Fundamentals of Media Security
by WeiQi Yan, Jonathan Weir
Publisher: BookBoon 2010
ISBN-13: 9788776817060
Number of pages: 110
Description:
This introductory text covers media security, starting off by highlighting various types of objective and subjective assessment criteria used to evaluate various multimedia types. Steganography algorithms are detailed along with detection of information hiding. A brief history of digital watermarking is presented which includes examples of fragile and robust techniques. Digital scrambling of images and audio is examined.
Download or read it online for free here:
Download link
(4.4MB, PDF)
Similar books
![Book cover: Cryptography and Data Security](images/3186.jpg)
by Dorothy Elizabeth Robling Denning - Addison-Wesley
The book introduces the mathematical principles of data security and shows how these principles apply to operating systems, database systems, and computer networks. It is for students and professionals seeking an introduction to these principles.
(18225 views)
![Book cover: Safeguarding Your Technology](images/5401.jpg)
by Tom Szuba - NCES
This guide has been developed for educational administrators at the building, campus, district, system, and state levels. It will help them better understand how to effectively secure their information, software, computer and networking equipment.
(10643 views)
![Book cover: Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar](images/9865.jpg)
by Lillian Ablon, Martin C. Libicki, Andrea A. Golay - RAND Corporation
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report describes the fundamental characteristics of these markets.
(7979 views)
![Book cover: Security Enhanced Applications for Information Systems](images/7614.jpg)
by Christos Kalloniatis - InTech
Designing and implementing security enhanced systems is of vital importance. This book aims to present a number of innovative security enhanced applications. It involves cases based on the standalone, network and Cloud environments.
(9986 views)