相關主題
商品描述
Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, this book presents a wealth of everyday protection application examples in fields including multimedia mining and classification, digital watermarking, steganography, and digital forensics.
Giving readers an in-depth overview of different aspects of information security mechanisms and methods, this resource also serves as an instructional tool on how to use the fundamental theoretical framework required for the development of extensive advanced techniques. The presentation of several robust algorithms illustrates this framework, helping readers to quickly master and apply fundamental principles.
Presented case studies cover:
- The execution (and feasibility) of techniques used to discover hidden knowledge by applying multimedia duplicate mining methods to large multimedia content
- Different types of image steganographic schemes based on vector quantization
- Techniques used to detect changes in human motion behavior and to classify different types of small-group motion behavior
Useful for students, researchers, and professionals, this book consists of a variety of technical tutorials that offer an abundance of graphs and examples to powerfully convey the principles of multimedia security and steganography. Imparting the extensive experience of the contributors, this approach simplifies problems, helping readers more easily understand even the most complicated theories. It also enables them to uncover novel concepts involved in the implementation of algorithms, which can lead to the discovery of new problems and new means of solving them.
商品描述(中文翻譯)
《多媒體安全:水印技術、隱寫術與取證》概述了用於證明內容真實性及未被更改的多媒體安全技術的基本原則、技術資訊和專家見解。隨著網際網路和數位多媒體應用的快速發展,本書闡明了提升內容安全性的必要性,並提供了在多媒體挖掘與分類、數位水印、隱寫術和數位取證等領域的日常保護應用範例。
本書深入概述了資訊安全機制和方法的不同面向,並作為一個教學工具,指導讀者如何使用開發廣泛先進技術所需的基本理論框架。幾個穩健算法的呈現說明了這一框架,幫助讀者快速掌握並應用基本原則。
所呈現的案例研究涵蓋:
- 通過將多媒體重複挖掘方法應用於大型多媒體內容來發現隱藏知識的技術執行(及其可行性)
- 基於向量量化的不同類型圖像隱寫方案
- 用於檢測人類運動行為變化及分類不同類型小組運動行為的技術
本書對學生、研究人員和專業人士都非常有用,包含各種技術教程,提供大量圖表和範例,有力地傳達多媒體安全和隱寫術的原則。透過貢獻者的豐富經驗,這種方法簡化了問題,幫助讀者更容易理解即使是最複雜的理論。它還使他們能夠發掘實現算法中涉及的新概念,這可能導致新問題的發現和解決新問題的方法。
作者簡介
Internationally renowned scholar Frank Y. Shih received his BS degree from the National Cheng Kung University, Taiwan, in 1980. He earned an MS degree from the State University of New York, Stony Brook, USA, in 1983, and a Ph.D from Purdue University, West Lafayette, Indiana, USA, in 1987. He is currently a professor at New Jersey Institute of Technology, Newark, jointly appointed in the departments of Computer Science, Electrical and Computer Engineering, and Biomedical Engineering. He is also director of the school's Computer Vision Laboratory.
作者簡介(中文翻譯)
國際知名學者施芳瑜於1980年獲得台灣國立成功大學的學士學位。1983年,他在美國紐約州立大學石溪校區獲得碩士學位,並於1987年在美國普渡大學西拉法葉獲得博士學位。目前,他是新澤西理工學院(New Jersey Institute of Technology)的一名教授,並在計算機科學、電氣與計算機工程以及生物醫學工程三個系所共同任職。他也是該校計算機視覺實驗室的主任。