Digital steganography
after payment (24/7)
(for all gadgets)
(including for Apple and Android)
dissemination of multimedia technologies. Steganography methods make it possible not only to secretly transmit data, but also to solve problems of noise-resistant authentication, protecting information from unauthorized copying, tracking the dissemination of information over communication networks, and searching for information in multimedia databases. Several review articles in Russian were devoted to steganography in a special issue of the Confident magazine " - but only. This book is intended to fill the existing gap. It summarizes the latest research results of foreign scientists, considers both theoretical and practical aspects of steganography, classifies stegosystems and embedding methods, studies in detail the issues of increasing the throughput of a stego channel, ensuring the stability and imperceptibility of embedding, and presents more than 50 data embedding algorithms. The book is intended for undergraduates, graduate students, researchers studying information security issues, as well as for design engineers of information security tools. It will also arouse undoubted interest among specialists in the field of information theory and digital signal processing.
Data sheet
- Name of the Author
- Вадим Грибунин Геннадьевич
Игорь Оков Николаевич
Игорь Туринцев Владимирович - Language
- Russian