The Indispensable Guide for the Post-Truth Era The year is 2025, and digital media faces an existential crisis. The democratization of manipulationa ccelerated by accessible editing software and crowned by the arrival of hyper-realistic generative AI has shattered our fundamental trust in recorded evidence. This collapse of faith has launched us into the era of the "Liar's Dividend, " where the existence of undetectable fakes allows malicious actors to dismiss authentic evidence as fabrication. In this volatile ecosystem, the verifiable history and chain of custody for a digital file—known as provenance—has become more valuable than the content itself. This book provides a deep, practical understanding of the technological war being waged, arming the reader with the knowledge needed to counter the threats. It serves as a single, integrated source bridging foundational cryptographic theory and cutting-edge forensic practice. The Foundation: Understand an image as structured data, a grid of pixels, and learn why the irreversible process of Lossy Compression creates predictable artifacts. The Defense: Master cryptographic principles, including Symmetric (fast for bulk data) and Asymmetric (solves key exchange) Encryption. Learn how Cryptographic Hash Functions (like SHA-256) create an unchangeable digital fingerprint to guarantee Integrity. The Vulnerability: Detail the Provenance Crisis and the rise of AI-Generated Media (Deepfakes), powered by sophisticated Generative Adversarial Networks (GANs) and Diffusion Models. The Countermeasure: Explore advanced defense strategies like Digital Watermarking for copyright protection and the cutting-edge C2PA standard for verifiable Content Credentials, which track a file's secure "chain of custody" . The Forensics: Learn to detect forgeries by finding the AI Fingerprint, identifying the Photo-Response Non-Uniformity (PRNU) noise pattern unique to every camera sensor.
"Sinopsis" puede pertenecer a otra edición de este libro.
Librería: California Books, Miami, FL, Estados Unidos de America
Condición: New. Nº de ref. del artículo: I-9789999340458
Cantidad disponible: Más de 20 disponibles
Librería: PBShop.store US, Wood Dale, IL, Estados Unidos de America
PAP. Condición: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Nº de ref. del artículo: L0-9789999340458
Cantidad disponible: Más de 20 disponibles
Librería: PBShop.store UK, Fairford, GLOS, Reino Unido
PAP. Condición: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Nº de ref. del artículo: L0-9789999340458
Cantidad disponible: Más de 20 disponibles
Librería: Revaluation Books, Exeter, Reino Unido
Paperback. Condición: Brand New. 207 pages. 6.00x0.47x9.00 inches. In Stock. Nº de ref. del artículo: x-9999340458
Cantidad disponible: 2 disponibles
Librería: preigu, Osnabrück, Alemania
Taschenbuch. Condición: Neu. Digital Image Security | From Cryptographic Principles to Content Authenticity: The Digital War on Truth: How to Secure What We See | Syed Mufassir | Taschenbuch | Englisch | 2026 | Eliva Press | EAN 9789999340458 | Verantwortliche Person für die EU: Libri GmbH, Europaallee 1, 36244 Bad Hersfeld, gpsr[at]libri[dot]de | Anbieter: preigu Print on Demand. Nº de ref. del artículo: 135133826
Cantidad disponible: 5 disponibles
Librería: AHA-BUCH GmbH, Einbeck, Alemania
Taschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - The Indispensable Guide for the Post-Truth Era The year is 2025, and digital media faces an existential crisis. The democratization of manipulationa ccelerated by accessible editing software and crowned by the arrival of hyper-realistic generative AI has shattered our fundamental trust in recorded evidence. This collapse of faith has launched us into the era of the 'Liar's Dividend, ' where the existence of undetectable fakes allows malicious actors to dismiss authentic evidence as fabrication. In this volatile ecosystem, the verifiable history and chain of custody for a digital file-known as provenance-has become more valuable than the content itself. This book provides a deep, practical understanding of the technological war being waged, arming the reader with the knowledge needed to counter the threats. It serves as a single, integrated source bridging foundational cryptographic theory and cutting-edge forensic practice. The Foundation: Understand an image as structured data, a grid of pixels, and learn why the irreversible process of Lossy Compression creates predictable artifacts. The Defense: Master cryptographic principles, including Symmetric (fast for bulk data) and Asymmetric (solves key exchange) Encryption. Learn how Cryptographic Hash Functions (like SHA-256) create an unchangeable digital fingerprint to guarantee Integrity. The Vulnerability: Detail the Provenance Crisis and the rise of AI-Generated Media (Deepfakes), powered by sophisticated Generative Adversarial Networks (GANs) and Diffusion Models. The Countermeasure: Explore advanced defense strategies like Digital Watermarking for copyright protection and the cutting-edge C2PA standard for verifiable Content Credentials, which track a file's secure 'chain of custody' . The Forensics: Learn to detect forgeries by finding the AI Fingerprint, identifying the Photo-Response Non-Uniformity (PRNU) noise pattern unique to every camera sensor. Nº de ref. del artículo: 9789999340458
Cantidad disponible: 2 disponibles