Skip navigation Download free eBooks and textbooks

Choose a category

Fundamentals of Media Security

Fundamentals of Media Security
4.7 (11 reviews) Read reviews
ISBN: 978-87-7681-706-0
1 edition
Pages : 110
  • Price: 129.00 kr
  • Price: €13.99
  • Price: £13.99
  • Price: ₹250
  • Price: $13.99
  • Price: 129.00 kr
  • Price: 129.00 kr

Download for FREE in 4 easy steps...

We are terribly sorry, but in order to download our books or watch our videos, you will need a browser that allows JavaScript.
After entering your email address, a confirmation email will be sent to your inbox. Please approve this email to receive our weekly eBook update. We will not share your personal information with any third party.
Unlock your organization's learning potential
See Demo

Corporate eLibrary

Discover our employee learning solutions

This is a Premium eBook

Bookboon Premium - Gain access to over 800 eBooks - without ads

You can get free access for a month to this - and 800 other books with the Premium Subscription. You can also buy the book below

  • Start a 30-day free trial. After trial: 39.99 kr p/m
  • Start a 30-day free trial. After trial: €5.99 p/m
  • Start a 30-day free trial. After trial: £4.99 p/m
  • Start a 30-day free trial. After trial: ₹299 p/m
  • Start a 30-day free trial. After trial: $3.99 p/m
  • Start a 30-day free trial. After trial: 39.99 kr p/m
  • Start a 30-day free trial. After trial: 39.99 kr p/m
Unlock your organization's learning potential
Click here!

Corporate eLibrary

Discover our employee learning solutions

About the book

  1. Reviews
  2. Description
  3. Content
  4. About the Author


anonymous ★★★★★

Great Book, very helpful. It has every fundamental someone may need for media security

Diane K. Clark ★★★★★

Very education. The public can greatly benefit from this for awareness' sake.


This introductory text covers media security, starting off by highlighting various types of objective and subjective assessment criteria used to evaluate various multimedia types. Steganography algorithms are detailed along with detection of information hiding. A brief history of digital watermarking is presented which includes examples of fragile and robust techniques. Digital scrambling of images and audio is examined. Digital video surveillance in addition to multimedia authentication and forensics is discussed, this includes image, video and document authentication including biometrics.


  1. Introduction
    1. Overview
    2. Research Areas of Media Security
    3. Criteria for Media Evaluation
    4. Mathematical Models for Information Hiding
    5. Theoretical Security Model for Information Hiding
    6. Summary
  2. Steganography
    1. Overview
    2. Stego Algorithms
    3. Detecting Information Hiding
    4. Bit Operation Based Information Hiding
    5. Mutual Multimedia Information Hiding
    6. Summary
  3. Digital Watermarking
    1. Overview
    2. Watermarking History
    3. Video Watermarking
    4. Video Logo Erasing
    5. Logo Removal using Video Inpainting
    6. Summary
  4. Digital Scrambling
    1. Overview
    2. Digital Image Scrambling
    3. Audio Scrambling
    4. Summary
  5. Digital Surveillance
    1. Overview
    2. Adaptive Video Monitoring
    3. Video surveillance using multiple cameras
    4. Multimedia Simplification for Video Monitoring
    5. Summary
  6. Digital Multimedia Authentication and Forensics
    1. Video Authentication
    2. Printed Document Authentication
    3. Document Authentication with RSE
    4. Passive Image Authentication: Passive-Blind Image Forensics (PBIF)
    5. Multimedia Forensics
    6. Summary
  7. Bibliography

About the Author

Dr WeiQi Yan received his Ph.D. degree from Institute of Computing Technology, Academia Sinica, China in 2001. His research interests include Multimedia Systems and Intelligent Multimedia Security, Forensics and Surveillance. He has over 90 publications. Dr Yan is serving as an associate editor for the Journal of Multimedia, an associate editor for the International Journal of Digital Crime Forensics, and a guest editor of the Springer Transactions on Data Hiding and Multimedia Security (DHMMS).

Jonathan Weir received his BSc. degree in computer science from Queen's University Belfast, UK, in 2008. He is currently pursuing his Ph.D. degree in computer science at Queen's University Belfast, UK. His research interests are visual cryptography, digital imagery and image processing.

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with EU regulation.