Feedback

X
Data Hiding and Its Applications
0 Ungluers have Faved this Work
Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others.

This book is included in DOAB.

Why read this book? Have your say.

You must be logged in to comment.

Rights Information

Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.

Downloads

This work has been downloaded 52 times via unglue.it ebook links.
  1. 52 - pdf (CC BY) at Unglue.it.

Keywords

  • 3D model
  • AMBTC
  • audibility
  • block embedding
  • blockchain
  • capacity
  • carrier file
  • covert channel
  • cryptographic hash function
  • Cryptography
  • cyber terrorist networks
  • cyber-criminality
  • data hiding
  • deep learning models
  • Detection
  • DFT
  • digital copyright protection
  • digital fingerprinting
  • digital forensics
  • Digital rights management
  • Digital watermarking
  • Economics, finance, business & management
  • embedding capacity
  • embedding efficiency
  • file-size change-rate
  • fragile watermarking
  • genetic algorithm
  • hash chain
  • high capacity
  • Industry & industrial studies
  • Information technology industries
  • integrity protection
  • Intellectual property
  • internet-based crimes
  • Karhunen–Loève transform
  • local square feature region
  • Machine learning
  • mean absolute error
  • Media, information & communication industries
  • Midi
  • mixed-code identification
  • n/a
  • network covert channels
  • normalization
  • optimal selection
  • ownership
  • parity assignment
  • peak signal-to-noise ratio
  • plausible deniability
  • private model
  • propaganda detection
  • quantization level difference
  • reversible data hiding
  • robust watermarking
  • screen-cam process
  • Security and Privacy
  • steganalysis
  • steganalysis resilience
  • steganograph
  • steganography
  • stegdetect
  • stego file
  • stegomalware
  • Synchronization
  • Text Analysis
  • traffic sanitization
  • velocity values
  • watermarking
  • watermarking protocols

Links

DOI: 10.3390/books978-3-0365-2937-0

Editions

edition cover

Share

Copy/paste this into your site: