Giving readers an in-depth overview of different aspects of information security mechanisms and methods, this resource also serves as an instructional tool on how to use the fundamental theoretical framework required for the development of extensive advanced techniques. The presentation of several robust algorithms illustrates this framework, helping readers to quickly master and apply fundamental principles.
Presented case studies cover:
Useful for students, researchers, and professionals, this book consists of a variety of technical tutorials that offer an abundance of graphs and examples to powerfully convey the principles of multimedia security and steganography. Imparting the extensive experience of the contributors, this approach simplifies problems, helping readers more easily understand even the most complicated theories. It also enables them to uncover novel concepts involved in the implementation of algorithms, which can lead to the discovery of new problems and new means of solving them.
Internationally renowned scholar Frank Y. Shih received his BS degree from the National Cheng Kung University, Taiwan, in 1980. He earned an MS degree from the State University of New York, Stony Brook, USA, in 1983, and a Ph.D from Purdue University, West Lafayette, Indiana, USA, in 1987. He is currently a professor at New Jersey Institute of Technology, Newark, jointly appointed in the departments of Computer Science, Electrical and Computer Engineering, and Biomedical Engineering. He is also director of the school’s Computer Vision Laboratory.