1. Multimedia Security 1 : Authentication and Data Hiding
- Author
-
William Puech and William Puech
- Subjects
- Multimedia systems--Security measures
- Abstract
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics.It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's'all-digital'world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it.Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis.
- Published
- 2022