Multidisciplinary approach to modern digital steganography
"This book gives an insight to the different latest techniques and state-of-the-art methods, algorithms, architectures, models, methodologies, and case studies of steganography in the domain of Cloud, IoT and Android Platform"--
| Other Authors: | , , , |
|---|---|
| Format: | eBook |
| Language: | English |
| Published: |
Hershey, PA
Information Science Reference, an imprint of IGI Global,
[2021]
|
| Series: | Advances in information security, privacy, and ethics (AISPE) book series.
|
| Subjects: | |
| Online Access: | EBSCOhost Перейти в каталог НБ ТГУ |
| LEADER | 04214cam a2200589 i 4500 | ||
|---|---|---|---|
| 001 | koha001013587 | ||
| 003 | OCoLC | ||
| 005 | 20250222070005.0 | ||
| 006 | m d | ||
| 007 | cr ||||||||||| | ||
| 008 | 201117s2021 paua ob 001 0 eng | ||
| 010 | |a 2020052340 | ||
| 035 | |a koha001013587 | ||
| 040 | |a DLC |b eng |e rda |c DLC |d OCLCO |d OCLCF |d YDX |d OCLCQ |d OCLCO |d OCLCQ |d IGIGL |d INT |d EBLCP |d OCLCO |d N$T | ||
| 019 | |a 1253444547 |a 1255228671 |a 1269357082 | ||
| 020 | |a 9781799871620 |q (electronic book) | ||
| 020 | |a 1799871622 |q (electronic book) | ||
| 020 | |a 9781799871637 |q (electronic bk.) | ||
| 020 | |a 1799871630 |q (electronic bk.) | ||
| 020 | |z 9781799871606 |q (hardcover) | ||
| 020 | |z 9781799871613 |q (paperback) | ||
| 024 | 7 | |a 10.4018/978-1-7998-7160-6 |2 doi | |
| 042 | |a pcc | ||
| 050 | 0 | 4 | |a QA76.9.D335 |b M85 2021 |
| 082 | 0 | 0 | |a 005.8/24 |2 23 |
| 049 | |a MAIN | ||
| 245 | 0 | 0 | |a Multidisciplinary approach to modern digital steganography |c Sabyasachi Pramanik, Mangesh Manikrao Ghonge, Renjith V. Ravi, Korhan Cengiz. |
| 264 | 1 | |a Hershey, PA |b Information Science Reference, an imprint of IGI Global, |c [2021] | |
| 300 | |a 1 online resource (xxiv, 380 pages) |b illustrations (some color) | ||
| 347 | |a text file |2 rdaft |0 http://rdaregistry.info/termList/fileType/1002 | ||
| 490 | 1 | |a Advances in information security, privacy, and ethics (AISPE) book series | |
| 500 | |a "Premier Reference Source"--Taken from front cover | ||
| 504 | |a Includes bibliographical references and index. | ||
| 520 | |a "This book gives an insight to the different latest techniques and state-of-the-art methods, algorithms, architectures, models, methodologies, and case studies of steganography in the domain of Cloud, IoT and Android Platform"-- |c Provided by publisher | ||
| 588 | 0 | |a Online resource; title from digital title page (viewed on July 13, 2021). | |
| 505 | 0 | |a Chapter 1. Unseen to seen by digital steganography: modern-day data-hiding techniques -- Chapter 2. Image steganography: recent trends and techniques -- Chapter 3. Advances in text steganography theory and research: a critical review and gaps -- Chapter 4. Machine learning and deep learning in steganography and steganalysis -- Chapter 5. Multimode approach of data encryption in images through quantum steganography -- Chapter 6. Detection of malicious spatial-domain steganography over noisy channels -- Chapter 7. Secure text extraction from complex degraded images by applying steganography and deep learning -- Chapter 8. Modern approaches to creating highly undetectable stegosystems (HUGO systems) -- Chapter 9. IoT security using steganography -- Chapter 10. An integration of keyless encryption, steganography, and artificial intelligence for the secure transmission of stego images -- Chapter 11. Multimedia data protection using hybridized Crystal payload algorithm with chicken swarm optimization -- Chapter 12. Secure framework data security using cryptography and steganography in Internet of things -- Chapter 13. Application of steganography for secure data transmission using lossless compression -- Chapter 14. Applications of machine learning in steganography for data protection and privacy -- Chapter 15. Design and development of hybrid algorithms to improve cyber security and provide securing data using image steganography with Internet of things. | |
| 653 | 0 | |a Data encryption (Computer science) | |
| 653 | 0 | |a Computer security. | |
| 653 | 7 | |a Computer security. |2 fast |0 (OCoLC)fst00872484 | |
| 653 | 7 | |a Data encryption (Computer science) |2 fast |0 (OCoLC)fst00887935 | |
| 655 | 0 | |a EBSCO eBooks |9 905790 | |
| 655 | 4 | |a Electronic books. |9 899821 | |
| 700 | 1 | |a Pramanik, Sabyasachi, |d 1978- |9 911971 | |
| 700 | 1 | |a Ghonge, Mangesh, |d 1984- |9 910217 | |
| 700 | 1 | |a Ravi, Renjith, |d 1985- |9 910218 | |
| 700 | 1 | |a Cengiz, Korhan, |9 911972 | |
| 830 | 0 | |a Advances in information security, privacy, and ethics (AISPE) book series. |9 911200 | |
| 856 | 4 | 0 | |3 EBSCOhost |u https://www.lib.tsu.ru/limit/2023/EBSCO/2939946.pdf |
| 856 | |y Перейти в каталог НБ ТГУ |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1013587 | ||
| 910 | |a EBSCO eBooks | ||
| 999 | |c 1013587 |d 1013587 | ||
| 039 | |||
