Multidisciplinary approach to modern digital steganography
"This book gives an insight to the different latest techniques and state-of-the-art methods, algorithms, architectures, models, methodologies, and case studies of steganography in the domain of Cloud, IoT and Android Platform" - Provided by publisher
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA, USA
IGI Global, Publisher of Timely Knowledge
[2021]
|
Schriftenreihe: | A volume in the Advances in information security, privacy, and ethics (AISPE) book series
Premier reference source |
Schlagworte: | |
Online-Zugang: | DE-1050 DE-573 DE-898 DE-1049 DE-706 DE-706 DE-83 URL des Erstveröffentlichers Chapter PDFs via platform |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV047349423 | ||
003 | DE-604 | ||
005 | 20220330 | ||
007 | cr|uuu---uuuuu | ||
008 | 210629s2021 xx a||| ob||| 00||| eng d | ||
020 | |a 9781799871620 |c Online |9 978-1-7998-7162-0 | ||
020 | |a 1799871622 |9 1-7998-7162-2 | ||
024 | 7 | |a 10.4018/978-1-7998-7160-6 |2 doi | |
035 | |a (ZDB-98-IGB)978-1-7998-7162-0 | ||
035 | |a (OCoLC)1258964228 | ||
035 | |a (DE-599)BVBBV047349423 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1049 |a DE-91 |a DE-898 |a DE-706 |a DE-1050 |a DE-573 |a DE-83 | ||
245 | 1 | 0 | |a Multidisciplinary approach to modern digital steganography |c Sabyasachi Pramanik (Haldia Institute of Technology, India), Mangesh Manikrao Ghonge (Sandip Foundation’s Institute of Technology and Research Centre, India), Renjith V. Ravi (MEA Engineering College, India), Korhan Cengiz (Trakya University, Turkey) |
264 | 1 | |a Hershey PA, USA |b IGI Global, Publisher of Timely Knowledge |c [2021] | |
264 | 4 | |c © 2021 | |
300 | |a 1 Online-Ressource (xxiv, 380 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a A volume in the Advances in information security, privacy, and ethics (AISPE) book series |x 1948-9749 | |
490 | 0 | |a Premier reference source | |
505 | 8 | |a Chapter 1. Unseen to seen by digital steganography: modern-day data-hiding techniques -- Chapter 2. Image steganography: recent trends and techniques -- Chapter 3. Advances in text steganography theory and research: a critical review and gaps -- Chapter 4. Machine learning and deep learning in steganography and steganalysis -- Chapter 5. Multimode approach of data encryption in images through quantum steganography -- Chapter 6. Detection of malicious spatial-domain steganography over noisy channels -- Chapter 7. Secure text extraction from complex degraded images by applying steganography and deep learning -- Chapter 8. Modern approaches to creating highly undetectable stegosystems (HUGO systems) -- Chapter 9. IoT security using steganography -- Chapter 10. An integration of keyless encryption, steganography, and artificial intelligence for the secure transmission of stego images -- Chapter 11. Multimedia data protection using hybridized Crystal payload algorithm with chicken swarm optimization -- Chapter 12. Secure framework data security using cryptography and steganography in Internet of things -- Chapter 13. Application of steganography for secure data transmission using lossless compression -- Chapter 14. Applications of machine learning in steganography for data protection and privacy -- Chapter 15. Design and development of hybrid algorithms to improve cyber security and provide securing data using image steganography with Internet of things | |
520 | 3 | |a "This book gives an insight to the different latest techniques and state-of-the-art methods, algorithms, architectures, models, methodologies, and case studies of steganography in the domain of Cloud, IoT and Android Platform" - Provided by publisher | |
653 | 0 | |a Data encryption (Computer science) | |
653 | 0 | |a Computer security | |
653 | 0 | |a Computer security | |
653 | 0 | |a Data encryption (Computer science) | |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
700 | 1 | |a Pramanik, Sabyasachi |d 1978- |4 edt | |
700 | 1 | |a Ghonge, Mangesh |d 1984- |0 (DE-588)1249970539 |4 edt | |
700 | 1 | |a Ravi, Renjith |d 1985- |4 edt | |
700 | 1 | |a Cengiz, Korhan |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-7998-7160-6 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-7998-7160-6 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Softcover |z 978-1-7998-7161-3 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-7998-7160-6 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 1 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7160-6 |3 Chapter PDFs via platform |
912 | |a ZDB-1-IGE | ||
912 | |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032751648 | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7160-6 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7160-6 |l DE-573 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://www.igi-global.com/gateway/book/261120 |l DE-898 |p ZDB-1-IGE |q ZDB-1-IGE21 |x Verlag |3 Volltext | |
966 | e | |u https://www.igi-global.com/gateway/book/261120 |l DE-1049 |p ZDB-1-IGE |q ZDB-1-IGE21 |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7160-6 |l DE-706 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-7160-6 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7160-6 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-TUM_katkey | 2570255 |
---|---|
_version_ | 1820811428872847360 |
any_adam_object | |
author2 | Pramanik, Sabyasachi 1978- Ghonge, Mangesh 1984- Ravi, Renjith 1985- Cengiz, Korhan |
author2_role | edt edt edt edt |
