没有合适的资源?快使用搜索试试~ 我知道了~
首页Multimedia Forensics and Security
Multimedia Forensics and Security
5星 · 超过95%的资源 需积分: 9 20 下载量 74 浏览量
更新于2023-03-03
评论
收藏 11.16MB PDF 举报
As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication networks. Increasing amounts of digital image, video, and music have created numerous information security issues and is now taken as one of the top research and development agendas for researchers, organizations, and governments worldwide. Multimedia Forensics and Security provides an in-depth treatment of advancements in the emerging field of multimedia forensics and security by tackling challenging issues such as digital watermarking for copyright protection, digital fingerprinting for transaction tracking, and digital camera source identification.
资源详情
资源评论
资源推荐
Multimedia Forensics and
Security
Chang-Tsun Li
University of Warwick, UK
Hershey • New York
INFORMATION SCIENCE REFERENCE
Acquisitions Editor: Kristin Klinger
Managing Development Editor: Kristin Roth
Assistant Managing Development Editor: Jessica Thompson
Editorial Assistant: Rebecca Beistline
Senior Managing Editor: Jennifer Neidig
Managing Editor: Jamie Snavely
Assistant Managing Editor: Carole Coulson
Copy Editor: Holly Powell
Typesetter: Carole Coulson
Cover Design: Lisa Tosheff
Printed at: Yurchak Printing Inc.
Published in the United States of America by
Information Science Reference (an imprint of IGI Global)
701 E. Chocolate Avenue, Suite 200
Hershey PA 17033
Tel: 717-533-8845
Fax: 717-533-8661
E-mail: cust@igi-global.com
Web site: http://www.igi-global.com
and in the United Kingdom by
Information Science Reference (an imprint of IGI Global)
3 Henrietta Street
Covent Garden
London WC2E 8LU
Tel: 44 20 7240 0856
Fax: 44 20 7379 0609
Web site: http://www.eurospanbookstore.com
Copyright © 2009 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by
any means, electronic or mechanical, including photocopying, without written permission from the publisher.
3URGXFWRUFRPSDQ\QDPHVXVHGLQWKLVVHWDUHIRULGHQWL¿FDWLRQSXUSRVHVRQO\,QFOXVLRQRIWKHQDPHVRIWKHSURGXFWVRUFRPSDQLHVGRHV
not indicate a claim of ownership by IGI Global of the trademark or registered trademark.
Library of Congress Cataloging-in-Publication Data
Multimedia forensics and security / Chang-Tsun Li, editor.
p. cm.
Includes bibliographical references and index.
6XPPDU\7KLVERRNSURYLGHVDQLQGHSWKWUHDWPHQWRIDGYDQFHPHQWVLQWKHHPHUJLQJ¿HOGRIPXOWLPHGLDIRUHQVLFVDQGVHFXULW\E\
WDFNOLQJFKDOOHQJLQJLVVXHVVXFKDVGLJLWDOZDWHUPDUNLQJIRUFRS\ULJKWSURWHFWLRQGLJLWDO¿QJHUSULQWLQJIRUWUDQVDFWLRQWUDFNLQJDQGGLJLWDO
FDPHUDVRXUFHLGHQWL¿FDWLRQ3URYLGHGE\SXEOLVKHU
ISBN 978-1-59904-869-7 (hardcover) -- ISBN 978-1-59904-870-3 (ebook)
1. Multimedia systems--Security measures. 2. Data encryption (Computer science) 3. Data protection. I. Li, Chang-Tsun.
QA76.575.M83187 2008
005.8--dc22
2008008467
British Cataloguing in Publication Data
A Cataloguing in Publication record for this book is available from the British Library.
All work contributed to this book set is original material. The views expressed in this book are those of the authors, but not necessarily of
the publisher.
If a library purchased a print copy of this publication, please go to http://www.igi-global.com/agreement for information on activating the
library's complimentary electronic access to this publication.
