03200nam 2200469 450 991083103470332120220929103606.01-119-90180-41-119-90178-210.1002/9781119901808(MiAaPQ)EBC6887262(Au-PeEL)EBL6887262(CKB)21167582900041(OCoLC)1305059757(OCoLC-P)1305059757(CaSebORM)9781789450262(EXLCZ)992116758290004120220929d2022 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierMultimedia securityVolume 1Authentication and data hiding /William Puech, editorHoboken, New Jersey :ISTE Ltd.,[2022]©20221 online resource (317 pages)Sciences. Images. Compression, coding and protection of images and videosPrint version: Puech, William Multimedia Security, Volume 1 Newark : John Wiley & Sons, Incorporated,c2022 9781789450262 How to Reconstruct the History of a Digital Image, and of Its Alterations / Quentin Bammey, Miguel Colom, Thibaud Ehret, Marina Gardella, Rafael Grompone, Jean-Michel Morel, Tina Nikoukhah, Denis Perraud -- Deep Neural Network Attacks and Defense: The Case of Image Classification / Hanwei Zhang, Teddy Furon, Laurent Amsaleg, Yannis Avrithis -- Codes and Watermarks / Pascal Lef̈vre, Philippe Carř, Philippe Gaborit -- Invisibility / Pascal Lef̈vre, Philippe Carř, David Alleysson -- Steganography: Embedding Data Into Multimedia Content / Patrick Bas, Řmi Cogranne, Marc Chaumont -- Traitor Tracing / Teddy Furon -- 3D Watermarking / Šbastien Beugnon, Vincent Itier, William Puech -- Steganalysis: Detection of Hidden Data in Multimedia Content / Řmi Cogranne, Marc Chaumont, Patrick Bas.Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis.Multimedia systemsSecurity measuresMultimedia systemsSecurity measures.006.7Puech WilliamMiAaPQMiAaPQMiAaPQBOOK9910831034703321Multimedia security2855021UNINA