logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Multimedia Security: Watermarking, Steganography, and Forensics by Frank Y. Shih (Editor) ISBN 9781138072541, 9781315216928, 9781351824125, 9781351832816, 9781439873311, 9781439873328, 1138072540, 1315216922, 1351824120

  • SKU: EBN-12054126
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

4.8

17 reviews
Instant download (eBook) Multimedia Security: Watermarking, Steganography, and Forensics after payment.
Authors:Frank Y. Shih (Editor)
Year:2013
Editon:1
Publisher:CRC Press
Language:english
File Size:11.51 MB
Format:pdf
ISBNS:9781138072541, 9781315216928, 9781351824125, 9781351832816, 9781439873311, 9781439873328, 1138072540, 1315216922, 1351824120
Categories: Ebooks

Product desciption

(Ebook) Multimedia Security: Watermarking, Steganography, and Forensics by Frank Y. Shih (Editor) ISBN 9781138072541, 9781315216928, 9781351824125, 9781351832816, 9781439873311, 9781439873328, 1138072540, 1315216922, 1351824120

Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, this book presents a wealth of everyday protection application examples in fields including multimedia mining and classification, digital watermarking, steganography, and digital forensics.Giving readers an in-depth overview of different aspects of information security mechanisms and methods, this resource also serves as an instructional tool on how to use the fundamental theoretical framework required for the development of extensive advanced techniques. The presentation of several robust algorithms illustrates this framework, helping readers to quickly master and apply fundamental principles.Presented case studies cover:The execution (and feasibility) of techniques used to discover hidden knowledge by applying multimedia duplicate mining methods to large multimedia contentDifferent types of image steganographic schemes based on vector quantizationTechniques used to detect changes in human motion behavior and to classify different types of small-group motion behaviorUseful for students, researchers, and professionals, this book consists of a variety of technical tutorials that offer an abundance of graphs and examples to powerfully convey the principles of multimedia security and steganography. Imparting the extensive experience of the contributors, this approach simplifies problems, helping readers more easily understand even the most complicated theories. It also enables them to uncover novel concepts involved in the implementation of algorithms, which can lead to the discovery of new problems and new means of solving them.
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products