author2_variant | s p sp m g mg r r rr k c kc |
author_GND | (DE-588)1249970539 |
author_facet | Pramanik, Sabyasachi 1978- Ghonge, Mangesh 1984- Ravi, Renjith 1985- Cengiz, Korhan |
building | Verbundindex |
bvnumber | BV047349423 |
collection | ZDB-1-IGE ZDB-98-IGB |
contents | Chapter 1. Unseen to seen by digital steganography: modern-day data-hiding techniques -- Chapter 2. Image steganography: recent trends and techniques -- Chapter 3. Advances in text steganography theory and research: a critical review and gaps -- Chapter 4. Machine learning and deep learning in steganography and steganalysis -- Chapter 5. Multimode approach of data encryption in images through quantum steganography -- Chapter 6. Detection of malicious spatial-domain steganography over noisy channels -- Chapter 7. Secure text extraction from complex degraded images by applying steganography and deep learning -- Chapter 8. Modern approaches to creating highly undetectable stegosystems (HUGO systems) -- Chapter 9. IoT security using steganography -- Chapter 10. An integration of keyless encryption, steganography, and artificial intelligence for the secure transmission of stego images -- Chapter 11. Multimedia data protection using hybridized Crystal payload algorithm with chicken swarm optimization -- Chapter 12. Secure framework data security using cryptography and steganography in Internet of things -- Chapter 13. Application of steganography for secure data transmission using lossless compression -- Chapter 14. Applications of machine learning in steganography for data protection and privacy -- Chapter 15. Design and development of hybrid algorithms to improve cyber security and provide securing data using image steganography with Internet of things |
ctrlnum | (ZDB-98-IGB)978-1-7998-7162-0 (OCoLC)1258964228 (DE-599)BVBBV047349423 |
doi_str_mv | 10.4018/978-1-7998-7160-6 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04951nam a2200613 c 4500</leader><controlfield tag="001">BV047349423</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220330 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210629s2021 xx a||| ob||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799871620</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-7998-7162-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1799871622</subfield><subfield code="9">1-7998-7162-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-7160-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)978-1-7998-7162-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1258964228</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047349423</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1049</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Multidisciplinary approach to modern digital steganography</subfield><subfield code="c">Sabyasachi Pramanik (Haldia Institute of Technology, India), Mangesh Manikrao Ghonge (Sandip Foundation’s Institute of Technology and Research Centre, India), Renjith V. Ravi (MEA Engineering College, India), Korhan Cengiz (Trakya University, Turkey)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">IGI Global, Publisher of Timely Knowledge</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxiv, 380 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">A volume in the Advances in information security, privacy, and ethics (AISPE) book series</subfield><subfield code="x">1948-9749</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 1. Unseen to seen by digital steganography: modern-day data-hiding techniques -- Chapter 2. Image steganography: recent trends and techniques -- Chapter 3. Advances in text steganography theory and research: a critical review and gaps -- Chapter 4. Machine learning and deep learning in steganography and steganalysis -- Chapter 5. Multimode approach of data encryption in images through quantum steganography -- Chapter 6. Detection of malicious spatial-domain steganography over noisy channels -- Chapter 7. Secure text extraction from complex degraded images by applying steganography and deep learning -- Chapter 8. Modern approaches to creating highly undetectable stegosystems (HUGO systems) -- Chapter 9. IoT security using steganography -- Chapter 10. An integration of keyless encryption, steganography, and artificial intelligence for the secure transmission of stego images -- Chapter 11. Multimedia data protection using hybridized Crystal payload algorithm with chicken swarm optimization -- Chapter 12. Secure framework data security using cryptography and steganography in Internet of things -- Chapter 13. Application of steganography for secure data transmission using lossless compression -- Chapter 14. Applications of machine learning in steganography for data protection and privacy -- Chapter 15. Design and development of hybrid algorithms to improve cyber security and provide securing data using image steganography with Internet of things</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book gives an insight to the different latest techniques and state-of-the-art methods, algorithms, architectures, models, methodologies, and case studies of steganography in the domain of Cloud, IoT and Android Platform" - Provided by publisher</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pramanik, Sabyasachi</subfield><subfield code="d">1978-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ghonge, Mangesh</subfield><subfield code="d">1984-</subfield><subfield