Transactions on Data Hiding and Multimedia Security I

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field in multimedia security. Two related disciplines, steganalysis and data forensics, are also increasingly attracting researchers and forming another new research field in multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results.

This inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper deals with evaluation criteria for the performance of audio watermarking algorithms. The second provides a survey of problems related to watermark security. The third discusses practical implementations of zero-knowledge watermark detectors and proposes efficient solutions for correlation-based detectors. The fourth introduces the concept of Personal Entertainment Domains (PED) in Digital Rights Management (DRM) schemes. The fifth reports on the use of fusion techniques to improve the detection accuracy of steganalysis.

Author(s): Jana Dittmann, David MegĂ­as, Andreas Lang (auth.), Yun Q. Shi (eds.)
Series: Lecture Notes in Computer Science 4300 : Transactions on Data Hiding and Multimedia Security
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006

Language: English
Pages: 139
Tags: Data Encryption; Operating Systems; Management of Computing and Information Systems; Computers and Society; Multimedia Information Systems; Algorithm Analysis and Problem Complexity

Front Matter....Pages -
Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity....Pages 1-40
Watermarking Security: A Survey....Pages 41-72
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data....Pages 73-103
Identity-Based DRM: Personal Entertainment Domain....Pages 104-122
Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography....Pages 123-137
Back Matter....Pages -