|
![]() |
|||
|
||||
OverviewThe digital revolution has brought about profound changes in our society and our lives. This book discusses the issues regarding multimedia data hiding and its application to multimedia security and communication, addressing both theoretical and practical aspects and tackling both design and attack problems. The book is organized into three parts. In the fundamental issues part, a few key elements of data hiding are identified through a layered structure; data hiding is modeled as a communication problem where the embedded data is the signal to be transmitted. A comprehensive solution is proposed that addresses considerations for choosing constant- or variable embedding rate and enhancing performance in each case. Algorithm and system designs are presented in the second part for binary images, grayscale and color images, and videos. The designs provide concrete examples, such as annotation, tamper detection, copy/access control, fingerprinting, and ownership protection. Finally, in the third part, attacks and countermeasures for both known and unknown data-hiding algorithms are considered, respectively, for problems surrounding digital watermarking and digital music. Full Product DetailsAuthor: Min Wu , Bede LiuPublisher: Springer-Verlag New York Inc. Imprint: Springer-Verlag New York Inc. Edition: 2003 ed. Dimensions: Width: 15.50cm , Height: 1.40cm , Length: 23.50cm Weight: 0.533kg ISBN: 9780387954264ISBN 10: 0387954260 Pages: 219 Publication Date: 14 January 2003 Audience: Professional and scholarly , College/higher education , Professional & Vocational , Postgraduate, Research & Scholarly Format: Hardback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of Contents1 Introduction.- 1.1 Overview of Multimedia Data Hiding.- 1.2 Book Organization.- I Fundamental Issues.- 2 Preliminaries.- 3 Basic Embedding Mechanisms.- 4 Handling Uneven Embedding Capacity.- II Algorithm and System Designs.- 5 Data Hiding in Binary Image.- 6 Multilevel Data Hiding for Image and Video.- 7 Data Hiding for Image Authentication.- 8 Data Hiding for Video Communications.- III Attacks and Countermeasures.- 9 Attacks on Known Data Hiding Algorithms.- 10 Attacks on Unknown Data Hiding Algorithms.- 11 Conclusions and Perspectives.- References.- About the Authors.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |