Multimedia forensics and security:
"This book provides an in-depth treatment of advancements in the emerging field of multimedia forensics and security by tackling challenging issues such as digital watermarking for copyright protection, digital fingerprinting for transaction tracking, and digital camera source identification&qu...
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Hershey, Pa. [u.a.]
Information Science Reference
2009
|
Schriftenreihe: | Premier reference source
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | "This book provides an in-depth treatment of advancements in the emerging field of multimedia forensics and security by tackling challenging issues such as digital watermarking for copyright protection, digital fingerprinting for transaction tracking, and digital camera source identification"--Provided by publisher. |
Beschreibung: | XIX, 396 S. Ill., graph. Darst. |
ISBN: | 1599048698 9781599048697 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV035080087 | ||
003 | DE-604 | ||
005 | 20090219 | ||
007 | t | ||
008 | 081001s2009 xxuad|| |||| 00||| eng d | ||
010 | |a 2008008467 | ||
015 | |a GBA884093 |2 dnb | ||
020 | |a 1599048698 |c hardcover |9 1-599-04869-8 | ||
020 | |a 9781599048697 |c hardcover |9 978-1-599-04869-7 | ||
035 | |a (OCoLC)182730996 | ||
035 | |a (DE-599)BVBBV035080087 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-703 |a DE-522 | ||
050 | 0 | |a QA76.575 | |
082 | 0 | |a 005.8 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Multimedia forensics and security |c Chang-Tsun Li [ed.] |
264 | 1 | |a Hershey, Pa. [u.a.] |b Information Science Reference |c 2009 | |
300 | |a XIX, 396 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Premier reference source | |
520 | 3 | |a "This book provides an in-depth treatment of advancements in the emerging field of multimedia forensics and security by tackling challenging issues such as digital watermarking for copyright protection, digital fingerprinting for transaction tracking, and digital camera source identification"--Provided by publisher. | |
650 | 4 | |a Multimedia systems |x Security measures | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Data protection | |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Multimedia |0 (DE-588)4192358-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Multimedia |0 (DE-588)4192358-3 |D s |
689 | 0 | 1 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 0 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Li, Chang-Tsun |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 1-599-04870-1 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-599-04870-3 |
856 | 4 | 2 | |m Digitalisierung UB Bayreuth |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016748340&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016748340 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804138031861465088 |
---|---|
adam_text | Table
of
Contents
Foreword
...........................................................................................................................................
Х1П
Preface
...............................................................................................................................................xiv
Chapter I
Authentication Watermarkings for Binary Images
................................................................................1
Нае
Yong Kim,
Universidade de São
Paolo, Brazil
Sergio
Vincente
Denser Pamboukian,
Universidade Presbiteriana
Mackenzie, Brazil
Paulo
Sérgio
Licciardi
Messeder
Barreto, Universidade de São
Paolo,
Brazil
Chapter II
Secure Multimedia Content Distribution Based on Watermarking Technology
..................................24
Shiguo
Lian,
France Telecom Research
&
Development-Beijing, PR. China
Chapter III
Digital Watermarking in the Transform Domain with Emphasis on
SVD
..........................................46
Maria Calagna,
Dipartimento di Informatica,
Universita
di Roma La Sapienza,
Italy
Chapter IV
Digital Video
Watermarking and the Collusion Attack
........................................................................67
Roberto Caldelli,
University of Florence, Italy
Alessandro Piva,
University of Florence, Italy
Chapter V
A Survey of Current Watermarking Synchronization Techniques
.......................................................84
Nataša
Terzija, The University of Manchester, UK
Chapter VI
On the Necessity of Finding Content Before Watermark Retrieval: Active Search
Strategies for Localising Watermarked Media on the Internet
..........................................................106
Martin
Steinebach, Fraunhofer
Institute for Secure Information Technology (SIT), Germany
Patrick
Wolf Fraunhofer
Institute for Secure Information Technology (SIT), Germany
Chapter
VII
Statistical Watermark Detection in the Transform Domain for Digital Images
................................. 120
Fouad Khelifi, The Institute of Electronics Communications and Information Technology
(ECIT), Queens University Belfast,UK
Fatih Kurugollu, The Institute of Electronics Communications and Information Technology
(ECIT), Queen s UniversityBelfast,UK
Ahmed
Bour
idane. The Institute of Electronics Communications and Information Technology
(ECIT), Queen
s
University Belfast, UK
Chapter
VIII
On Noise, Steganography, and the Active Warden
............................................................................ 139
Christopher B. Smith, Southwest Research Institute, USA
Sos
S.
