Multimedia security Volume 1, Authentication and data hiding Volume 1, Authentication and data hiding /
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Hoboken, New Jersey :
ISTE Ltd
[2022]
|
Colección: | Sciences. Images. Compression, coding and protection of images and videos
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009657357206719 |
Tabla de Contenidos:
- How to Reconstruct the History of a Digital Image, and of Its Alterations / Quentin Bammey, Miguel Colom, Thibaud Ehret, Marina Gardella, Rafael Grompone, Jean-Michel Morel, Tina Nikoukhah, Denis Perraud
- Deep Neural Network Attacks and Defense: The Case of Image Classification / Hanwei Zhang, Teddy Furon, Laurent Amsaleg, Yannis Avrithis
- Codes and Watermarks / Pascal Lef̈vre, Philippe Carř, Philippe Gaborit
- Invisibility / Pascal Lef̈vre, Philippe Carř, David Alleysson
- Steganography: Embedding Data Into Multimedia Content / Patrick Bas, Řmi Cogranne, Marc Chaumont
- Traitor Tracing / Teddy Furon
- 3D Watermarking / Šbastien Beugnon, Vincent Itier, William Puech
- Steganalysis: Detection of Hidden Data in Multimedia Content / Řmi Cogranne, Marc Chaumont, Patrick Bas.