Data Hiding and Its Applications : : Digital Watermarking and Steganography / / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi.
Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding metho...
Saved in:
VerfasserIn: | |
---|---|
TeilnehmendeR: | |
Place / Publishing House: | Basel : : MDPI - Multidisciplinary Digital Publishing Institute,, [2022] ©2022 |
Year of Publication: | 2022 |
Language: | English |
Physical Description: | 1 online resource (234 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993562093104498 |
---|---|
ctrlnum |
(CKB)4920000001372747 (NjHacI)994920000001372747 (EXLCZ)994920000001372747 |
collection |
bib_alma |
record_format |
marc |
spelling |
Megías, David, author. Data Hiding and Its Applications : Digital Watermarking and Steganography / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi. Data Hiding and Its Applications Basel : MDPI - Multidisciplinary Digital Publishing Institute, [2022] ©2022 1 online resource (234 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Description based on: online resource; title from PDF information screen (Worldcat, viewed March 25, 2023). Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others. About the Editors -- Data Hiding and Its Applications: Digital Watermarking and Steganography -- Blockchain-Based Multimedia Content Protection: Review and Open Challenges -- Trends and Challenges in Network Covert Channels Countermeasures -- Fragile Watermarking of 3D Models in a Transformed Domain -- Screen-Cam Robust Image Watermarking with Feature-Based Synchronization -- A Watermarking Protocol Based on Blockchain -- KeyNet: An Asymmetric Key-Style Framework for Watermarking Deep Learning Models -- Block-Based Steganography Method Using Optimal Selection to Reach High Efficiency and Capacity for Palette Images -- A False Negative Study of the Steganalysis Tool Stegdetect -- Velody 2-Resilient High-Capacity MIDI Steganography for Organ and Harpsichord Music -- Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains -- An Adaptive Reversible Data Hiding Scheme Using AMBTC and Quantization Level Difference -- An Algorithm for the Detection of Hidden Propaganda in Mixed-Code Text over the Internet. Information technology. Cryptography. 3-0365-2937-3 Mazurczyk, Wojciech, author. Kuribayashi, Minoru, author. |
language |
English |
format |
eBook |
author |
Megías, David, Mazurczyk, Wojciech, Kuribayashi, Minoru, |
spellingShingle |
Megías, David, Mazurczyk, Wojciech, Kuribayashi, Minoru, Data Hiding and Its Applications : Digital Watermarking and Steganography / About the Editors -- Data Hiding and Its Applications: Digital Watermarking and Steganography -- Blockchain-Based Multimedia Content Protection: Review and Open Challenges -- Trends and Challenges in Network Covert Channels Countermeasures -- Fragile Watermarking of 3D Models in a Transformed Domain -- Screen-Cam Robust Image Watermarking with Feature-Based Synchronization -- A Watermarking Protocol Based on Blockchain -- KeyNet: An Asymmetric Key-Style Framework for Watermarking Deep Learning Models -- Block-Based Steganography Method Using Optimal Selection to Reach High Efficiency and Capacity for Palette Images -- A False Negative Study of the Steganalysis Tool Stegdetect -- Velody 2-Resilient High-Capacity MIDI Steganography for Organ and Harpsichord Music -- Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains -- An Adaptive Reversible Data Hiding Scheme Using AMBTC and Quantization Level Difference -- An Algorithm for the Detection of Hidden Propaganda in Mixed-Code Text over the Internet. |
author_facet |
Megías, David, Mazurczyk, Wojciech, Kuribayashi, Minoru, Mazurczyk, Wojciech, Kuribayashi, Minoru, |
author_variant |
d m dm w m wm m k mk |
author_role |
VerfasserIn VerfasserIn VerfasserIn |
author2 |
Mazurczyk, Wojciech, Kuribayashi, Minoru, |
author2_role |
TeilnehmendeR TeilnehmendeR |
author_sort |
Megías, David, |
title |
Data Hiding and Its Applications : Digital Watermarking and Steganography / |
title_sub |
Digital Watermarking and Steganography / |
title_full |
Data Hiding and Its Applications : Digital Watermarking and Steganography / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi. |
title_fullStr |
Data Hiding and Its Applications : Digital Watermarking and Steganography / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi. |
title_full_unstemmed |
Data Hiding and Its Applications : Digital Watermarking and Steganography / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi. |
title_auth |
Data Hiding and Its Applications : Digital Watermarking and Steganography / |
title_alt |
Data Hiding and Its Applications |
title_new |
Data Hiding and Its Applications : |
title_sort |
data hiding and its applications : digital watermarking and steganography / |
publisher |
MDPI - Multidisciplinary Digital Publishing Institute, |
publishDate |
2022 |
physical |
1 online resource (234 pages) |
contents |
