Multimedia security and the internet
The use of data hiding as a viable form of communication has been largely propelled by the growth of the Internet. The Internet offers an opportunity to exchange large amounts of digital information over great distances. The prevalence of media such as audio, videos, and images on the Internet provi...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Book Chapter |
Language: | English |
Published: |
IIUM Press
2015
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/42534/ http://irep.iium.edu.my/42534/6/Akram-chapter5.pdf |
id |
iium-42534 |
---|---|
recordtype |
eprints |
spelling |
iium-425342018-05-21T07:47:13Z http://irep.iium.edu.my/42534/ Multimedia security and the internet Zeki, Akram M. Adamu, Abubakar Ibrahim T Technology (General) The use of data hiding as a viable form of communication has been largely propelled by the growth of the Internet. The Internet offers an opportunity to exchange large amounts of digital information over great distances. The prevalence of media such as audio, videos, and images on the Internet provides an ideal channel for data hiding communication. Voice over Internet Protocol (VoIP) became a natural target for data hiding, it is appropriate to enable hidden communication throughout Internet Protocol (IP) networks. VoIP data hiding covers a wide range of information hiding techniques; including popular techniques based on IP. This chapter is trying to discover some of the data hiding applications and techniques over Internet. IIUM Press Zeki, Akram M. 2015 Book Chapter NonPeerReviewed application/pdf en http://irep.iium.edu.my/42534/6/Akram-chapter5.pdf Zeki, Akram M. and Adamu, Abubakar Ibrahim (2015) Multimedia security and the internet. In: Internet Applications. IIUM Press, International Islamic University Malaysia, pp. 48-62. ISBN 9789674183134 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
T Technology (General) |
spellingShingle |
T Technology (General) Zeki, Akram M. Adamu, Abubakar Ibrahim Multimedia security and the internet |
description |
The use of data hiding as a viable form of communication has been largely propelled by the growth of the Internet. The Internet offers an opportunity to exchange large amounts of digital information over great distances. The prevalence of media such as audio, videos, and images on the Internet provides an ideal channel for data hiding communication. Voice over Internet Protocol (VoIP) became a natural target for data hiding, it is appropriate to enable hidden communication throughout Internet Protocol (IP) networks. VoIP data hiding covers a wide range of information hiding techniques; including popular techniques based on IP. This chapter is trying to discover some of the data hiding applications and techniques over Internet. |
author2 |
Zeki, Akram M. |
author_facet |
Zeki, Akram M. Zeki, Akram M. Adamu, Abubakar Ibrahim |
format |
Book Chapter |
author |
Zeki, Akram M. Adamu, Abubakar Ibrahim |
author_sort |
Zeki, Akram M. |
title |
Multimedia security and the internet |
title_short |
Multimedia security and the internet |
title_full |
Multimedia security and the internet |
title_fullStr |
Multimedia security and the internet |
title_full_unstemmed |
Multimedia security and the internet |
title_sort |
multimedia security and the internet |
publisher |
IIUM Press |
publishDate |
2015 |
url |
http://irep.iium.edu.my/42534/ http://irep.iium.edu.my/42534/6/Akram-chapter5.pdf |
first_indexed |
2023-09-18T21:00:36Z |
last_indexed |
2023-09-18T21:00:36Z |
_version_ |
1777410597721210880 |