0%

Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics.

It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today’s "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it.

Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Foreword by Gildas Avoine
  5. Foreword by Cédric Richard
  6. Preface
  7. 1 How to Reconstruct the History of a Digital Image, and of Its Alterations
  8. 2 Deep Neural Network Attacks and Defense: The Case of Image Classification
  9. 3 Codes and Watermarks
  10. 4 Invisibility
  11. 5 Steganography: Embedding Data Into Multimedia Content
  12. 6 Traitor Tracing
  13. 7 3D Watermarking
  14. 8 Steganalysis: Detection of Hidden Data in Multimedia Content
  15. List of Authors
  16. Index
  17. End User License Agreement
18.191.5.239