Multimedia security and the internet
The use of data hiding as a viable form of communication has been largely propelled by the growth of the Internet. The Internet offers an opportunity to exchange large amounts of digital information over great distances. The prevalence of media such as audio, videos, and images on the Internet provi...
Saved in:
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Book Chapter |
Language: | English |
Published: |
IIUM Press
2015
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/42534/6/Akram-chapter5.pdf http://irep.iium.edu.my/42534/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.iium.irep.42534 |
---|---|
record_format |
dspace |
spelling |
my.iium.irep.425342018-05-21T07:47:13Z http://irep.iium.edu.my/42534/ Multimedia security and the internet Zeki, Akram M. Adamu, Abubakar Ibrahim T Technology (General) The use of data hiding as a viable form of communication has been largely propelled by the growth of the Internet. The Internet offers an opportunity to exchange large amounts of digital information over great distances. The prevalence of media such as audio, videos, and images on the Internet provides an ideal channel for data hiding communication. Voice over Internet Protocol (VoIP) became a natural target for data hiding, it is appropriate to enable hidden communication throughout Internet Protocol (IP) networks. VoIP data hiding covers a wide range of information hiding techniques; including popular techniques based on IP. This chapter is trying to discover some of the data hiding applications and techniques over Internet. IIUM Press Zeki, Akram M. 2015 Book Chapter REM application/pdf en http://irep.iium.edu.my/42534/6/Akram-chapter5.pdf Zeki, Akram M. and Adamu, Abubakar Ibrahim (2015) Multimedia security and the internet. In: Internet Applications. IIUM Press, International Islamic University Malaysia, pp. 48-62. ISBN 9789674183134 |
institution |
Universiti Islam Antarabangsa Malaysia |
building |
IIUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
International Islamic University Malaysia |
content_source |
IIUM Repository (IREP) |
url_provider |
http://irep.iium.edu.my/ |
language |
English |
topic |
T Technology (General) |
spellingShingle |
T Technology (General) Zeki, Akram M. Adamu, Abubakar Ibrahim Multimedia security and the internet |
description |
The use of data hiding as a viable form of communication has been largely propelled by the growth of the Internet. The Internet offers an opportunity to exchange large amounts of digital information over great distances. The prevalence of media such as audio, videos, and images on the Internet provides an ideal channel for data hiding communication. Voice over Internet Protocol (VoIP) became a natural target for data hiding, it is appropriate to enable hidden communication throughout Internet Protocol (IP) networks. VoIP data hiding covers a wide range of information hiding techniques; including popular techniques based on IP. This chapter is trying to discover some of the data hiding applications and techniques over Internet. |
author2 |
Zeki, Akram M. |
author_facet |
Zeki, Akram M. Zeki, Akram M. Adamu, Abubakar Ibrahim |
format |
Book Chapter |
author |
Zeki, Akram M. Adamu, Abubakar Ibrahim |
author_sort |
Zeki, Akram M. |
title |
Multimedia security and the internet |
title_short |
Multimedia security and the internet |
title_full |
Multimedia security and the internet |
title_fullStr |
Multimedia security and the internet |
title_full_unstemmed |
Multimedia security and the internet |
title_sort |
multimedia security and the internet |
publisher |
IIUM Press |
publishDate |
2015 |
url |
http://irep.iium.edu.my/42534/6/Akram-chapter5.pdf http://irep.iium.edu.my/42534/ |
_version_ |
1643612206581940224 |
score |
13.211869 |