code="0">(DE-588)1249970539</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ravi, Renjith</subfield><subfield code="d">1985-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cengiz, Korhan</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-7998-7160-6</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-7998-7160-6</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Softcover</subfield><subfield code="z">978-1-7998-7161-3</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-7998-7160-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7160-6</subfield><subfield code="3">Chapter PDFs via platform</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032751648</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7160-6</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7160-6</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.igi-global.com/gateway/book/261120</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE21</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.igi-global.com/gateway/book/261120</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE21</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7160-6</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-7160-6</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7160-6</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV047349423 |
illustrated | Illustrated |
indexdate | 2024-12-24T08:46:42Z |
institution | BVB |
isbn | 9781799871620 1799871622 |
issn | 1948-9749 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032751648 |
oclc_num | 1258964228 |
open_access_boolean | |
owner | DE-1049 DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-1050 DE-573 DE-83 |
owner_facet | DE-1049 DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-1050 DE-573 DE-83 |
physical | 1 Online-Ressource (xxiv, 380 Seiten) Illustrationen |
psigel | ZDB-1-IGE ZDB-98-IGB ZDB-1-IGE ZDB-1-IGE21 ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | IGI Global, Publisher of Timely Knowledge |
record_format | marc |
series2 | A volume in the Advances in information security, privacy, and ethics (AISPE) book series Premier reference source |
spellingShingle | Multidisciplinary approach to modern digital steganography Chapter 1. Unseen to seen by digital steganography: modern-day data-hiding techniques -- Chapter 2. Image steganography: recent trends and techniques -- Chapter 3. Advances in text steganography theory and research: a critical review and gaps -- Chapter 4. Machine learning and deep learning in steganography and steganalysis -- Chapter 5. Multimode approach of data encryption in images through quantum steganography -- Chapter 6. Detection of malicious spatial-domain steganography over noisy channels -- Chapter 7. Secure text extraction from complex degraded images by applying steganography and deep learning -- Chapter 8. Modern approaches to creating highly undetectable stegosystems (HUGO systems) -- Chapter 9. IoT security using steganography -- Chapter 10. An integration of keyless encryption, steganography, and artificial intelligence for the secure transmission of stego images -- Chapter 11. Multimedia data protection using hybridized Crystal payload algorithm with chicken swarm optimization -- Chapter 12. Secure framework data security using cryptography and steganography in Internet of things -- Chapter 13. Application of steganography for secure data transmission using lossless compression -- Chapter 14. Applications of machine learning in steganography for data protection and privacy -- Chapter 15. Design and development of hybrid algorithms to improve cyber security and provide securing data using image steganography with Internet of things |
subject_GND | (DE-588)4143413-4 |
title | Multidisciplinary approach to modern digital steganography |
title_auth | Multidisciplinary approach to modern digital steganography |
title_exact_search | Multidisciplinary approach to modern digital steganography |
title_full | Multidisciplinary approach to modern digital steganography Sabyasachi Pramanik (Haldia Institute of Technology, India), Mangesh Manikrao Ghonge (Sandip Foundation’s Institute of Technology and Research Centre, India), Renjith V. Ravi (MEA Engineering College, India), Korhan Cengiz (Trakya University, Turkey) |
title_fullStr | Multidisciplinary approach to modern digital steganography Sabyasachi Pramanik (Haldia Institute of Technology, India), Mangesh Manikrao Ghonge (Sandip Foundation’s Institute of Technology and Research Centre, India), Renjith V. Ravi (MEA Engineering College, India), Korhan Cengiz (Trakya University, Turkey) |
title_full_unstemmed | Multidisciplinary approach to modern digital steganography Sabyasachi Pramanik (Haldia Institute of Technology, India), Mangesh Manikrao Ghonge (Sandip Foundation’s Institute of Technology and Research Centre, India), Renjith V. Ravi (MEA Engineering College, India), Korhan Cengiz (Trakya University, Turkey) |
title_short | Multidisciplinary approach to modern digital steganography |
title_sort | multidisciplinary approach to modern digital steganography |
topic_facet | Aufsatzsammlung |
url | https://doi.org/10.4018/978-1-7998-7160-6 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7160-6 |
work_keys_str_mv | AT pramaniksabyasachi multidisciplinaryapproachtomoderndigitalsteganography AT ghongemangesh multidisciplinaryapproachtomoderndigitalsteganography AT ravirenjith multidisciplinaryapproachtomoderndigitalsteganography AT cengizkorhan multidisciplinaryapproachtomoderndigitalsteganography |