Multidisciplinary approach to modern digital steganography

"This book gives an insight to the different latest techniques and state-of-the-art methods, algorithms, architectures, models, methodologies, and case studies of steganography in the domain of Cloud, IoT and Android Platform" - Provided by publisher

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Pramanik, Sabyasachi 1978- (HerausgeberIn), Ghonge, Mangesh 1984- (HerausgeberIn), Ravi, Renjith 1985- (HerausgeberIn), Cengiz, Korhan (HerausgeberIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Hershey PA, USA IGI Global, Publisher of Timely Knowledge [2021]
Schriftenreihe:A volume in the Advances in information security, privacy, and ethics (AISPE) book series
Premier reference source
Schlagworte:
Online-Zugang:DE-1050
DE-573
DE-898
DE-1049
DE-706
DE-706
DE-83
URL des Erstveröffentlichers
Chapter PDFs via platform
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 c 4500
001 BV047349423
003 DE-604
005 20220330
007 cr|uuu---uuuuu
008 210629s2021 xx a||| ob||| 00||| eng d
020 |a 9781799871620  |c Online  |9 978-1-7998-7162-0 
020 |a 1799871622  |9 1-7998-7162-2 
024 7 |a 10.4018/978-1-7998-7160-6  |2 doi 
035 |a (ZDB-98-IGB)978-1-7998-7162-0 
035 |a (OCoLC)1258964228 
035 |a (DE-599)BVBBV047349423 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-1049  |a DE-91  |a DE-898  |a DE-706  |a DE-1050  |a DE-573  |a DE-83 
245 1 0 |a Multidisciplinary approach to modern digital steganography  |c Sabyasachi Pramanik (Haldia Institute of Technology, India), Mangesh Manikrao Ghonge (Sandip Foundation’s Institute of Technology and Research Centre, India), Renjith V. Ravi (MEA Engineering College, India), Korhan Cengiz (Trakya University, Turkey) 
264 1 |a Hershey PA, USA  |b IGI Global, Publisher of Timely Knowledge  |c [2021] 
264 4 |c © 2021 
300 |a 1 Online-Ressource (xxiv, 380 Seiten)  |b Illustrationen 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a A volume in the Advances in information security, privacy, and ethics (AISPE) book series  |x 1948-9749 
490 0 |a Premier reference source 
505 8 |a Chapter 1. Unseen to seen by digital steganography: modern-day data-hiding techniques -- Chapter 2. Image steganography: recent trends and techniques -- Chapter 3. Advances in text steganography theory and research: a critical review and gaps -- Chapter 4. Machine learning and deep learning in steganography and steganalysis -- Chapter 5. Multimode approach of data encryption in images through quantum steganography -- Chapter 6. Detection of malicious spatial-domain steganography over noisy channels -- Chapter 7. Secure text extraction from complex degraded images by applying steganography and deep learning -- Chapter 8. Modern approaches to creating highly undetectable stegosystems (HUGO systems) -- Chapter 9. IoT security using steganography -- Chapter 10. An integration of keyless encryption, steganography, and artificial intelligence for the secure transmission of stego images -- Chapter 11. Multimedia data protection using hybridized Crystal payload algorithm with chicken swarm optimization -- Chapter 12. Secure framework data security using cryptography and steganography in Internet of things -- Chapter 13. Application of steganography for secure data transmission using lossless compression -- Chapter 14. Applications of machine learning in steganography for data protection and privacy -- Chapter 15. Design and development of hybrid algorithms to improve cyber security and provide securing data using image steganography with Internet of things 
520 3 |a "This book gives an insight to the different latest techniques and state-of-the-art methods, algorithms, architectures, models, methodologies, and case studies of steganography in the domain of Cloud, IoT and Android Platform" - Provided by publisher 
653 0 |a Data encryption (Computer science) 
653 0 |a Computer security 
653 0 |a Computer security 
653 0 |a Data encryption (Computer science) 
655 7 |0 (DE-588)4143413-4  |a Aufsatzsammlung  |2 gnd-content 
700 1 |a Pramanik, Sabyasachi  |d 1978-  |4 edt 
700 1 |a Ghonge, Mangesh  |d 1984-  |0 (DE-588)1249970539  |4 edt 
700 1 |a Ravi, Renjith  |d 1985-  |4 edt 
700 1 |a Cengiz, Korhan  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-1-7998-7160-6 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 1-7998-7160-6 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe, Softcover  |z 978-1-7998-7161-3 
856 4 0 |u https://doi.org/10.4018/978-1-7998-7160-6  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
856 4 1 |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7160-6  |3 Chapter PDFs via platform 
912 |a ZDB-1-IGE 
912 |a ZDB-98-IGB 
943 1 |a oai:aleph.bib-bvb.de:BVB01-032751648 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7160-6  |l DE-1050  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7160-6  |l DE-573  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u https://www.igi-global.com/gateway/book/261120  |l DE-898  |p ZDB-1-IGE  |q ZDB-1-IGE21  |x Verlag  |3 Volltext 
966 e |u https://www.igi-global.com/gateway/book/261120  |l DE-1049  |p ZDB-1-IGE  |q ZDB-1-IGE21  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7160-6  |l DE-706  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.4018/978-1-7998-7160-6  |l DE-706  |p ZDB-98-IGB  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7160-6  |l DE-83  |p ZDB-98-IGB  |q TUB_EBS_IGB  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-TUM_katkey 2570255
_version_ 1820811428872847360
any_adam_object
