Fundamentals of Media Security
by WeiQi Yan, Jonathan Weir
Publisher: BookBoon 2010
ISBN-13: 9788776817060
Number of pages: 110
Description:
This introductory text covers media security, starting off by highlighting various types of objective and subjective assessment criteria used to evaluate various multimedia types. Steganography algorithms are detailed along with detection of information hiding. A brief history of digital watermarking is presented which includes examples of fragile and robust techniques. Digital scrambling of images and audio is examined.
Download or read it online for free here:
Download link
(4.4MB, PDF)
Similar books
A Guide to Claims-Based Identity and Access Control
by Dominick Baier, at al. - Microsoft Press
This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or IT professional.
(13268 views)
by Dominick Baier, at al. - Microsoft Press
This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or IT professional.
(13268 views)
Security Enhanced Applications for Information Systems
by Christos Kalloniatis - InTech
Designing and implementing security enhanced systems is of vital importance. This book aims to present a number of innovative security enhanced applications. It involves cases based on the standalone, network and Cloud environments.
(10185 views)
by Christos Kalloniatis - InTech
Designing and implementing security enhanced systems is of vital importance. This book aims to present a number of innovative security enhanced applications. It involves cases based on the standalone, network and Cloud environments.
(10185 views)
Forensic Analysis of Database Tampering
by Kyriacos E. Pavlou, Richard T. Snodgrass - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(21925 views)
by Kyriacos E. Pavlou, Richard T. Snodgrass - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(21925 views)
Security Concepts
by Travis H. - subspacefield.org
This is an online book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting examples. It is not intended to be an introductory text, although a beginner could gain something from it.
(12317 views)
by Travis H. - subspacefield.org
This is an online book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting examples. It is not intended to be an introductory text, although a beginner could gain something from it.
(12317 views)