Skip navigation Download free eBooks and textbooks

Choose a category

Fundamentals of Media Security

Fundamentals of Media Security
Not enough reviews yet
ISBN: 978-87-7681-706-0
1 edition
Pages : 110
Price: Free

Download for FREE in 4 easy steps...

We are terribly sorry, but in order to download our books or watch our videos, you will need a browser that allows JavaScript.
Please enter your work email address.
After entering your email address, a confirmation email will be sent to your inbox. Please approve this email to receive our weekly eBook update. We will not share your personal information with any third party.

This is a Premium eBook

Bookboon Premium - Get access to over 800 eBooks - without ads

You can get free access for a month to this - and 800 other books with the Premium Subscription. You can also buy the book below

  • Start a 30-day free trial. After trial: 39.99 kr p/m
  • Start a 30-day free trial. After trial: €5.99 p/m
  • Start a 30-day free trial. After trial: £4.99 p/m
  • Start a 30-day free trial. After trial: ₹299 p/m
  • Start a 30-day free trial. After trial: $3.99 p/m
  • Start a 30-day free trial. After trial: 39.99 kr p/m
  • Start a 30-day free trial. After trial: 39.99 kr p/m
You can also get a companywide e-learning solution - click here

About the book

  1. Reviews
  2. Description
  3. Content
  4. About the Author


anonymous ★★★★★

Great Book, very helpful. It has every fundamental someone may need for media security

Diane K. Clark ★★★★★

Very education. The public can greatly benefit from this for awareness' sake.


This introductory text covers media security, starting off by highlighting various types of objective and subjective assessment criteria used to evaluate various multimedia types. Steganography algorithms are detailed along with detection of information hiding. A brief history of digital watermarking is presented which includes examples of fragile and robust techniques. Digital scrambling of images and audio is examined. Digital video surveillance in addition to multimedia authentication and forensics is discussed, this includes image, video and document authentication including biometrics.


1 Introduction
1.1 Overview
1.2 Research Areas of Media Security
1.3 Criteria for Media Evaluation
1.3.1 Subjective Criteria
1.3.2 Objective Criteria
1.3.3 Distance Measure on Various Color Spaces
1.3.4 Comparison Among Variant Measurement Approaches
1.4 Mathematical Models for Information Hiding
1.4.1 Mathematical Models Based on Colour Space
1.4.2 Mathematical Models Based on PSNR
1.4.3 Channel Model of Information Hiding
1.5 Theoretical Security Model for Information Hiding
1.6 Summary

2 Steganography
2.1 Overview
2.2 Stego Algorithms
2.3 Detecting Information Hiding
2.4 Bit Operation Based Information Hiding
2.5 Mutual Multimedia Information Hiding
2.5.1 Images Hidden in Sound[1]
2.6 Summary

3 Digital Watermarking
3.1 Overview
3.2 Watermarking History
3.2.1 Visible and Invisible Watermarking
3.2.2 Robust and Fragile Watermarking
3.2.3 Spatial and Frequency Domain Watermarking
3.2.4 Watermarking Approaches
3.3 Video Watermarking
3.4 Video Logo Erasing
3.5 Logo Removal using Video Inpainting
3.5.1 Matching Based Logo Removal
3.5.2 Video Inpainting Based Logo Removal
3.6 Summary

4 Digital Scrambling
4.1 Overview
4.2 Digital Image Scrambling
4.2.1 Chessboard Coding Based Scrambling
4.2.2 Caesar Coding Based Scrambling
4.2.3 DES Based Scrambling
4.2.4 Digital Image Scrambling Based on Magic Squares
4.2.5 Digital Image Scrambling Based on Gray Code Transformation
4.2.6 Digital Image Scrambling Based on Conway’s Game
4.3 Audio Scrambling
4.3.1 Audio Scrambling in the Temporal Domain
4.3.2 Scrambling in the Frequency Domain
4.3.3 Joint Scrambling
4.3.4 Progressive MP3 Audio Scrambling
4.4 Summary

5 Digital Surveillance
5.1 Overview
5.2 Adaptive Video Monitoring
5.3 Video surveillance using multiple cameras
5.4 Multimedia Simplification for Video Monitoring
5.5 Summary

6 Digital Multimedia Authentication and Forensics
6.1 Video Authentication
6.2 Printed Document Authentication
6.3 Document Authentication with RSE
6.4 Passive Image Authentication: Passive-Blind Image Forensics (PBIF)
6.5 Multimedia Forensics
6.5.1 Media Forensics Using Biometrics
6.6 Summary


About the Author

Dr WeiQi Yan received his Ph.D. degree from Institute of Computing Technology, Academia Sinica, China in 2001. His research interests include Multimedia Systems and Intelligent Multimedia Security, Forensics and Surveillance. He has over 90 publications. Dr Yan is serving as an associate editor for the Journal of Multimedia, an associate editor for the International Journal of Digital Crime Forensics, and a guest editor of the Springer Transactions on Data Hiding and Multimedia Security (DHMMS).

Jonathan Weir received his BSc. degree in computer science from Queen's University Belfast, UK, in 2008. He is currently pursuing his Ph.D. degree in computer science at Queen's University Belfast, UK. His research interests are visual cryptography, digital imagery and image processing.

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with EU regulation.