List of Reviewers
Andrew Ker
Oxford University, UK
Alain Trémeau
Université Jean Monnet - Bat. E, FRANCE
Natasa Terzija
University of Manchester, UK
Chang-Tsun Li
Univeristy of Warwick, UK
Yinyin Yuan
Univeristy of Warwick, UK
Yue Li
Univeristy of Warwick, UK
Andreas Uhl
Salzburg University, Salzburg, Austria
Zhu Yan
Peiking University, China
Fouad Khelif
Queen’s University Belfast, UK
Martin Steinebach
Media Security in IT, Germany
Patrick.Wolf
Media Security in IT, Germany
Maciej Li´skiewicz
)HGHUDO2I¿FHIRU,QIRUPDWLRQ6HFXULW\%6,
Germany
Ulrich Wölfel
)HGHUDO2I¿FHIRU,QIRUPDWLRQ6HFXULW\%6,
Germany
Florent Autrusseau
l’Université de Nantes, FRANCE
Maria Calagna
Universita’ La Sapienza, Italy
Hongxia Jin
IBM Almaden Research Center, USA
Hae Yong Kim
Universidade de São Paulo, Brazil
Sergio Pamboukian
Universidade Presbiteriana Mackenzie, Brazil
Shiguo Liang
France Telecom R&D Beijing
Angela Wong
University of Adelaide, Australia
Matthew Sorell
University of Adelaide, Australia
Roberto Caldelli
University of Florence, Italy
Alessandro Piva
University of Florence, Italy
Abdellatif ZAIDI
UCL, Belgium
Yonggang Fu
Jimei University, China
Xingming Sun
Hunan University, China
Yongjian Hu
South China University of Technology, China
Table of Contents
Foreword ...........................................................................................................................................xiii
Preface ............................................................................................................................................... xiv
Chapter I
Authentication Watermarkings for Binary Images ................................................................................ 1
Hae Yong Kim, Universidade de São Paolo, Brazil
Sergio Vincente Denser Pamboukian, Universidade Presbiteriana Mackenzie, Brazil
Paulo Sérgio Licciardi Messeder Barreto, Universidade de São Paolo, Brazil
Chapter II
Secure Multimedia Content Distribution Based on Watermarking Technology .................................. 24
Shiguo Lian, France Telecom Research & Development–Beijing, P.R. China
Chapter III
Digital Watermarking in the Transform Domain with Emphasis on SVD .......................................... 46
Maria Calagna, Dipartimento di Informatica, Universita’ di Roma La Sapienza, Italy
Chapter IV
Digital Video Watermarking and the Collusion Attack ........................................................................ 67
Roberto Caldelli, University of Florence, Italy
Alessandro Piva, University of Florence, Italy
Chapter V
A Survey of Current Watermarking Synchronization Techniques ....................................................... 84
Nataša Terzija, The University of Manchester, UK
Chapter VI
On the Necessity of Finding Content Before Watermark Retrieval: Active Search
Strategies for Localising Watermarked Media on the Internet .......................................................... 106
0DUWLQ6WHLQHEDFK)UDXQKRIHU,QVWLWXWHIRU6HFXUH,QIRUPDWLRQ7HFKQRORJ\6,7*HUPDQ\
3DWULFN:ROI)UDXQKRIHU,QVWLWXWHIRU6HFXUH,QIRUPDWLRQ7HFKQRORJ\6,7*HUPDQ\
剩余416页未读,继续阅读
松子茶
- 粉丝: 2861
- 资源: 9
上传资源 快速赚钱
- 我的内容管理 收起
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
会员权益专享
最新资源
- RTL8188FU-Linux-v5.7.4.2-36687.20200602.tar(20765).gz
- c++校园超市商品信息管理系统课程设计说明书(含源代码) (2).pdf
- 建筑供配电系统相关课件.pptx
- 企业管理规章制度及管理模式.doc
- vb打开摄像头.doc
- 云计算-可信计算中认证协议改进方案.pdf
- [详细完整版]单片机编程4.ppt
- c语言常用算法.pdf
- c++经典程序代码大全.pdf
- 单片机数字时钟资料.doc
- 11项目管理前沿1.0.pptx
- 基于ssm的“魅力”繁峙宣传网站的设计与实现论文.doc
- 智慧交通综合解决方案.pptx
- 建筑防潮设计-PowerPointPresentati.pptx
- SPC统计过程控制程序.pptx
- SPC统计方法基础知识.pptx
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论3