author2 Pramanik, Sabyasachi 1978-
Ghonge, Mangesh 1984-
Ravi, Renjith 1985-
Cengiz, Korhan
author2_role edt
edt
edt
edt
author2_variant s p sp
m g mg
r r rr
k c kc
author_GND (DE-588)1249970539
author_facet Pramanik, Sabyasachi 1978-
Ghonge, Mangesh 1984-
Ravi, Renjith 1985-
Cengiz, Korhan
building Verbundindex
bvnumber BV047349423
collection ZDB-1-IGE
ZDB-98-IGB
contents Chapter 1. Unseen to seen by digital steganography: modern-day data-hiding techniques -- Chapter 2. Image steganography: recent trends and techniques -- Chapter 3. Advances in text steganography theory and research: a critical review and gaps -- Chapter 4. Machine learning and deep learning in steganography and steganalysis -- Chapter 5. Multimode approach of data encryption in images through quantum steganography -- Chapter 6. Detection of malicious spatial-domain steganography over noisy channels -- Chapter 7. Secure text extraction from complex degraded images by applying steganography and deep learning -- Chapter 8. Modern approaches to creating highly undetectable stegosystems (HUGO systems) -- Chapter 9. IoT security using steganography -- Chapter 10. An integration of keyless encryption, steganography, and artificial intelligence for the secure transmission of stego images -- Chapter 11. Multimedia data protection using hybridized Crystal payload algorithm with chicken swarm optimization -- Chapter 12. Secure framework data security using cryptography and steganography in Internet of things -- Chapter 13. Application of steganography for secure data transmission using lossless compression -- Chapter 14. Applications of machine learning in steganography for data protection and privacy -- Chapter 15. Design and development of hybrid algorithms to improve cyber security and provide securing data using image steganography with Internet of things
ctrlnum (ZDB-98-IGB)978-1-7998-7162-0
(OCoLC)1258964228
(DE-599)BVBBV047349423
doi_str_mv 10.4018/978-1-7998-7160-6
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04951nam a2200613 c 4500</leader><controlfield tag="001">BV047349423</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220330 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210629s2021 xx a||| ob||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799871620</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-7998-7162-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1799871622</subfield><subfield code="9">1-7998-7162-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-7160-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)978-1-7998-7162-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1258964228</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047349423</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1049</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Multidisciplinary approach to modern digital steganography</subfield><subfield code="c">Sabyasachi Pramanik (Haldia Institute of Technology, India), Mangesh Manikrao Ghonge (Sandip Foundation’s Institute of Technology and Research Centre, India), Renjith V. Ravi (MEA Engineering College, India), Korhan Cengiz (Trakya University, Turkey)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">IGI Global, Publisher of Timely Knowledge</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxiv, 380 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">A volume in the Advances in information security, privacy, and ethics (AISPE) book series</subfield><subfield code="x">1948-9749</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 1. Unseen to seen by digital steganography: modern-day data-hiding techniques -- Chapter 2. Image steganography: recent trends and techniques -- Chapter 3. Advances in text steganography theory and research: a critical review and gaps -- Chapter 4. Machine learning and deep learning in steganography and steganalysis -- Chapter 5. Multimode approach of data encryption in images through quantum steganography -- Chapter 6. Detection of malicious spatial-domain steganography over noisy channels -- Chapter 7. Secure text extraction from complex degraded images by applying steganography and deep learning -- Chapter 8. Modern approaches to creating highly undetectable stegosystems (HUGO systems) -- Chapter 9. IoT security using steganography -- Chapter 10. An integration of keyless encryption, steganography, and artificial intelligence for the secure transmission of stego images -- Chapter 11. Multimedia data protection using hybridized Crystal payload algorithm with chicken swarm optimization -- Chapter 12. Secure framework data security using cryptography and steganography in Internet of things -- Chapter 13. Application of steganography for secure data transmission using lossless compression -- Chapter 14. Applications of machine learning in steganography for data protection and privacy -- Chapter 15. Design and development of hybrid algorithms to improve cyber security and provide securing data using image steganography with Internet of things</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book gives an insight to the different latest techniques and state-of-the-art methods, algorithms, architectures, models, methodologies, and case studies of steganography in the domain of Cloud, IoT and Android Platform" - Provided by publisher</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pramanik, Sabyasachi</subfield><subfield code="d">1978-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ghonge, Mangesh</subfield><subfield code="d">1984-</subfield><subfield