E-Book, Englisch, 832 Seiten
Reihe: Internet and Communications
Furht / Kirovski Multimedia Security Handbook
Erscheinungsjahr 2010
ISBN: 978-1-4200-3826-2
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
E-Book, Englisch, 832 Seiten
Reihe: Internet and Communications
ISBN: 978-1-4200-3826-2
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. Multimedia Security Handbook addresses multiple issues related to the protection of digital media, including audio, image, and video content. This volume examines leading-edge multimedia security concepts including protection architectures, encryption, watermarking, fingerprinting, authentication, and various applications.
Comprinsing 26 chapters, the Handbook begins by introducing security fundamentals and discussing the vulnerabilities of individual protection schemes. Part II focuses on multimedia encryption, detailing audio, image, and video encryption techniques. Part III examines watermarking techniques, reviewing current and future trends and discussing multidimensional, fragile, and robust watermarks. Part IV covers multimedia data hiding, fingerprinting, and authentication. The text concludes with chapters describing applications of multimedia protection schemes, presenting topics such as application taxonomy, digital rights management, and techniques for adult image filtering.
The Handbook offers comprehensive reference material on advanced topics in the field. It delivers invaluable insight for researchers, practitioners, and engineers involved in designing and developing systems that protect digital multimedia content.
Zielgruppe
Application developers and service providers, teleconferencing hardware and software suppliers, service providers, end users, educational institutes, government agencies, and non-profit corporations
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
GENERAL ISSUES
Protection of Multimedia Content in Distribution Networks
A. M. Eskicioglu and E.J. Delp
Vulnerability of Multimedia Protection Schemes
M. F. Mansour and A.H. Tewfik
MULTIMEDIA ENCRYPTION
Fundamentals of Multimedia Encryption Techniques
B. Furht, D. Socek, and A. M. Eskicioglu
Chaos-Based Encryption for Digital Image and Video
S. Li, G. Chen, and X. Zheng
Key Management and Protection for IP Multimedia
R. Blom, E. Carrara, F. Lindholm, K. Norrman, and M. Näslund
Streaming Media Encryption
H. Yu
MULTIMEDIA WATERMARKING
Survey of Multimedia Watermarking Techniques
E. Muharemagic and B. Furht
Robust Identification of Audio Using Watermarking and Fingerprinting
J. Haitsma and T. Kalker
High Capacity Real-Time Audio Watermarking with Perfect Correlation Sequence and Repeated Insertion
S-C Pei, Y-F Hsu, and Y-W Lu
Multidimensional Watermark for Still Image: Parallel Embedding and Detection
Bo Hu
Image Watermarking Method Resistant to Geometric Distortions
H. Kim
Fragile Watermarking for Image Authentication
E. Izquierdo
New Trends and Challenges in Digital Watermark Technologies: Applications for Printed Materials
Z. Liu
Robust Watermark Detection from Quantized MPEG Video Data
D. Simitopoulos, A. Briassouli, and M. G. Strintzis
Image Watermarking Robust to Both Geometric Distortion and JPEG
Compression
X. Kang, J. Huang, and Y. Q. Shi
Reversible Watermarks Using a Difference Expansion
A.M. Alattar
MULTIMEDIA DATA HIDING, FINGERPRINTING, AND
AUTHENTICATION
Lossless Data Hiding: Fundamentals, Algorithms and Applications
Y. Q. Shi, G. Xuan, and W. Su
Attacking Multimedia Protection Systems via Blind Pattern Matching
D. Kirovski and J-L Dugelay
Digital Media Fingerprinting: Techniques and Trends
W. Luh and D. Kundur
Scalable Image and Video Authentication
D. Skraparlis
Signature-Based Media Authentication
Q. Sun and S-F Chang
APPLICATIONS
Digital Watermarking Framework: Applications, Parameters and Requirements
K. Levy and T. Rodriguez
Digital Rights Management for Consumer Devices
J. Lotspiech
Adult Image Filtering for Internet Safety
H. Zheng, M. Daudi, C. Tombelle, and C. Djeraba
Combined Indexing and Watermarking of 3D Models Using the Generalized 3D Radon Transforms
P. Daras, D. Zarpalas, D. Tzovaras, D. Simitopoulos, and M. G.Strintzis
Digital Rights Management Issues for Video
S. Emmanuel and M. S. Kankanhalli