Multimedia security Volume 1, Authentication and data hiding Volume 1, Authentication and data hiding /

Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and...

Descripción completa

Detalles Bibliográficos
Otros Autores: Puech, William, editor (editor)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Hoboken, New Jersey : ISTE Ltd [2022]
Colección:Sciences. Images. Compression, coding and protection of images and videos
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009657357206719
Tabla de Contenidos:
  • How to Reconstruct the History of a Digital Image, and of Its Alterations / Quentin Bammey, Miguel Colom, Thibaud Ehret, Marina Gardella, Rafael Grompone, Jean-Michel Morel, Tina Nikoukhah, Denis Perraud
  • Deep Neural Network Attacks and Defense: The Case of Image Classification / Hanwei Zhang, Teddy Furon, Laurent Amsaleg, Yannis Avrithis
  • Codes and Watermarks / Pascal Lef̈vre, Philippe Carř, Philippe Gaborit
  • Invisibility / Pascal Lef̈vre, Philippe Carř, David Alleysson
  • Steganography: Embedding Data Into Multimedia Content / Patrick Bas, Řmi Cogranne, Marc Chaumont
  • Traitor Tracing / Teddy Furon
  • 3D Watermarking / Šbastien Beugnon, Vincent Itier, William Puech
  • Steganalysis: Detection of Hidden Data in Multimedia Content / Řmi Cogranne, Marc Chaumont, Patrick Bas.