Multimedia Data Hiding
Seiten
2003
Springer-Verlag New York Inc.
978-0-387-95426-4 (ISBN)
Springer-Verlag New York Inc.
978-0-387-95426-4 (ISBN)
Covers the theoretical and algorithmic design for digital content/data security. This book is useful for multimedia security researchers and professionals in EE, CS and security.
The digital information revolution has brought about profound changes in our society and our life. New devices and powerful software have made it possible for consumers worldwide to create, manipulate, share, and enjoy the multimedia information. Internet and wireless networks offer ubiquitous channels to deliver and to exchange multimedia information for such pur poses as remote collaboration, distant learning, and entertainment. With all these advances in multimedia coding and communication technologies over the past decade, the major hurdle for allowing much broader access of multimedia assets and deployment of multimedia services no longer lies with bandwidth-related issues, but with how to make sure that content is used for its intended purpose by its intended recipients. The core issue then be comes the development of secure management of content usage and delivery across communication networks. Data hiding and digital watermarking are promising new technologies for multimedia information protection and rights management. Secondary data can be embedded imperceptibly in digital multimedia signals for a variety of applications, including ownership protection, authentication, access con trol, and annotation. Data hiding can also be used to send side information in multimedia communication for providing additional functionalities or for enhancing performance. The extraction of the embedded data mayor may not need knowledge of the original host media data. In addition to im perceptibility, robustness against moderate processing such as compression is also an important consideration.
The digital information revolution has brought about profound changes in our society and our life. New devices and powerful software have made it possible for consumers worldwide to create, manipulate, share, and enjoy the multimedia information. Internet and wireless networks offer ubiquitous channels to deliver and to exchange multimedia information for such pur poses as remote collaboration, distant learning, and entertainment. With all these advances in multimedia coding and communication technologies over the past decade, the major hurdle for allowing much broader access of multimedia assets and deployment of multimedia services no longer lies with bandwidth-related issues, but with how to make sure that content is used for its intended purpose by its intended recipients. The core issue then be comes the development of secure management of content usage and delivery across communication networks. Data hiding and digital watermarking are promising new technologies for multimedia information protection and rights management. Secondary data can be embedded imperceptibly in digital multimedia signals for a variety of applications, including ownership protection, authentication, access con trol, and annotation. Data hiding can also be used to send side information in multimedia communication for providing additional functionalities or for enhancing performance. The extraction of the embedded data mayor may not need knowledge of the original host media data. In addition to im perceptibility, robustness against moderate processing such as compression is also an important consideration.
1 Introduction.- 1.1 Overview of Multimedia Data Hiding.- 1.2 Book Organization.- I Fundamental Issues.- 2 Preliminaries.- 3 Basic Embedding Mechanisms.- 4 Handling Uneven Embedding Capacity.- II Algorithm and System Designs.- 5 Data Hiding in Binary Image.- 6 Multilevel Data Hiding for Image and Video.- 7 Data Hiding for Image Authentication.- 8 Data Hiding for Video Communications.- III Attacks and Countermeasures.- 9 Attacks on Known Data Hiding Algorithms.- 10 Attacks on Unknown Data Hiding Algorithms.- 11 Conclusions and Perspectives.- References.- About the Authors.
Erscheint lt. Verlag | 14.1.2003 |
---|---|
Zusatzinfo | 55 Illustrations, black and white; XIX, 219 p. 55 illus. |
Verlagsort | New York, NY |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
ISBN-10 | 0-387-95426-0 / 0387954260 |
ISBN-13 | 978-0-387-95426-4 / 9780387954264 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
CHF 13,90
Die faszinierende Geschichte der Verschlüsselung
Buch | Softcover (2022)
Springer (Verlag)
CHF 48,95