Agaian, The University of Texas at San Antonio, USA
Chapter IX
Visibility Control and Quality Assessment of Watermarking and Data Hiding Algorithms
..............163
Patrick
Le Callet,
Polytech Nantes, University of Nantes, IRCCyN Lab, France
Florent
Autrusseau, Polytech Nantes, University of Nantes, IRCCyN Lab, France
Patrizio Campisi, Università degli Studi Roma TRE,
Italy
Chapter
Χ
Computational Aspects of Digital Steganography
............................................................................. 193
Maciej Liśkiewicz,
Institute of Theoretical Computer Science, University of
Lübeck,
Germany
Ulrich
Wölfel,
Federal Office Information Security (BSI), Germany
Chapter XI
On
Steganalysis
and Clean Image Estimation
...................................................................................2
1
2
Christopher B. Smith, Southwest Research Institute, USA
Sos
S.
Agaian, The University of Texas at San Antonio, USA
Chapter
XII
Steganalysis:
Trends and Challenges
.................................................................................................245
Hafiz
Malik, University of Michigan-Dearborn, USA
Rajarathnam Chandramouli, Stevens Institute of Technology, USA
K. P. Subbalakshmi, Stevens Institute of Technology, USA
Chapter
XIII
Benchmarking
Steganalysis
...............................................................................................................266
Andrew
D. Ker,
Oxford University Computing Laboratory, UK
Chapter
XIV
Digital Camera Source Identification Through JPEG Quantisation
..................................................291
Matthew
J
.
Sorell, University of Adelaide, Australia
Chapter XV
Traitor Tracing for Multimedia Forensics
..........................................................................................314
Hongxia Jin, IBM
Almadén
Research Center, USA
Chapter
XVI
Efficient Transparent JPEG2000 Encryption
.....................................................................................336
Dominik Engel,
University of
Salzburg,
Austria
Thomas
Stütz,
University of Salzburg, Austria
Andreas
Uhi,
University of Salzburg, Austria
Compilation of References
.............................................................................................................360
About the Contributors
..................................................................................................................387
Index
...............................................................................................................................................393
|
adam_txt |
Table
of
Contents
Foreword
.
Х1П
Preface
.xiv
Chapter I
Authentication Watermarkings for Binary Images
.1
Нае
Yong Kim,
Universidade de São
Paolo, Brazil
Sergio
Vincente
Denser Pamboukian,
Universidade Presbiteriana
Mackenzie, Brazil
Paulo
Sérgio
Licciardi
Messeder
Barreto, Universidade de São
Paolo,
Brazil
Chapter II
Secure Multimedia Content Distribution Based on Watermarking Technology
.24
Shiguo
Lian,
France Telecom Research
&
Development-Beijing, PR. China
Chapter III
Digital Watermarking in the Transform Domain with Emphasis on
SVD
.46
Maria Calagna,
Dipartimento di Informatica,
Universita
'di Roma La Sapienza,
Italy
Chapter IV
Digital Video
Watermarking and the Collusion Attack
.67
Roberto Caldelli,
University of Florence, Italy
Alessandro Piva,
University of Florence, Italy
Chapter V
A Survey of Current Watermarking Synchronization Techniques
.84
Nataša
Terzija, The University of Manchester, UK
Chapter VI
On the Necessity of Finding Content Before Watermark Retrieval: Active Search
Strategies for Localising Watermarked Media on the Internet
.106
Martin
Steinebach, Fraunhofer
Institute for Secure Information Technology (SIT), Germany
Patrick
Wolf Fraunhofer
Institute for Secure Information Technology (SIT), Germany
Chapter
VII
Statistical Watermark Detection in the Transform Domain for Digital Images
. 120
Fouad Khelifi, The Institute of Electronics Communications and Information Technology
(ECIT), Queens University Belfast,UK
Fatih Kurugollu, The Institute of Electronics Communications and Information Technology
(ECIT), Queen's UniversityBelfast,UK
Ahmed
Bour
idane. The Institute of Electronics Communications and Information Technology
(ECIT), Queen
s
University Belfast, UK
Chapter
VIII
On Noise, Steganography, and the Active Warden
. 139
Christopher B. Smith, Southwest Research Institute, USA
Sos
S.
Agaian, The University of Texas at San Antonio, USA
Chapter IX
Visibility Control and Quality Assessment of Watermarking and Data Hiding Algorithms
.163
Patrick
Le Callet,
Polytech 'Nantes, University of Nantes, IRCCyN Lab, France
Florent
Autrusseau, Polytech'Nantes, University of Nantes, IRCCyN Lab, France
Patrizio Campisi, Università degli Studi Roma TRE,
Italy
Chapter
Χ
Computational Aspects of Digital Steganography
. 193
Maciej Liśkiewicz,
Institute of Theoretical Computer Science, University of
Lübeck,
Germany
Ulrich
Wölfel,
Federal Office Information Security (BSI), Germany
Chapter XI
On
Steganalysis
and Clean Image Estimation
.2
1
2
Christopher B. Smith, Southwest Research Institute, USA
Sos
S.
