Categories Pricing Corporate
Free Textbook

Fundamentals of Media Security

13 Arvioinnit
(13 ratings)
2 Reviews
110
Language:  English
This introductory text covers media security, starting off by highlighting various types of objective and subjective assessment criteria used to evaluate various multimedia types.
Download free PDF textbooks or read online. Less than 15% adverts
Yritystilaus ilmainen ensimmäisen 30 päivän ajan, ja sen jälkeen $5.99/kk.
Description
Content
Reviews

This introductory text covers media security, starting off by highlighting various types of objective and subjective assessment criteria used to evaluate various multimedia types. Steganography algorithms are detailed along with detection of information hiding. A brief history of digital watermarking is presented which includes examples of fragile and robust techniques. Digital scrambling of images and audio is examined. Digital video surveillance in addition to multimedia authentication and forensics is discussed, this includes image, video and document authentication including biometrics.

  1. Introduction
    1. Overview
    2. Research Areas of Media Security
    3. Criteria for Media Evaluation
    4. Mathematical Models for Information Hiding
    5. Theoretical Security Model for Information Hiding
    6. Summary
  2. Steganography
    1. Overview
    2. Stego Algorithms
    3. Detecting Information Hiding
    4. Bit Operation Based Information Hiding
    5. Mutual Multimedia Information Hiding
    6. Summary
  3. Digital Watermarking
    1. Overview
    2. Watermarking History
    3. Video Watermarking
    4. Video Logo Erasing
    5. Logo Removal using Video Inpainting
    6. Summary
  4. Digital Scrambling
    1. Overview
    2. Digital Image Scrambling
    3. Audio Scrambling
    4. Summary
  5. Digital Surveillance
    1. Overview
    2. Adaptive Video Monitoring
    3. Video surveillance using multiple cameras
    4. Multimedia Simplification for Video Monitoring
    5. Summary
  6. Digital Multimedia Authentication and Forensics
    1. Video Authentication
    2. Printed Document Authentication
    3. Document Authentication with RSE
    4. Passive Image Authentication: Passive-Blind Image Forensics (PBIF)
    5. Multimedia Forensics
    6. Summary
  7. Bibliography
Great Book, very helpful. It has every fundamental someone may need for media security
Very education. The public can greatly benefit from this for awareness' sake.
More reviews
About the Authors

WeiQi Yan

Dr WeiQi Yan received his Ph.D. degree from Institute of Computing Technology, Academia Sinica, China in 2001. His research interests include Multimedia Systems and Intelligent Multimedia Security, Forensics and Surveillance. He has over 90 publications. Dr Yan is serving as an associate editor for the Journal of Multimedia, an associate editor for the International Journal of Digital Crime Forensics, and a guest editor of the Springer Transactions on Data Hiding and Multimedia Security (DHMMS).

Jonathan Weir received his BSc. degree in computer science from Queen's University Belfast, UK, in 2008. He is currently pursuing his Ph.D. degree in computer science at Queen's University Belfast, UK. His research interests are visual cryptography, digital imagery and image processing.

Jonathan Weir

Dr WeiQi Yan received his Ph.D. degree from Institute of Computing Technology, Academia Sinica, China in 2001. His research interests include Multimedia Systems and Intelligent Multimedia Security, Forensics and Surveillance. He has over 90 publications. Dr Yan is serving as an associate editor for the Journal of Multimedia, an associate editor for the International Journal of Digital Crime Forensics, and a guest editor of the Springer Transactions on Data Hiding and Multimedia Security (DHMMS).

Jonathan Weir received his BSc. degree in computer science from Queen's University Belfast, UK, in 2008. He is currently pursuing his Ph.D. degree in computer science at Queen's University Belfast, UK. His research interests are visual cryptography, digital imagery and image processing.