LEADER 03200nam 2200469 450 001 9910831034703321 005 20220929103606.0 010 $a1-119-90180-4 010 $a1-119-90178-2 024 7 $a10.1002/9781119901808 035 $a(MiAaPQ)EBC6887262 035 $a(Au-PeEL)EBL6887262 035 $a(CKB)21167582900041 035 $a(OCoLC)1305059757 035 $a(OCoLC-P)1305059757 035 $a(CaSebORM)9781789450262 035 $a(EXLCZ)9921167582900041 100 $a20220929d2022 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aMultimedia security$hVolume 1$iAuthentication and data hiding /$fWilliam Puech, editor 210 1$aHoboken, New Jersey :$cISTE Ltd.,$d[2022] 210 4$dİ2022 215 $a1 online resource (317 pages) 225 0 $aSciences. Images. Compression, coding and protection of images and videos 311 08$aPrint version: Puech, William Multimedia Security, Volume 1 Newark : John Wiley & Sons, Incorporated,c2022 9781789450262 327 $aHow to Reconstruct the History of a Digital Image, and of Its Alterations / Quentin Bammey, Miguel Colom, Thibaud Ehret, Marina Gardella, Rafael Grompone, Jean-Michel Morel, Tina Nikoukhah, Denis Perraud -- Deep Neural Network Attacks and Defense: The Case of Image Classification / Hanwei Zhang, Teddy Furon, Laurent Amsaleg, Yannis Avrithis -- Codes and Watermarks / Pascal Lef?vre, Philippe Carr?, Philippe Gaborit -- Invisibility / Pascal Lef?vre, Philippe Carr?, David Alleysson -- Steganography: Embedding Data Into Multimedia Content / Patrick Bas, R?mi Cogranne, Marc Chaumont -- Traitor Tracing / Teddy Furon -- 3D Watermarking / S?bastien Beugnon, Vincent Itier, William Puech -- Steganalysis: Detection of Hidden Data in Multimedia Content / R?mi Cogranne, Marc Chaumont, Patrick Bas. 330 $aToday, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis. 606 $aMultimedia systems$xSecurity measures 615 0$aMultimedia systems$xSecurity measures. 676 $a006.7 702 $aPuech$b William 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910831034703321 996 $aMultimedia security$92855021 997 $aUNINA