Data Hiding Fundamentals and Applications

Data Hiding Fundamentals and Applications
Author: Husrev T. Sencar,Mahalingam Ramkumar,Ali N. Akansu
Publsiher: Academic Press
Total Pages: 270
Release: 2004-08-20
Genre: Computers
ISBN: 9780120471447

Download Data Hiding Fundamentals and Applications Book in PDF, Epub and Kindle

Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with respect to multimedia content. The owners of this content face enormous challenges in safeguarding their intellectual property, while still exploiting the Internet as an important resource for commerce. Data Hiding Fundamentals and Applications focuses on the theory and state-of-the-art applications of content security and data hiding in digital multimedia. One of the pillars of content security solutions is the imperceptible insertion of information into multimedia data for security purposes; the idea is that this inserted information will allow detection of unauthorized usage. Provides a theoretical framework for data hiding, in a signal processing context Realistic applications in secure, multimedia delivery Compression robust data hiding Data hiding for proof of ownership--WATERMARKING Data hiding algorithms for image and video watermarking

Multimedia Information Hiding Technologies and Methodologies for Controlling Data

Multimedia Information Hiding Technologies and Methodologies for Controlling Data
Author: Kondo, Kazuhiro
Publsiher: IGI Global
Total Pages: 497
Release: 2012-10-31
Genre: Computers
ISBN: 9781466622180

Download Multimedia Information Hiding Technologies and Methodologies for Controlling Data Book in PDF, Epub and Kindle

The widespread use of high-speed networks has made the global distribution of digital media contents readily available in an instant. As a result, data hiding was created in an attempt to control the distribution of these copies by verifying or tracking the media signals picked up from copyright information, such as the author or distributor ID. Multimedia Information Hiding Technologies and Methodologies for Controlling Data presents the latest methods and research results in the emerging field of Multimedia Information Hiding (MIH). This comprehensive collection is beneficial to all researchers and engineers working globally in this field and aims to inspire new graduate-level students as they explore this promising field.

Intelligent Multimedia Data Hiding

Intelligent Multimedia Data Hiding
Author: Hsiang-Cheh Huang,Wai-Chi Fang
Publsiher: Springer
Total Pages: 400
Release: 2007-04-25
Genre: Technology & Engineering
ISBN: 9783540711698

Download Intelligent Multimedia Data Hiding Book in PDF, Epub and Kindle

This book lays out all the latest research in the area of multimedia data hiding. The book introduces multimedia signal processing and information hiding techniques. It includes multimedia representation, digital watermarking fundamentals and requirements of watermarking. It moves on to cover the recent advances in multimedia signal processing, before presenting information hiding techniques including steganography, secret sharing and watermarking. The final part of this book includes practical applications of intelligent multimedia signal processing and data hiding systems.

Digital Information and Communication Technology and Its Applications

Digital Information and Communication Technology and Its Applications
Author: Hocine Cherifi,Jasni Mohamad Zain,Eyas El-Qawasmeh
Publsiher: Springer
Total Pages: 806
Release: 2011-06-17
Genre: Computers
ISBN: 9783642219849

Download Digital Information and Communication Technology and Its Applications Book in PDF, Epub and Kindle

This two-volume set CCIS 166 and CCIS 167 constitutes the refereed proceedings of the International Conference on Digital Information and Communication Technology and its Applications, DICTAP 2011, held in Dijon, France, in June 2010. The 128 revised full papers presented in both volumes were carefully reviewed and selected from 330 submissions. The papers are organized in topical sections on Web applications; image processing; visual interfaces and user experience; network security; ad hoc network; cloud computing; Data Compression; Software Engineering; Networking and Mobiles; Distributed and Parallel processing; social networks; ontology; algorithms; multimedia; e-learning; interactive environments and emergent technologies for e-learning; signal processing; information and data management.

Aspects of Network and Information Security

Aspects of Network and Information Security
Author: NATO Science for Peace and Security Programme,IOS Press
Publsiher: IOS Press
Total Pages: 368
Release: 2008-06-24
Genre: Computers
ISBN: 9781607503262

Download Aspects of Network and Information Security Book in PDF, Epub and Kindle

Network security is concerned with creating a secure inter-connected network that is designed so that on the one hand, users cannot perform actions that they are not allowed to perform, but on the other hand, can perform the actions that they are allowed to. Network security not only involves specifying and implementing a security policy that describes access control, but also implementing an Intrusion Detection System as a tool for detecting attempted attacks or intrusions by crackers or automated attack tools and identifying security breaches such as incoming shellcode, viruses, worms, malware and trojan horses transmitted via a computer system or network. Today’s computer infrastructure is exposed to several kinds of security threats ranging from virus attacks, unauthorised data access, sniffing and password cracking. Understanding network vulnerabilities in order to protect networks from external and internal threats is vital to the world’s economy and should be given the highest priority. Computer and network security involves many important and complicated issues and this gathering of scientists will help not only in raising awareness but also in teaching participants the state-of-the-art of security techniques. Topics in network security, information security and coding are discussed in this volume.

