| 000 | 02687nam a22003498i 4500 | ||
|---|---|---|---|
| 001 | CR9781139192903 | ||
| 003 | UkCbUP | ||
| 005 | 20200124160300.0 | ||
| 006 | m|||||o||d|||||||| | ||
| 007 | cr|||||||||||| | ||
| 008 | 111109s2010||||enk o ||1 0|eng|d | ||
| 020 | _a9781139192903 (ebook) | ||
| 020 | _z9780521190190 (hardback) | ||
| 040 |
_aUkCbUP _beng _erda _cUkCbUP |
||
| 050 | 0 | 0 |
_aQA76.9.A25 _bF75 2010 |
| 082 | 0 | 4 |
_a005.82 _222 |
| 100 | 1 |
_aFridrich, Jessica, _eauthor. |
|
| 245 | 1 | 0 |
_aSteganography in digital media : _bprinciples, algorithms, and applications / _cJessica Fridrich. |
| 264 | 1 |
_aCambridge : _bCambridge University Press, _c2010. |
|
| 300 |
_a1 online resource (xxii, 437 pages) : _bdigital, PDF file(s). |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 500 | _aTitle from publisher's bibliographic system (viewed on 05 Oct 2015). | ||
| 505 | 0 | _a1. Introduction -- 2. Digital image formats -- 3. Digital image acquisition -- 4. Steganographic channel -- 5. Naive steganography -- 6. Steganographic security -- 7. Practical steganographic methods -- 8. Matrix embedding -- 9. Non-shared selection channel -- 10. Steganalysis -- 11. Selected targeted attacks -- 12. Blind steganalysis -- 13. Steganography -- A. Statistics -- B. Information theory -- C. Linear codes -- D. Signal detection and estimation -- E. Support vector machines. | |
| 520 | _aSteganography, the art of hiding of information in apparently innocuous objects or images, is a field with a rich heritage, and an area of rapid current development. This clear, self-contained guide shows you how to understand the building blocks of covert communication in digital media files and how to apply the techniques in practice, including those of steganalysis, the detection of steganography. Assuming only a basic knowledge in calculus and statistics, the book blends the various strands of steganography, including information theory, coding, signal estimation and detection, and statistical signal processing. Experiments on real media files demonstrate the performance of the techniques in real life, and most techniques are supplied with pseudo-code, making it easy to implement the algorithms. The book is ideal for students taking courses on steganography and information hiding, and is also a useful reference for engineers and practitioners working in media security and information assurance. | ||
| 650 | 0 | _aData encryption (Computer science) | |
| 650 | 0 | _aData protection. | |
| 650 | 0 | _aDigital media. | |
| 776 | 0 | 8 |
_iPrint version: _z9780521190190 |
| 856 | 4 | 0 | _uhttps://doi.org/10.1017/CBO9781139192903 |
| 999 |
_c520310 _d520308 |
||