Multimedia Security : Watermarking, Steganography, and Forensics

個数:
電子版価格
¥19,181
  • 電子版あり
  • ポイントキャンペーン

Multimedia Security : Watermarking, Steganography, and Forensics

  • ウェブストア価格 ¥66,563(本体¥60,512)
  • CRC Press Inc(2012/08発売)
  • 外貨定価 US$ 305.00
  • 【ウェブストア限定】洋書・洋古書ポイント5倍対象商品(~2/28)
  • ポイント 3,025pt
  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 424 p./サイズ 208 illus.
  • 言語 ENG
  • 商品コード 9781439873311
  • DDC分類 005.8

Full Description

Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, this book presents a wealth of everyday protection application examples in fields including multimedia mining and classification, digital watermarking, steganography, and digital forensics.

Giving readers an in-depth overview of different aspects of information security mechanisms and methods, this resource also serves as an instructional tool on how to use the fundamental theoretical framework required for the development of extensive advanced techniques. The presentation of several robust algorithms illustrates this framework, helping readers to quickly master and apply fundamental principles.

Presented case studies cover:

The execution (and feasibility) of techniques used to discover hidden knowledge by applying multimedia duplicate mining methods to large multimedia content
Different types of image steganographic schemes based on vector quantization
Techniques used to detect changes in human motion behavior and to classify different types of small-group motion behavior

Useful for students, researchers, and professionals, this book consists of a variety of technical tutorials that offer an abundance of graphs and examples to powerfully convey the principles of multimedia security and steganography. Imparting the extensive experience of the contributors, this approach simplifies problems, helping readers more easily understand even the most complicated theories. It also enables them to uncover novel concepts involved in the implementation of algorithms, which can lead to the discovery of new problems and new means of solving them.

Contents

Part I: Multimedia Mining and Classification

Multimedia Duplicate Mining toward Knowledge Discovery. Discriminative Learning-Assisted Video Semantic Concept Classification. An Improved Feature Vocabulary-Based Method for Image Categorization.

Part II: Watermarking

Automatic Detection and Removal of Visible Image Watermarks. Digital Watermarking Based on Chaotic Map and Reference Register. A Pseudo-Random Pixel Rearrangement Algorithm Based on Gaussian Integers for Image Watermarking. Reversible Data-Hiding Techniques for Digital Images. Watermarking Based on Local Binary Pattern Operators. Authentication of JPEG Images Based on Genetic Algorithms. An Efficient Block-Based Fragile Watermarking System for Tamper Localization and Recovery.

Part III: Steganography

Survey of Image Steganography and Steganalysis. Digital Steganographic Schemes Based on Image Vector Quantization. A Differential Evolution-Based Algorithm for Breaking the Visual Steganalytic System. Genetic Algorithm-Based Methodology for Breaking the Steganalytic Systems.

Part IV: Forensics

Image Inpainting Using an Enhanced Exemplar-Based Algorithm. A Comparison Study on Copy-Cover Image Forgery Detection. A Chaos-Based Hash Function with Both Modification Detection and Localization Capabilities. Video Forensics. Using the Self-Synchronizing Method to Improve Security of the Multi-Chaotic Systems-Based Image Encryption. Behavior Modeling of Human Objects in Multimedia Content.

最近チェックした商品