Categories Pricing Corporate
Free Textbook

Fundamentals of Media Security

(13 ratings)
2 reviews
110
Language:  English
This introductory text covers media security, starting off by highlighting various types of objective and subjective assessment criteria used to evaluate various multimedia types.
Download free PDF textbooks or read online. Less than 15% adverts
Business-prenumeration gratis de första 30 dagarna, sedan $5.99/månad
Description
Content
Reviews

This introductory text covers media security, starting off by highlighting various types of objective and subjective assessment criteria used to evaluate various multimedia types. Steganography algorithms are detailed along with detection of information hiding. A brief history of digital watermarking is presented which includes examples of fragile and robust techniques. Digital scrambling of images and audio is examined. Digital video surveillance in addition to multimedia authentication and forensics is discussed, this includes image, video and document authentication including biometrics.

  1. Introduction
    1. Overview
    2. Research Areas of Media Security
    3. Criteria for Media Evaluation
    4. Mathematical Models for Information Hiding
    5. Theoretical Security Model for Information Hiding
    6. Summary
  2. Steganography
    1. Overview
    2. Stego Algorithms
    3. Detecting Information Hiding
    4. Bit Operation Based Information Hiding
    5. Mutual Multimedia Information Hiding
    6. Summary
  3. Digital Watermarking
    1. Overview
    2. Watermarking History
    3. Video Watermarking
    4. Video Logo Erasing
    5. Logo Removal using Video Inpainting
    6. Summary
  4. Digital Scrambling
    1. Overview
    2. Digital Image Scrambling
    3. Audio Scrambling
    4. Summary
  5. Digital Surveillance
    1. Overview
    2. Adaptive Video Monitoring
    3. Video surveillance using multiple cameras
    4. Multimedia Simplification for Video Monitoring
    5. Summary
  6. Digital Multimedia Authentication and Forensics
    1. Video Authentication
    2. Printed Document Authentication
    3. Document Authentication with RSE
    4. Passive Image Authentication: Passive-Blind Image Forensics (PBIF)
    5. Multimedia Forensics
    6. Summary
  7. Bibliography
Great Book, very helpful. It has every fundamental someone may need for media security
Very education. The public can greatly benefit from this for awareness' sake.
More reviews
About the Authors

Jonathan Weir

WeiQi Yan