Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia

Buy
Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with respect to multimedia content. The owners of this content face enormous challenges in safeguarding their intellectual property, while still exploiting the Internet as an important resource for commerce.

Data Hiding Fundamentals and Applications focuses on the theory and state-of-the-art applications of content security and data hiding in digital multimedia. One of the pillars of content security solutions is the imperceptible insertion of information into multimedia data for security purposes; the idea is that this inserted information will allow detection of unauthorized usage.

* Provides a theoretical framework for data hiding, in a signal processing context;
* Realistic applications in secure, multimedia delivery;
* Compression robust data hiding;
* Data hiding for proof of ownership--WATERMARKING;
* Data hiding algorithms for image and video watermarking.

About the Author

Ali N. Akansu received the BS degree from the Technical University of Istanbul, Turkey, in 1980, the MS and Ph.D degrees from the Polytechnic University,Brooklyn, New York in 1983 and 1987, respectively, all in Electrical Engineering. He has been with the Electrical & Computer Engineering Department of the New Jersey Institute of Technology since 1987. He was an academic visitor at IBM T.J.Watson Research Center and at GEC-Marconi Electronic Systems Corp. during the summers of 1989 and 1996, and 1992, respectively. He serves as a consultantto the industry. His current research interests are signal theory, linear transform theory (subbands and wavelets) and algorithms, image-video compression andmultimedia networks, signal processing techniques for digital communications, communication networks and Internet technologies.

(HTML tags aren't allowed.)

Real World Applications of Computational Intelligence (Studies in Fuzziness and Soft Computing)
Real World Applications of Computational Intelligence (Studies in Fuzziness and Soft Computing)
Computational Intelligence (CI) has emerged as a novel and highly diversified paradigm supporting the design, analysis and deployment of intelligent systems. The intellectual landscape of CI is enormously rich. The discipline of CI brings together technologies of granular computing including fuzzy sets and rough sets, neural networks, and...
A Handbook of Comparative Social Policy (Elgar Original Reference)
A Handbook of Comparative Social Policy (Elgar Original Reference)
The current context of social policy is one in which many of the old certainties of the past have been eroded. The predominantly inward-looking, domestic preoccupation of social policy has made way for a more integrated, international and outward approach to analysis which looks beyond the boundaries of the state. It is in this context that this...
Azure in Action
Azure in Action

Azure in Action is a fast-paced tutorial intended for architects and developers looking to develop cloud-based applications on the Windows Azure Platform. Written by two of Microsoft's leading Azure evangelists, it's designed both for readers new to cloud concepts and for those familiar with cloud development but new...


How Math Explains the World: A Guide to the Power of Numbers, from Car Repair to Modern Physics
How Math Explains the World: A Guide to the Power of Numbers, from Car Repair to Modern Physics

In How Math Explains the World, mathematician Stein reveals how seemingly arcane mathematical investigations and discoveries have led to bigger, more world-shaking insights into the nature of our world. In the four main sections of the book, Stein tells the stories of the mathematical thinkers who discerned some of the most fundamental...

Facebook Companion
Facebook Companion

Experience everything you can do on Facebook

Facebook has taken the world by storm and just breached the 500 million-user mark as its popularity continues to increase every day the world over. Yet, despite its popularity, many people are not aware of all that Facebook has to offer. This handy, approachable guide shares...

CompTIA Security+ Certification Study Guide, Second Edition (Exam SY0-401) (Certification Press)
CompTIA Security+ Certification Study Guide, Second Edition (Exam SY0-401) (Certification Press)

The best fully integrated study system available for the CompTIA Security+ exam!

Prepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional--a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.

With hundreds of...

©2018 LearnIT (support@pdfchm.net) - Privacy Policy