Industry and industrial studies::KNT Media, entertainment, information and communication industries::KNTX Information technology industries | en_US |
| dc.subject.other | 3D model | |
| dc.subject.other | integrity protection | |
| dc.subject.other | fragile watermarking | |
| dc.subject.other | data hiding | |
| dc.subject.other | genetic algorithm | |
| dc.subject.other | Karhunen–Loève transform | |
| dc.subject.other | screen-cam process | |
| dc.subject.other | local square feature region | |
| dc.subject.other | synchronization | |
| dc.subject.other | DFT | |
| dc.subject.other | robust watermarking | |
| dc.subject.other | watermarking protocols | |
| dc.subject.other | digital copyright protection | |
| dc.subject.other | blockchain | |
| dc.subject.other | block embedding | |
| dc.subject.other | embedding capacity | |
| dc.subject.other | embedding efficiency | |
| dc.subject.other | optimal selection | |
| dc.subject.other | parity assignment | |
| dc.subject.other | steganograph | |
| dc.subject.other | steganalysis | |
| dc.subject.other | stegdetect | |
| dc.subject.other | digital forensics | |
| dc.subject.other | digital watermarking | |
| dc.subject.other | digital rights management | |
| dc.subject.other | digital fingerprinting | |
| dc.subject.other | cryptography | |
| dc.subject.other | MIDI | |
| dc.subject.other | velocity values | |
| dc.subject.other | carrier file | |
| dc.subject.other | stego file | |
| dc.subject.other | capacity | |
| dc.subject.other | steganalysis resilience | |
| dc.subject.other | audibility | |
| dc.subject.other | file-size change-rate | |
| dc.subject.other | mean absolute error | |
| dc.subject.other | peak signal-to-noise ratio | |
| dc.subject.other | quantization level difference | |
| dc.subject.other | AMBTC | |
| dc.subject.other | reversible data hiding | |
| dc.subject.other | high capacity | |
| dc.subject.other | cryptographic hash function | |
| dc.subject.other | hash chain | |
| dc.subject.other | plausible deniability | |
| dc.subject.other | steganography | |
| dc.subject.other | covert channel | |
| dc.subject.other | deep learning models | |
| dc.subject.other | ownership | |
| dc.subject.other | intellectual property | |
| dc.subject.other | watermarking | |
| dc.subject.other | security and privacy | |
| dc.subject.other | private model | |
| dc.subject.other | network covert channels | |
| dc.subject.other | detection | |
| dc.subject.other | stegomalware | |
| dc.subject.other | traffic sanitization | |
| dc.subject.other | normalization | |
| dc.subject.other | propaganda detection | |
| dc.subject.other | mixed-code identification | |
| dc.subject.other | text analysis | |
| dc.subject.other | machine learning | |
| dc.subject.other | internet-based crimes | |
| dc.subject.other | cyber terrorist networks | |
| dc.subject.other | cyber-criminality | |
| dc.subject.other | n/a | |
| dc.title | Data Hiding and Its Applications | |
| dc.title.alternative | Digital Watermarking and Steganography | |
| dc.type | book | |
| oapen.identifier.doi | 10.3390/books978-3-0365-2937-0 | |
| oapen.relation.isPublishedBy | 46cabcaa-dd94-4bfe-87b4-55023c1b36d0 | |
| oapen.relation.isbn | 9783036529370 | |
| oapen.relation.isbn | 9783036529363 | |
| oapen.pages | 234 | |
| oapen.place.publication | Basel |
Files in this item
| Files | Size | Format | View |
|---|---|---|---|
|
There are no files associated with this item. |
|||

