Data Hiding and Its Applications : : Digital Watermarking and Steganography / / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi.

Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding metho...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
TeilnehmendeR:
Place / Publishing House:Basel : : MDPI - Multidisciplinary Digital Publishing Institute,, [2022]
©2022
Year of Publication:2022
Language:English
Physical Description:1 online resource (234 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 03000nam a2200349 i 4500
001 993562093104498
005 20230326124222.0
006 m o d
007 cr |||||||||||
008 230326s2022 sz o 000 0 eng d
035 |a (CKB)4920000001372747 
035 |a (NjHacI)994920000001372747 
035 |a (EXLCZ)994920000001372747 
040 |a NjHacI  |b eng  |e rda  |c NjHacl 
050 4 |a T58.5  |b .M445 2022 
082 0 4 |a 004  |2 23 
100 1 |a Megías, David,  |e author. 
245 1 0 |a Data Hiding and Its Applications :  |b Digital Watermarking and Steganography /  |c David Megías, Wojciech Mazurczyk, Minoru Kuribayashi. 
246 |a Data Hiding and Its Applications  
264 1 |a Basel :  |b MDPI - Multidisciplinary Digital Publishing Institute,  |c [2022] 
264 4 |c ©2022 
300 |a 1 online resource (234 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 |a Description based on: online resource; title from PDF information screen (Worldcat, viewed March 25, 2023). 
520 |a Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others. 
505 0 |a About the Editors -- Data Hiding and Its Applications: Digital Watermarking and Steganography -- Blockchain-Based Multimedia Content Protection: Review and Open Challenges -- Trends and Challenges in Network Covert Channels Countermeasures -- Fragile Watermarking of 3D Models in a Transformed Domain -- Screen-Cam Robust Image Watermarking with Feature-Based Synchronization -- A Watermarking Protocol Based on Blockchain -- KeyNet: An Asymmetric Key-Style Framework for Watermarking Deep Learning Models -- Block-Based Steganography Method Using Optimal Selection to Reach High Efficiency and Capacity for Palette Images -- A False Negative Study of the Steganalysis Tool Stegdetect -- Velody 2-Resilient High-Capacity MIDI Steganography for Organ and Harpsichord Music -- Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains -- An Adaptive Reversible Data Hiding Scheme Using AMBTC and Quantization Level Difference -- An Algorithm for the Detection of Hidden Propaganda in Mixed-Code Text over the Internet. 
650 0 |a Information technology. 
650 0 |a Cryptography. 
776 |z 3-0365-2937-3 
700 1 |a Mazurczyk, Wojciech,  |e author. 
700 1 |a Kuribayashi, Minoru,  |e author. 
906 |a BOOK 
ADM |b 2023-04-15 13:50:52 Europe/Vienna  |f system  |c marc21  |a 2022-09-22 08:09:39 Europe/Vienna  |g false 
AVE |P DOAB Directory of Open Access Books  |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5338126390004498&Force_direct=true  |Z 5338126390004498  |8 5338126390004498