000 02687nam a22003498i 4500
001 CR9781139192903
003 UkCbUP
005 20200124160300.0
006 m|||||o||d||||||||
007 cr||||||||||||
008 111109s2010||||enk o ||1 0|eng|d
020 _a9781139192903 (ebook)
020 _z9780521190190 (hardback)
040 _aUkCbUP
_beng
_erda
_cUkCbUP
050 0 0 _aQA76.9.A25
_bF75 2010
082 0 4 _a005.82
_222
100 1 _aFridrich, Jessica,
_eauthor.
245 1 0 _aSteganography in digital media :
_bprinciples, algorithms, and applications /
_cJessica Fridrich.
264 1 _aCambridge :
_bCambridge University Press,
_c2010.
300 _a1 online resource (xxii, 437 pages) :
_bdigital, PDF file(s).
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
500 _aTitle from publisher's bibliographic system (viewed on 05 Oct 2015).
505 0 _a1. Introduction -- 2. Digital image formats -- 3. Digital image acquisition -- 4. Steganographic channel -- 5. Naive steganography -- 6. Steganographic security -- 7. Practical steganographic methods -- 8. Matrix embedding -- 9. Non-shared selection channel -- 10. Steganalysis -- 11. Selected targeted attacks -- 12. Blind steganalysis -- 13. Steganography -- A. Statistics -- B. Information theory -- C. Linear codes -- D. Signal detection and estimation -- E. Support vector machines.
520 _aSteganography, the art of hiding of information in apparently innocuous objects or images, is a field with a rich heritage, and an area of rapid current development. This clear, self-contained guide shows you how to understand the building blocks of covert communication in digital media files and how to apply the techniques in practice, including those of steganalysis, the detection of steganography. Assuming only a basic knowledge in calculus and statistics, the book blends the various strands of steganography, including information theory, coding, signal estimation and detection, and statistical signal processing. Experiments on real media files demonstrate the performance of the techniques in real life, and most techniques are supplied with pseudo-code, making it easy to implement the algorithms. The book is ideal for students taking courses on steganography and information hiding, and is also a useful reference for engineers and practitioners working in media security and information assurance.
650 0 _aData encryption (Computer science)
650 0 _aData protection.
650 0 _aDigital media.
776 0 8 _iPrint version:
_z9780521190190
856 4 0 _uhttps://doi.org/10.1017/CBO9781139192903
999 _c520310
_d520308