code="0">(DE-588)1249970539</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ravi, Renjith</subfield><subfield code="d">1985-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cengiz, Korhan</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-7998-7160-6</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-7998-7160-6</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Softcover</subfield><subfield code="z">978-1-7998-7161-3</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-7998-7160-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7160-6</subfield><subfield code="3">Chapter PDFs via platform</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032751648</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7160-6</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7160-6</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.igi-global.com/gateway/book/261120</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE21</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.igi-global.com/gateway/book/261120</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE21</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7160-6</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-7160-6</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7160-6</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)4143413-4 Aufsatzsammlung gnd-content
genre_facet Aufsatzsammlung
id DE-604.BV047349423
illustrated Illustrated
indexdate 2024-12-24T08:46:42Z
institution BVB
isbn 9781799871620
1799871622
issn 1948-9749
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-032751648
oclc_num 1258964228
open_access_boolean
owner DE-1049
DE-91
DE-BY-TUM
DE-898
DE-BY-UBR
DE-706
DE-1050
DE-573
DE-83
owner_facet DE-1049
DE-91
DE-BY-TUM
DE-898
DE-BY-UBR
DE-706
DE-1050
DE-573
DE-83
physical 1 Online-Ressource (xxiv, 380 Seiten) Illustrationen
psigel ZDB-1-IGE
ZDB-98-IGB
ZDB-1-IGE ZDB-1-IGE21
ZDB-98-IGB TUB_EBS_IGB
publishDate 2021
publishDateSearch 2021
publishDateSort 2021
publisher IGI Global, Publisher of Timely Knowledge
record_format marc
series2 A volume in the Advances in information security, privacy, and ethics (AISPE) book series
Premier reference source
spellingShingle Multidisciplinary approach to modern digital steganography
Chapter 1. Unseen to seen by digital steganography: modern-day data-hiding techniques -- Chapter 2. Image steganography: recent trends and techniques -- Chapter 3. Advances in text steganography theory and research: a critical review and gaps -- Chapter 4. Machine learning and deep learning in steganography and steganalysis -- Chapter 5. Multimode approach of data encryption in images through quantum steganography -- Chapter 6. Detection of malicious spatial-domain steganography over noisy channels -- Chapter 7. Secure text extraction from complex degraded images by applying steganography and deep learning -- Chapter 8. Modern approaches to creating highly undetectable stegosystems (HUGO systems) -- Chapter 9. IoT security using steganography -- Chapter 10. An integration of keyless encryption, steganography, and artificial intelligence for the secure transmission of stego images -- Chapter 11. Multimedia data protection using hybridized Crystal payload algorithm with chicken swarm optimization -- Chapter 12. Secure framework data security using cryptography and steganography in Internet of things -- Chapter 13. Application of steganography for secure data transmission using lossless compression -- Chapter 14. Applications of machine learning in steganography for data protection and privacy -- Chapter 15. Design and development of hybrid algorithms to improve cyber security and provide securing data using image steganography with Internet of things
subject_GND (DE-588)4143413-4
title Multidisciplinary approach to modern digital steganography
title_auth Multidisciplinary approach to modern digital steganography
title_exact_search Multidisciplinary approach to modern digital steganography
title_full Multidisciplinary approach to modern digital steganography Sabyasachi Pramanik (Haldia Institute of Technology, India), Mangesh Manikrao Ghonge (Sandip Foundation’s Institute of Technology and Research Centre, India), Renjith V. Ravi (MEA Engineering College, India), Korhan Cengiz (Trakya University, Turkey)
title_fullStr Multidisciplinary approach to modern digital steganography Sabyasachi Pramanik (Haldia Institute of Technology, India), Mangesh Manikrao Ghonge (Sandip Foundation’s Institute of Technology and Research Centre, India), Renjith V. Ravi (MEA Engineering College, India), Korhan Cengiz (Trakya University, Turkey)
title_full_unstemmed Multidisciplinary approach to modern digital steganography Sabyasachi Pramanik (Haldia Institute of Technology, India), Mangesh Manikrao Ghonge (Sandip Foundation’s Institute of Technology and Research Centre, India), Renjith V. Ravi (MEA Engineering College, India), Korhan Cengiz (Trakya University, Turkey)
title_short Multidisciplinary approach to modern digital steganography
title_sort multidisciplinary approach to modern digital steganography
topic_facet Aufsatzsammlung
url https://doi.org/10.4018/978-1-7998-7160-6
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7160-6
work_keys_str_mv AT pramaniksabyasachi multidisciplinaryapproachtomoderndigitalsteganography
AT ghongemangesh multidisciplinaryapproachtomoderndigitalsteganography
AT ravirenjith multidisciplinaryapproachtomoderndigitalsteganography
AT cengizkorhan multidisciplinaryapproachtomoderndigitalsteganography