1. Trang chủ
  2. » Công Nghệ Thông Tin

multimedia forensics & security

417 171 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

[...]... for multimedia forensics ment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement, xv and IT /multimedia practitioners, who are interested or involved in the study, research, use, design, and development of techniques related to multimedia forensics and security aims at dissemilating the idea of digital watermarking and its applications to multimedia security. .. (Barreto & Kim, 1999; Barreto, Kim, & Rijmen, 2002; Holliman & Memon, 2000; Wong, 1998; Yeung & Mintzer, 1997; Zhao & Koch, 1995) It seems to be very making use of the solid cryptography theory and techniques Indeed, those AWs that were not founded in cryptography theory (Yeung & Mintzer, 1997; Zhao & Koch, 1995) or those that applied cryptographic techniques without the due care (Li, Lou, & Chen, 2000;... document forgery, to name a few To prevent abuses of the usage of ICT and multimedia techniques, the study of multimedia forensics and security has emerged in recent years as a new interdisciplinary area encompassing aspects of digital cryptography, digital watermarking, data hiding, steganography, and steganalysis Moreover, multimedia forensic techniques have also opened up a new horizon for helping... of multimedia forensics and security Although a number of quality books have been published in the literature, accounts of the latest researches and developments Aiming at serving this purpose, this book contains a collection of informative and stimulating chapters written by knowledgeable experts and covers a wide spectrum of the state-of-the-art techniques for tackling the issues of multimedia forensics. .. any semi-fragile AW for binary images In the literature, there are many semi-fragile watermarks for continuous-tone images (Eggers & Girod, 2001; Fridrich, 1999; Kundur & Hatzinakos, 1998; Lan, Mansour, & 2001; Lin, Podilchuk, & Delp, 2000; Marvel et al., 2000; Yu, Lu, & Liao, 2001) Ekici, Sankur, and Akcay (2004) enumerate eight “permissible” 1 2 3 JPEG compression Histogram equalization Sharpening... colossal scale These concerns create anxiety and uncertainty about the reality of the media we deal with of multimedia forensics and security, which aims at pooling expertise in various areas, such as signal processing, information theory, cryptography, and so forth to combat the abuses of ICT and multimedia techniques In particular, digital watermarking schemes have been proposed to meet copyright protec-... continue to provide limited means Chapter XV Traitor Tracing for Multimedia Forensics 314 Hongxia Jin, IBM Almaden Research Center, USA This chapter discusses the cryptographic traitor tracing technology that is used to defend against piracy in multimedia content distribution It talks about different potential pirate attacks in a multimedia content distribution system It discusses how traitor... digital photograph Character- has subsequently been recompressed, allowing the investigator to narrow down the possible camera Chapter XV, Traitor Tracing for Multimedia Forensics, authored by Hongxia Jin, reviews potential pirate attacks on multimedia content distribution systems and discusses how traitor tracing techniques can be used to defend against those attacks by tracing the attackers and colluders... color images and they cannot be directly applied to binary images Many of continuous-tone DHs modify the quantization index (Chen & Wornell, 2001), or modify spectral components of data in a spread-spectrum-like fashion (Cox, Kilian, Leighton, & Shamoon, 1997; Marvel, Boncelet, & Retter, 1999) Many of the continuous-tone DHs makes use of transforms like DCT and wavelet Unfortunately, none of the previous... multimedia forensics and security Each chapter is a self-contained treatment on one aspect of the broad subject, allowing the readers to follow any order of their liking The chapters are selected to suit readers of different levels with various interests, making this book an invaluable reference for beginners as well as experts alike Professor Anthony TS Ho Professor and Chair of Multimedia Security, Director . was an associate professor of the 'HSDUWPHQWRI(OHFWULFDO(QJLQHHULQJDW&&,7GXULQJDQGDYLVLWLQJSURIHVVRURIWKH'HSDUWPHQWRI&RPSXWHU 6FLHQFHDW861DYDO3RVWJUDGXDWH6FKRROLQWKHVHFRQGKDOIRI+HLVFXUUHQWODQDVVRFLDWHSURIHVVRURIWKH'HSDUW- ment. forgery, to name a few. To prevent abuses of the usage of ICT and multimedia techniques, the study of multimedia forensics and security has emerged in recent years as a new interdisciplinary area. enforcement, xv and IT /multimedia practitioners, who are interested or involved in the study, research, use, design, and development of techniques related to multimedia forensics and security. 7KLVERRNFRQVLVWVRIWKUHHPDLQFRPSRQHQWV7KH¿UVWFRPSRQHQWFRPSULVHGRI&KDSWHUV,WR9,, aims

Ngày đăng: 25/03/2014, 11:52

Xem thêm: multimedia forensics & security

TỪ KHÓA LIÊN QUAN

Mục lục

    Detailed Table of Contents

    Chapter I: Authentication Watermarkings for Binary Images

    Chapter II: Secure Multimedia Content Distribution Based on Watermarking Technology

    Chapter III: Digital Watermarking in the Transform Domain with Emphasis on SVD

    Chapter IV: Digital Video Watermarking and the Collusion Attack

    Chapter V: A Survey of Current Watermarking Synchronization Techniq

    Chapter VI: On the Necessity of Finding Content Before Watermark Retrieval: Active Search Strategies for Localising Watermarked Media on the Internet

    Chapter VII: Statistical Watermark Detection in the Transform Domain for Digital Images

    Chapter VIII: On Noise, Steganography, and the Active Warden

    Chapter IX: Visibility Control and Quality Assessment of Watermarking and Data Hiding Algorithms

TÀI LIỆU CÙNG NGƯỜI DÙNG

  • Đang cập nhật ...

TÀI LIỆU LIÊN QUAN