Book description
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics.It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today’s "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it.
Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis.
Table of contents
- Cover
- Title Page
- Copyright
- Foreword by Gildas Avoine
- Foreword by Cédric Richard
- Preface
-
1 How to Reconstruct the History of a Digital Image, and of Its Alterations
- 1.1. Introduction
- 1.2. Describing the image processing chain
- 1.3. Traces left on noise by image manipulation
- 1.4. Demosaicing and its traces
- 1.5. JPEG compression, its traces and the detection of its alterations
- 1.6. Internal similarities and manipulations
- 1.7. Direct detection of image manipulation
- 1.8. Conclusion
- 1.9. References
- 2 Deep Neural Network Attacks and Defense: The Case of Image Classification
-
3 Codes and Watermarks
- 3.1. Introduction
- 3.2. Study framework: robust watermarking
- 3.3. Index modulation
- 3.4. Error-correcting codes approach
- 3.5. Contradictory objectives of watermarking: the impact of codes
- 3.6. Latest developments in the use of correction codes for watermarking
- 3.7. Illustration of the influence of the type of code, according to the attacks
- 3.8. Using the rank metric
- 3.9. Conclusion
- 3.10. References
- 4 Invisibility
- 5 Steganography: Embedding Data Into Multimedia Content
- 6 Traitor Tracing
- 7 3D Watermarking
- 8 Steganalysis: Detection of Hidden Data in Multimedia Content
- List of Authors
- Index
- End User License Agreement
Product information
- Title: Multimedia Security, Volume 1
- Author(s):
- Release date: March 2022
- Publisher(s): Wiley-ISTE
- ISBN: 9781789450262
You might also like
book
Generative Deep Learning, 2nd Edition
Generative AI is the hottest topic in tech. This practical book teaches machine learning engineers and …
book
Flow Architectures
Software development today is embracing events and streaming data, which optimizes not only how technology interacts …
book
Designing Autonomous AI
Early rules-based artificial intelligence demonstrated intriguing decision-making capabilities but lacked perception and didn't learn. AI today, …
book
Tidy First?
Messy code is a nuisance. "Tidying" code, to make it more readable, requires breaking it up …