Data Hiding and Its Applications : : Digital Watermarking and Steganography / / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi.

Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding metho...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
TeilnehmendeR:
Place / Publishing House:Basel : : MDPI - Multidisciplinary Digital Publishing Institute,, [2022]
©2022
Year of Publication:2022
Language:English
Physical Description:1 online resource (234 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993562093104498
ctrlnum (CKB)4920000001372747
(NjHacI)994920000001372747
(EXLCZ)994920000001372747
collection bib_alma
record_format marc
spelling Megías, David, author.
Data Hiding and Its Applications : Digital Watermarking and Steganography / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi.
Data Hiding and Its Applications
Basel : MDPI - Multidisciplinary Digital Publishing Institute, [2022]
©2022
1 online resource (234 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Description based on: online resource; title from PDF information screen (Worldcat, viewed March 25, 2023).
Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others.
About the Editors -- Data Hiding and Its Applications: Digital Watermarking and Steganography -- Blockchain-Based Multimedia Content Protection: Review and Open Challenges -- Trends and Challenges in Network Covert Channels Countermeasures -- Fragile Watermarking of 3D Models in a Transformed Domain -- Screen-Cam Robust Image Watermarking with Feature-Based Synchronization -- A Watermarking Protocol Based on Blockchain -- KeyNet: An Asymmetric Key-Style Framework for Watermarking Deep Learning Models -- Block-Based Steganography Method Using Optimal Selection to Reach High Efficiency and Capacity for Palette Images -- A False Negative Study of the Steganalysis Tool Stegdetect -- Velody 2-Resilient High-Capacity MIDI Steganography for Organ and Harpsichord Music -- Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains -- An Adaptive Reversible Data Hiding Scheme Using AMBTC and Quantization Level Difference -- An Algorithm for the Detection of Hidden Propaganda in Mixed-Code Text over the Internet.
Information technology.
Cryptography.
3-0365-2937-3
Mazurczyk, Wojciech, author.
Kuribayashi, Minoru, author.
language English
format eBook
author Megías, David,
Mazurczyk, Wojciech,
Kuribayashi, Minoru,
spellingShingle Megías, David,
Mazurczyk, Wojciech,
Kuribayashi, Minoru,
Data Hiding and Its Applications : Digital Watermarking and Steganography /
About the Editors -- Data Hiding and Its Applications: Digital Watermarking and Steganography -- Blockchain-Based Multimedia Content Protection: Review and Open Challenges -- Trends and Challenges in Network Covert Channels Countermeasures -- Fragile Watermarking of 3D Models in a Transformed Domain -- Screen-Cam Robust Image Watermarking with Feature-Based Synchronization -- A Watermarking Protocol Based on Blockchain -- KeyNet: An Asymmetric Key-Style Framework for Watermarking Deep Learning Models -- Block-Based Steganography Method Using Optimal Selection to Reach High Efficiency and Capacity for Palette Images -- A False Negative Study of the Steganalysis Tool Stegdetect -- Velody 2-Resilient High-Capacity MIDI Steganography for Organ and Harpsichord Music -- Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains -- An Adaptive Reversible Data Hiding Scheme Using AMBTC and Quantization Level Difference -- An Algorithm for the Detection of Hidden Propaganda in Mixed-Code Text over the Internet.
author_facet Megías, David,
Mazurczyk, Wojciech,
Kuribayashi, Minoru,
Mazurczyk, Wojciech,
Kuribayashi, Minoru,
author_variant d m dm
w m wm
m k mk
author_role VerfasserIn
VerfasserIn
VerfasserIn
author2 Mazurczyk, Wojciech,
Kuribayashi, Minoru,
author2_role TeilnehmendeR
TeilnehmendeR
author_sort Megías, David,
title Data Hiding and Its Applications : Digital Watermarking and Steganography /
title_sub Digital Watermarking and Steganography /
title_full Data Hiding and Its Applications : Digital Watermarking and Steganography / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi.
title_fullStr Data Hiding and Its Applications : Digital Watermarking and Steganography / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi.
title_full_unstemmed Data Hiding and Its Applications : Digital Watermarking and Steganography / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi.
