THE MAGAZINE

Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia

By Dan Bergevin

Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia. By Husrev T. Sencar, Mahalingam Ramkumar, and Ali N. Akansu; published by Elsevier Academic Press; available from ASIS International, Item #1606, 703/519-6200 (phone), www.asisonline.org (Web); 272 pages;  $70 (ASIS members); $77 (nonmembers).

 

With Data Hiding Fundamentals and Applications, the three authors seek to fill a broad gap in the literature of digital multimedia security. Steganography, the art of hiding information in multimedia content, is discussed in meticulous detail in various contexts. But if you don’t savor complex equations and block diagrams, this book isn’t for you.

Aimed at the experienced content-security professional, the book begins with a brief introduction to the types and uses of steganography. Remaining sections and chapters take the reader, step by mathematical step, through data-hiding applications such as the use of hidden watermarks in images and video to verify ownership. Also discussed are intellectual property attacks and detection and response measures for thwarting those attacks.

It can’t be overemphasized that this is not an introductory work. It is highly advanced and detailed, filled with programming schematics and algorithms. Subchapters have names such as “Cyclic Autocorrelation” and “Template and Periodicity Removal.” In fact, the rich level of detail is one of the highlights of the book for technically proficient readers, as it gives them the foundation to jump right into steganography.

Because of its high level of information, this book is recommended to computer programming professionals, technical intelligence personnel, and select students in the hard sciences. It is also recommended to data-hiding professionals who wish to expand or refresh their skills in this vital and rapidly expanding field.


Reviewer: Dan Bergevin is the principal of Catfield International, an intelligence and security firm based in the Salt Lake City, Utah, area.

 

Comments

 

The Magazine — Past Issues

 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.