Skip navigation Download free eBooks and textbooks

Choose a category

Fundamentals of Media Security

Fundamentals of Media Security
Not enough reviews yet
ISBN: 978-87-7681-706-0
1 edition
Pages : 110
Price: Free

Download for FREE in 4 easy steps...

We are terribly sorry, but in order to download our books or watch our videos, you will need a browser that allows JavaScript.
After entering your email address, a confirmation email will be sent to your inbox. Please approve this email to receive our weekly eBook update. We will not share your personal information with any third party.

This is a Premium eBook - get it free for 30 days

You can also read this in Premium


This introductory text covers media security, starting off by highlighting various types of objective and subjective assessment criteria used to evaluate various multimedia types.

300+ Business books exclusively in our Premium eReader

  • No adverts
  • Advanced features
  • Personal library
More about Premium

Buy this eBook

Buy now

Subscribe to all 800+ eBooks

Start free trial 30 day FREE trial

About the book

  1. Reviews
  2. Description
  3. Content
  4. About the Author
  5. Embed


anonymous ★★★★★

Great Book, very helpful. It has every fundamental someone may need for media security

Diane K. Clark ★★★★★

Very education. The public can greatly benefit from this for awareness' sake.


This introductory text covers media security, starting off by highlighting various types of objective and subjective assessment criteria used to evaluate various multimedia types. Steganography algorithms are detailed along with detection of information hiding. A brief history of digital watermarking is presented which includes examples of fragile and robust techniques. Digital scrambling of images and audio is examined. Digital video surveillance in addition to multimedia authentication and forensics is discussed, this includes image, video and document authentication including biometrics.


1 Introduction
1.1 Overview
1.2 Research Areas of Media Security
1.3 Criteria for Media Evaluation
1.3.1 Subjective Criteria
1.3.2 Objective Criteria
1.3.3 Distance Measure on Various Color Spaces
1.3.4 Comparison Among Variant Measurement Approaches
1.4 Mathematical Models for Information Hiding
1.4.1 Mathematical Models Based on Colour Space
1.4.2 Mathematical Models Based on PSNR
1.4.3 Channel Model of Information Hiding
1.5 Theoretical Security Model for Information Hiding
1.6 Summary

2 Steganography
2.1 Overview
2.2 Stego Algorithms
2.3 Detecting Information Hiding
2.4 Bit Operation Based Information Hiding
2.5 Mutual Multimedia Information Hiding
2.5.1 Images Hidden in Sound[1]
2.6 Summary

3 Digital Watermarking
3.1 Overview
3.2 Watermarking History
3.2.1 Visible and Invisible Watermarking
3.2.2 Robust and Fragile Watermarking
3.2.3 Spatial and Frequency Domain Watermarking
3.2.4 Watermarking Approaches
3.3 Video Watermarking
3.4 Video Logo Erasing
3.5 Logo Removal using Video Inpainting
3.5.1 Matching Based Logo Removal
3.5.2 Video Inpainting Based Logo Removal
3.6 Summary

4 Digital Scrambling
4.1 Overview
4.2 Digital Image Scrambling
4.2.1 Chessboard Coding Based Scrambling
4.2.2 Caesar Coding Based Scrambling
4.2.3 DES Based Scrambling
4.2.4 Digital Image Scrambling Based on Magic Squares
4.2.5 Digital Image Scrambling Based on Gray Code Transformation
4.2.6 Digital Image Scrambling Based on Conway’s Game
4.3 Audio Scrambling
4.3.1 Audio Scrambling in the Temporal Domain
4.3.2 Scrambling in the Frequency Domain
4.3.3 Joint Scrambling
4.3.4 Progressive MP3 Audio Scrambling
4.4 Summary

5 Digital Surveillance
5.1 Overview
5.2 Adaptive Video Monitoring
5.3 Video surveillance using multiple cameras
5.4 Multimedia Simplification for Video Monitoring
5.5 Summary

6 Digital Multimedia Authentication and Forensics
6.1 Video Authentication
6.2 Printed Document Authentication
6.3 Document Authentication with RSE
6.4 Passive Image Authentication: Passive-Blind Image Forensics (PBIF)
6.5 Multimedia Forensics
6.5.1 Media Forensics Using Biometrics
6.6 Summary


About the Author

Dr WeiQi Yan received his Ph.D. degree from Institute of Computing Technology, Academia Sinica, China in 2001. His research interests include Multimedia Systems and Intelligent Multimedia Security, Forensics and Surveillance. He has over 90 publications. Dr Yan is serving as an associate editor for the Journal of Multimedia, an associate editor for the International Journal of Digital Crime Forensics, and a guest editor of the Springer Transactions on Data Hiding and Multimedia Security (DHMMS).

Jonathan Weir received his BSc. degree in computer science from Queen's University Belfast, UK, in 2008. He is currently pursuing his Ph.D. degree in computer science at Queen's University Belfast, UK. His research interests are visual cryptography, digital imagery and image processing.


Choose color
Implementation code. Copy into your own page
Embed Frame - Terms of Use

The embed frame is free to use for private persons, universities and schools. It is not allowed to be used by any company for commercial purposes unless it is for media coverage. You may not modify, build upon, or block any portion or functionality of the embed frame, including but not limited to links back to the website.

The Embed frame may not be used as part of a commercial business offering. The embed frame is intended for private people who want to share eBooks on their website or blog, professors or teaching professionals who want to make an eBook available directly on their page, and media, journalists or bloggers who wants to discuss a given eBook

If you are in doubt about whether you can implement the embed frame, you are welcome to contact Thomas Buus Madsen on and seek permission.

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with EU regulation.