Information Hiding in Communication Networks

Information Hiding in Communication Networks
Author: Wojciech Mazurczyk,Steffen Wendzel,Sebastian Zander,Amir Houmansadr,Krzysztof Szczypiorski
Publsiher: John Wiley & Sons
Total Pages: 294
Release: 2016-02-29
Genre: Technology & Engineering
ISBN: 9781118861691

Download Information Hiding in Communication Networks Book in PDF, Epub and Kindle

Describes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications. Highlights development trends and potential future directions of Information Hiding Introduces a new classification and taxonomy for modern data hiding techniques Presents different types of network steganography mechanisms Introduces several example applications of information hiding in communication networks including some recent covert communication techniques in popular Internet services

Multimedia Security Handbook

Multimedia Security Handbook
Author: Borko Furht,Darko Kirovski
Publsiher: CRC Press
Total Pages: 610
Release: 2004-12-28
Genre: Computers
ISBN: 9781000611090

Download Multimedia Security Handbook Book in PDF, Epub and Kindle

Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. Multimedia Security Handbook addresses multiple issues related to the protection of digital media, including audio, image, and video content. This volume examines leading-edge multimedia securit

SOME INVESTIGATIONS ON STEGANOGRAPHY TECHNIQUES

SOME INVESTIGATIONS ON STEGANOGRAPHY TECHNIQUES
Author: Dr. V. Nagaraj
Publsiher: V. Nagaraj
Total Pages: 229
Release: 2021-05-20
Genre: Computers
ISBN: 9789354264542

Download SOME INVESTIGATIONS ON STEGANOGRAPHY TECHNIQUES Book in PDF, Epub and Kindle

Steganography is the art of hiding and transmitting data through apparently innocuous carriers in an effort to conceal the existence of the secret data. The Least Significant Bit (LSB) steganography that replaces the least significant bits of the host medium is a widely used technique with low computational complexity and high insertion capacity. Although it has good perceptual transparency, it is vulnerable to steganalysis which is based on statistical analysis. Many other steganography algorithms have been developed such as Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Spread Spectrum Embedding. But the insertion capacities for all the above methods were not satisfied. Therefore, developing new steganography algorithms against statistical analysis seems to be the prime requirement in steganography. The LSB insertion method is the most common and easiest method for embedding messages in an image with high capacity. However, it is detectable by statistical analysis such as RS and Chisquare analysis. Hence, researchers are still in look out for steganography techniques with enhanced insertion capacity of secret data along with greater security and which can resist attacks. In this work, in order to enhance the embedding capacity of secret data four techniques for secret communication have been proposed. They are classified into two categories. In first category, cryptography is used along with steganography to enhance the security, while in second category only steganography is used. In the first category, two improved LSB substitution techniques have been proposed. The first technique is known as Zigzag Modulo Substitution Method in which embedding locations are Sequence based. The second technique is known as Random Modulo Substitution Method using Random Technique in LSB Steganography and user key based LSB substitution steganography for RGB images where in, RSA algorithm is used for encryption. The techniques under the first category are exclusively LSB array based. The first LSB array based technique embeds message bits into LSB arrays of cover image by using zigzag scanning. On the other hand the Random Modulo Substitution Method embeds secret data into the different locations of cover image by using pseudo random index generator. Moreover, both these LSB array based techniques use RSA algorithm to enhance security. Histogram and Statistical analysis performed on the stego image proved that the proposed techniques can effectively resist steganalysis. Comparison of the statistical parameters like Root Mean Square (RMS), Peak Signal to Noise Ratio (PSNR) and Structural Similarity Index Matrix (SSIM) for the proposed techniques with cover image and stego image was carried out and analyzed. The Second category includes pixel value modification method and pixel value differencing method in which the embedding decision for a target pixel is taken by random technique. Data hiding by using pixel value modification with modulus function in color images guarantees that no pixel value will exceed the range 0 to 255 in stego image. In the existing PVD embedding methods, only one secret digit was embedded for two consecutive pixels, but the proposed method embeds one secret digit in only one pixel. Proposed method on color images gives more capacity and security than the PVD methods. It also provides better visual quality of stego image. Moreover, proposed method extracts the hidden secret message efficiently without using the range tables. In existing steganography algorithms like Pixel Value Differencing (PVD) methods, the secret data are embedded into the differences of adjacent pixels. This pair wise modification mechanism in cover image increases the histogram distortion.