title_auth Data Hiding and Its Applications : Digital Watermarking and Steganography /
title_alt Data Hiding and Its Applications
title_new Data Hiding and Its Applications :
title_sort data hiding and its applications : digital watermarking and steganography /
publisher MDPI - Multidisciplinary Digital Publishing Institute,
publishDate 2022
physical 1 online resource (234 pages)
contents About the Editors -- Data Hiding and Its Applications: Digital Watermarking and Steganography -- Blockchain-Based Multimedia Content Protection: Review and Open Challenges -- Trends and Challenges in Network Covert Channels Countermeasures -- Fragile Watermarking of 3D Models in a Transformed Domain -- Screen-Cam Robust Image Watermarking with Feature-Based Synchronization -- A Watermarking Protocol Based on Blockchain -- KeyNet: An Asymmetric Key-Style Framework for Watermarking Deep Learning Models -- Block-Based Steganography Method Using Optimal Selection to Reach High Efficiency and Capacity for Palette Images -- A False Negative Study of the Steganalysis Tool Stegdetect -- Velody 2-Resilient High-Capacity MIDI Steganography for Organ and Harpsichord Music -- Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains -- An Adaptive Reversible Data Hiding Scheme Using AMBTC and Quantization Level Difference -- An Algorithm for the Detection of Hidden Propaganda in Mixed-Code Text over the Internet.
isbn 3-0365-2937-3
callnumber-first T - Technology
callnumber-subject T - General Technology
callnumber-label T58
callnumber-sort T 258.5 M445 42022
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 004 - Data processing & computer science
dewey-full 004
dewey-sort 14
dewey-raw 004
dewey-search 004
work_keys_str_mv AT megiasdavid datahidinganditsapplicationsdigitalwatermarkingandsteganography
AT mazurczykwojciech datahidinganditsapplicationsdigitalwatermarkingandsteganography
AT kuribayashiminoru datahidinganditsapplicationsdigitalwatermarkingandsteganography
AT megiasdavid datahidinganditsapplications
AT mazurczykwojciech datahidinganditsapplications
AT kuribayashiminoru datahidinganditsapplications
status_str n
ids_txt_mv (CKB)4920000001372747
(NjHacI)994920000001372747
(EXLCZ)994920000001372747
carrierType_str_mv cr
is_hierarchy_title Data Hiding and Its Applications : Digital Watermarking and Steganography /
author2_original_writing_str_mv noLinkedField
noLinkedField
_version_ 1764990041821544448
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03000nam a2200349 i 4500</leader><controlfield tag="001">993562093104498</controlfield><controlfield tag="005">20230326124222.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">230326s2022 sz o 000 0 eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4920000001372747</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)994920000001372747</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994920000001372747</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">T58.5</subfield><subfield code="b">.M445 2022</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Megías, David,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data Hiding and Its Applications :</subfield><subfield code="b">Digital Watermarking and Steganography /</subfield><subfield code="c">David Megías, Wojciech Mazurczyk, Minoru Kuribayashi.</subfield></datafield><datafield tag="246" ind1=" " ind2=" "><subfield code="a">Data Hiding and Its Applications </subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Basel :</subfield><subfield code="b">MDPI - Multidisciplinary Digital Publishing Institute,</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (234 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on: online resource; title from PDF information screen (Worldcat, viewed March 25, 2023).</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">About the Editors -- Data Hiding and Its Applications: Digital Watermarking and Steganography -- Blockchain-Based Multimedia Content Protection: Review and Open Challenges -- Trends and Challenges in Network Covert Channels Countermeasures -- Fragile Watermarking of 3D Models in a Transformed Domain -- Screen-Cam Robust Image Watermarking with Feature-Based Synchronization -- A Watermarking Protocol Based on Blockchain -- KeyNet: An Asymmetric Key-Style Framework for Watermarking Deep Learning Models -- Block-Based Steganography Method Using Optimal Selection to Reach High Efficiency and Capacity for Palette Images -- A False Negative Study of the Steganalysis Tool Stegdetect -- Velody 2-Resilient High-Capacity MIDI Steganography for Organ and Harpsichord Music -- Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains -- An Adaptive Reversible Data Hiding Scheme Using AMBTC and Quantization Level Difference -- An Algorithm for the Detection of Hidden Propaganda in Mixed-Code Text over the Internet.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-0365-2937-3</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mazurczyk, Wojciech,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kuribayashi, Minoru,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-04-15 13:50:52 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-09-22 08:09:39 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5338126390004498&amp;Force_direct=true</subfield><subfield code="Z">5338126390004498</subfield><subfield code="8">5338126390004498</subfield></datafield></record></collection>