TY - BOOK
T1 - Data Hiding Fundamentals and Applications
T2 - Content Security in Digital Multimedia
AU - Sencar, Husrev T.
AU - Ramkumar, Mahalingam
AU - Akansu, Ali N.
N1 - Publisher Copyright:
© 2004 Elsevier Inc. All rights reserved.
PY - 2004/1/1
Y1 - 2004/1/1
N2 - Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with respect to multimedia content. The owners of this content face enormous challenges in safeguarding their intellectual property, while still exploiting the Internet as an important resource for commerce. Data Hiding Fundamentals and Applications focuses on the theory and state-of-the-art applications of content security and data hiding in digital multimedia. One of the pillars of content security solutions is the imperceptible insertion of information into multimedia data for security purposes; the idea is that this inserted information will allow detection of unauthorized usage.
AB - Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with respect to multimedia content. The owners of this content face enormous challenges in safeguarding their intellectual property, while still exploiting the Internet as an important resource for commerce. Data Hiding Fundamentals and Applications focuses on the theory and state-of-the-art applications of content security and data hiding in digital multimedia. One of the pillars of content security solutions is the imperceptible insertion of information into multimedia data for security purposes; the idea is that this inserted information will allow detection of unauthorized usage.
UR - http://www.scopus.com/inward/record.url?scp=84902736525&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84902736525&partnerID=8YFLogxK
U2 - 10.1016/B978-0-12-047144-7.X5000-6
DO - 10.1016/B978-0-12-047144-7.X5000-6
M3 - Book
AN - SCOPUS:84902736525
BT - Data Hiding Fundamentals and Applications
PB - Elsevier
ER -