Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with respect to multimedia content. The owners of this content face enormous challenges in safeguarding their intellectual property, while still exploiting the Internet as an important resource for commerce. Data Hiding Fundamentals and Applications focuses on the theory and state-of-the-art applications of content security and data hiding in digital multimedia. One of the pillars of content security solutions is the imperceptible insertion of information into multimedia data for security purposes; the idea is that this inserted information will allow detection of unauthorized usage. * Provides a theoretical framework for data hiding, in a signal processing context; * Realistic applications in secure, multimedia delivery; * Compression robust data hiding; * Data hiding for proof of ownership--WATERMARKING; * Data hiding algorithms for image and video watermarking.

Author(s): Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu
Publisher: Academic Press
Year: 2004

Language: English
Pages: 269

Preliminaries......Page 1
Contents......Page 8
1. Introduction......Page 18
2. Frameworks for Data Hiding......Page 28
3. Communication with Side Information and Data Hiding......Page 42
4. Type I (Linear) Data Hiding......Page 66
5. Type II and Type III (Nonlinear) Data Hiding Methods......Page 96
6. Advanced Implementations......Page 124
7. Major Design Issues......Page 170
8. Data Hiding Applications......Page 196
Appendices......Page 238
Bibliography......Page 248
Index......Page 256