About the Editors -- Data Hiding and Its Applications: Digital Watermarking and Steganography -- Blockchain-Based Multimedia Content Protection: Review and Open Challenges -- Trends and Challenges in Network Covert Channels Countermeasures -- Fragile Watermarking of 3D Models in a Transformed Domain -- Screen-Cam Robust Image Watermarking with Feature-Based Synchronization -- A Watermarking Protocol Based on Blockchain -- KeyNet: An Asymmetric Key-Style Framework for Watermarking Deep Learning Models -- Block-Based Steganography Method Using Optimal Selection to Reach High Efficiency and Capacity for Palette Images -- A False Negative Study of the Steganalysis Tool Stegdetect -- Velody 2-Resilient High-Capacity MIDI Steganography for Organ and Harpsichord Music -- Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains -- An Adaptive Reversible Data Hiding Scheme Using AMBTC and Quantization Level Difference -- An Algorithm for the Detection of Hidden Propaganda in Mixed-Code Text over the Internet. |
isbn |
3-0365-2937-3 |
callnumber-first |
T - Technology |
callnumber-subject |
T - General Technology |
callnumber-label |
T58 |
callnumber-sort |
T 258.5 M445 42022 |
illustrated |
Not Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
004 - Data processing & computer science |
dewey-full |
004 |
dewey-sort |
14 |
dewey-raw |
004 |
dewey-search |
004 |
work_keys_str_mv |
AT megiasdavid datahidinganditsapplicationsdigitalwatermarkingandsteganography AT mazurczykwojciech datahidinganditsapplicationsdigitalwatermarkingandsteganography AT kuribayashiminoru datahidinganditsapplicationsdigitalwatermarkingandsteganography AT megiasdavid datahidinganditsapplications AT mazurczykwojciech datahidinganditsapplications AT kuribayashiminoru datahidinganditsapplications |
status_str |
n |
ids_txt_mv |
(CKB)4920000001372747 (NjHacI)994920000001372747 (EXLCZ)994920000001372747 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Data Hiding and Its Applications : Digital Watermarking and Steganography / |
author2_original_writing_str_mv |
noLinkedField noLinkedField |
_version_ |
1764990041821544448 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03000nam a2200349 i 4500</leader><controlfield tag="001">993562093104498</controlfield><controlfield tag="005">20230326124222.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">230326s2022 sz o 000 0 eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4920000001372747</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)994920000001372747</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994920000001372747</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">T58.5</subfield><subfield code="b">.M445 2022</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Megías, David,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data Hiding and Its Applications :</subfield><subfield code="b">Digital Watermarking and Steganography /</subfield><subfield code="c">David Megías, Wojciech Mazurczyk, Minoru Kuribayashi.</subfield></datafield><datafield tag="246" ind1=" " ind2=" "><subfield code="a">Data Hiding and Its Applications </subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Basel :</subfield><subfield code="b">MDPI - Multidisciplinary Digital Publishing Institute,</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (234 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on: online resource; title from PDF information screen (Worldcat, viewed March 25, 2023).</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">About the Editors -- Data Hiding and Its Applications: Digital Watermarking and Steganography -- Blockchain-Based Multimedia Content Protection: Review and Open Challenges -- Trends and Challenges in Network Covert Channels Countermeasures -- Fragile Watermarking of 3D Models in a Transformed Domain -- Screen-Cam Robust Image Watermarking with Feature-Based Synchronization -- A Watermarking Protocol Based on Blockchain -- KeyNet: An Asymmetric Key-Style Framework for Watermarking Deep Learning Models -- Block-Based Steganography Method Using Optimal Selection to Reach High Efficiency and Capacity for Palette Images -- A False Negative Study of the Steganalysis Tool Stegdetect -- Velody 2-Resilient High-Capacity MIDI Steganography for Organ and Harpsichord Music -- Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains -- An Adaptive Reversible Data Hiding Scheme Using AMBTC and Quantization Level Difference -- An Algorithm for the Detection of Hidden Propaganda in Mixed-Code Text over the Internet.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-0365-2937-3</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mazurczyk, Wojciech,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kuribayashi, Minoru,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-04-15 13:50:52 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-09-22 08:09:39 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5338126390004498&Force_direct=true</subfield><subfield code="Z">5338126390004498</subfield><subfield code="8">5338126390004498</subfield></datafield></record></collection> |