Agaian, The University of Texas at San Antonio, USA
Chapter
XII
Steganalysis:
Trends and Challenges
.245
Hafiz
Malik, University of Michigan-Dearborn, USA
Rajarathnam Chandramouli, Stevens Institute of Technology, USA
K. P. Subbalakshmi, Stevens Institute of Technology, USA
Chapter
XIII
Benchmarking
Steganalysis
.266
Andrew
D. Ker,
Oxford University Computing Laboratory, UK
Chapter
XIV
Digital Camera Source Identification Through JPEG Quantisation
.291
Matthew
J
'.
Sorell, University of Adelaide, Australia
Chapter XV
Traitor Tracing for Multimedia Forensics
.314
Hongxia Jin, IBM
Almadén
Research Center, USA
Chapter
XVI
Efficient Transparent JPEG2000 Encryption
.336
Dominik Engel,
University of
Salzburg,
Austria
Thomas
Stütz,
University of Salzburg, Austria
Andreas
Uhi,
University of Salzburg, Austria
Compilation of References
.360
About the Contributors
.387
Index
.393 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
building | Verbundindex |
bvnumber | BV035080087 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.575 |
callnumber-search | QA76.575 |
callnumber-sort | QA 276.575 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)182730996 (DE-599)BVBBV035080087 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02416nam a2200541zc 4500</leader><controlfield tag="001">BV035080087</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090219 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">081001s2009 xxuad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2008008467</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA884093</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1599048698</subfield><subfield code="c">hardcover</subfield><subfield code="9">1-599-04869-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781599048697</subfield><subfield code="c">hardcover</subfield><subfield code="9">978-1-599-04869-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)182730996</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035080087</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-522</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.575</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Multimedia forensics and security</subfield><subfield code="c">Chang-Tsun Li [ed.]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pa. [u.a.]</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIX, 396 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book provides an in-depth treatment of advancements in the emerging field of multimedia forensics and security by tackling challenging issues such as digital watermarking for copyright protection, digital fingerprinting for transaction tracking, and digital camera source identification"--Provided by publisher.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Multimedia systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Multimedia</subfield><subfield code="0">(DE-588)4192358-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Multimedia</subfield><subfield code="0">(DE-588)4192358-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Chang-Tsun</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">1-599-04870-1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-599-04870-3</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bayreuth</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016748340&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016748340</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV035080087 |
illustrated | Illustrated |
index_date | 2024-07-02T22:06:47Z |
indexdate | 2024-07-09T21:21:44Z |
institution | BVB |
isbn | 1599048698 9781599048697 |
language | English |
lccn | 2008008467 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016748340 |
oclc_num | 182730996 |
open_access_boolean | |
owner | DE-703 DE-522 |
owner_facet | DE-703 DE-522 |
physical | XIX, 396 S. Ill., graph. Darst. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Information Science Reference |
record_format | marc |
series2 | Premier reference source |
spelling | Multimedia forensics and security Chang-Tsun Li [ed.] Hershey, Pa. [u.a.] Information Science Reference 2009 XIX, 396 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Premier reference source "This book provides an in-depth treatment of advancements in the emerging field of multimedia forensics and security by tackling challenging issues such as digital watermarking for copyright protection, digital fingerprinting for transaction tracking, and digital camera source identification"--Provided by publisher. Multimedia systems Security measures Data encryption (Computer science) Data protection Computerforensik (DE-588)4774034-6 gnd rswk-swf Multimedia (DE-588)4192358-3 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content Multimedia (DE-588)4192358-3 s Computerforensik (DE-588)4774034-6 s Kryptologie (DE-588)4033329-2 s DE-604 Li, Chang-Tsun Sonstige oth Erscheint auch als Online-Ausgabe 1-599-04870-1 Erscheint auch als Online-Ausgabe 978-1-599-04870-3 Digitalisierung UB Bayreuth application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016748340&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Multimedia forensics and security Multimedia systems Security measures Data encryption (Computer science) Data protection Computerforensik (DE-588)4774034-6 gnd Multimedia (DE-588)4192358-3 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4774034-6 (DE-588)4192358-3 (DE-588)4033329-2 (DE-588)4143413-4 |
title | Multimedia forensics and security |
title_auth | Multimedia forensics and security |
title_exact_search | Multimedia forensics and security |
title_exact_search_txtP | Multimedia forensics and security |
title_full | Multimedia forensics and security Chang-Tsun Li [ed.] |
title_fullStr | Multimedia forensics and security Chang-Tsun Li [ed.] |
title_full_unstemmed | Multimedia forensics and security Chang-Tsun Li [ed.] |
title_short | Multimedia forensics and security |
title_sort | multimedia forensics and security |
topic | Multimedia systems Security measures Data encryption (Computer science) Data protection Computerforensik (DE-588)4774034-6 gnd Multimedia (DE-588)4192358-3 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Multimedia systems Security measures Data encryption (Computer science) Data protection Computerforensik Multimedia Kryptologie Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016748340&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT lichangtsun multimediaforensicsandsecurity |