Steganography in digital media : principles, algorithms, and applications /

Saved in:
Bibliographic Details
Author / Creator:Fridrich, Jessica.
Imprint:Cambridge ; New York : Cambridge University Press, 2010.
Description:xxii, 437 p., [4] p. of plates : ill. (some col.) ; 26 cm.
Language:English
Subject:
Format: Print Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/7921834
Hidden Bibliographic Details
ISBN:9780521190190 (hbk.)
0521190193 (hbk.)
Notes:Includes bibliographical references (p. [409]-426) and index.
Summary:"Steganography, the art of hiding of information in apparently innocuous objects or images, is a field with a rich heritage, and an area of rapid current development. This clear, self-contained guide shows you how to understand the building blocks of covert communication in digital media files and how to apply the techniques in practice, including those of steganalysis, the detection of steganography. Assuming only a basic knowledge in calculus and statistics, the book blends the various strands of steganography, including information theory, coding, signal estimation and detection, and statistical signal processing. Experiments on real media files demonstrate the performance of the techniques in real life, and most techniques are supplied with pseudo-code, making it easy to implement the algorithms. The book is ideal for students taking courses on steganography and information hiding, and is also a useful reference for engineers and practitioners working in media security and information assurance. Real media files are provided so that readers can see how the techniques work in practice. Includes pseudo-code to help with the implementation of practical algorithms. Each chapter ends with carefully chosen exercises supplied with hints to jump-start the problem solving process."--Publisher's web site.

MARC

LEADER 00000cam a2200000 a 4500
001 7921834
005 20130320151200.0
008 100201s2010 enkaf b 001 0 eng
003 ICU
010 |a  2010285350 
015 |a GBA984202  |2 bnb 
016 7 |a 015356969  |2 Uk 
020 |a 9780521190190 (hbk.) 
020 |a 0521190193 (hbk.) 
035 |a (OCoLC)422764994 
035 |a yb2779086 
040 |a UKM  |b eng  |c UKM  |d DLC  |d BTCTA  |d BWKUK  |d YDXCP  |d BWX  |d BNG  |d UWW  |d CDX  |d MIX  |d TUU  |d MUU 
042 |a ukblcatcopy  |a lccopycat 
049 |a CGUA 
050 0 0 |a QA76.9.A25  |b F75 2010 
082 0 4 |a 005.82  |2 22 
100 1 |a Fridrich, Jessica.  |0 http://id.loc.gov/authorities/names/nb2004312295  |1 http://viaf.org/viaf/67551842 
245 1 0 |a Steganography in digital media :  |b principles, algorithms, and applications /  |c Jessica Fridrich. 
260 |a Cambridge ;  |a New York :  |b Cambridge University Press,  |c 2010. 
300 |a xxii, 437 p., [4] p. of plates :  |b ill. (some col.) ;  |c 26 cm. 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a unmediated  |b n  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/n 
338 |a volume  |b nc  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/nc 
504 |a Includes bibliographical references (p. [409]-426) and index. 
505 0 |a 1. Introduction -- 2. Digital image formats -- 3. Digital image acquisition -- 4. Steganographic channel -- 5. Naive steganography -- 6. Steganographic security -- 7. Practical steganographic methods -- 8. Matrix embedding -- 9. Non-shared selection channel -- 10. Steganalysis -- 11. Selected targeted attacks -- 12. Blind steganalysis -- 13. Steganography -- A. Statistics -- B. Information theory -- C. Linear codes -- D. Signal detection and estimation -- E. Support vector machines. 
520 |a "Steganography, the art of hiding of information in apparently innocuous objects or images, is a field with a rich heritage, and an area of rapid current development. This clear, self-contained guide shows you how to understand the building blocks of covert communication in digital media files and how to apply the techniques in practice, including those of steganalysis, the detection of steganography. Assuming only a basic knowledge in calculus and statistics, the book blends the various strands of steganography, including information theory, coding, signal estimation and detection, and statistical signal processing. Experiments on real media files demonstrate the performance of the techniques in real life, and most techniques are supplied with pseudo-code, making it easy to implement the algorithms. The book is ideal for students taking courses on steganography and information hiding, and is also a useful reference for engineers and practitioners working in media security and information assurance. Real media files are provided so that readers can see how the techniques work in practice. Includes pseudo-code to help with the implementation of practical algorithms. Each chapter ends with carefully chosen exercises supplied with hints to jump-start the problem solving process."--Publisher's web site. 
650 0 |a Data encryption (Computer science)  |0 http://id.loc.gov/authorities/subjects/sh94001524 
650 0 |a Data protection.  |0 http://id.loc.gov/authorities/subjects/sh85035859 
650 0 |a Digital media.  |0 http://id.loc.gov/authorities/subjects/sh98006600 
650 7 |a Data encryption (Computer science)  |2 fast  |0 http://id.worldcat.org/fast/fst00887935 
650 7 |a Data protection.  |2 fast  |0 http://id.worldcat.org/fast/fst00887958 
650 7 |a Digital media.  |2 fast  |0 http://id.worldcat.org/fast/fst00893716 
903 |a HeVa 
929 |a cat 
999 f f |i 69d5cb3e-1ab6-579b-a843-bc0d466c3a09  |s f6b2d7c8-8522-565f-b77f-d7132c34507b 
928 |t Library of Congress classification  |a QA76.9.A25 F75 2010  |l JCL  |c JCL-Sci  |i 5491022 
927 |t Library of Congress classification  |a QA76.9.A25 F75 2010  |l JCL  |c JCL-Sci  |e CRERAR  |b 089148372  |i 8713842