Multimedia Forensics and Security - IRCCyN
Multimedia Forensics and Security - IRCCyN
Multimedia Forensics and Security - IRCCyN
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Information Science<br />
REFERENCE<br />
The premier reference source for information<br />
science <strong>and</strong> technology research<br />
Forthcoming April 2008<br />
<strong>Multimedia</strong> <strong>Forensics</strong><br />
<strong>and</strong> <strong>Security</strong><br />
Edited by: Chang-Tsun Li, University of Warwick, UK<br />
13-digit ISBN: 978-1-59904-869-7<br />
300+ pages; 2008 Copyright<br />
Price: US $180.00 (hardcover*)<br />
Pre-Pub Price § : US $165.00<br />
Online Access only**: US $132.00<br />
Illustrations: figures, tables (8 1/2” x 11”)<br />
Translation Rights: World<br />
*Paperback is not available. § Pre-pub price is good through one month after publication.<br />
**Online access is for libraries <strong>and</strong> is good for the life of the edition.<br />
As information technology is rapidly progressing, an enormous amount of media can be easily exchanged<br />
through Internet <strong>and</strong> other communication networks. Increasing amounts of digital image,<br />
video, <strong>and</strong> music have created numerous information security issues <strong>and</strong> is now taken as one of the<br />
top research <strong>and</strong> development agendas for researchers, organizations, <strong>and</strong> governments worldwide.<br />
<strong>Multimedia</strong> <strong>Forensics</strong> <strong>and</strong> <strong>Security</strong> provides an in-depth treatment of advancements in the<br />
emerging field of multimedia forensics <strong>and</strong> security by tackling challenging issues such as digital watermarking<br />
for copyright protection, digital fingerprinting for transaction tracking, <strong>and</strong> digital camera<br />
source identification.<br />
Subject:<br />
Internet <strong>and</strong> Web Technologies <strong>and</strong> Services; Information <strong>Security</strong>,<br />
Privacy, <strong>and</strong> Ethics; <strong>Multimedia</strong> Technology; Mobile Computing <strong>and</strong><br />
Communications Technology<br />
Market:<br />
This essential publication is for all academic research libraries, as well<br />
as those involved in information security, digital copyright protection,<br />
e-security, <strong>and</strong> digital fingerprinting. Students, researchers, academics,<br />
<strong>and</strong> personel of law enforcement <strong>and</strong> IT/multimedia practitioners who<br />
are interested or involved in the study, research, use, design, <strong>and</strong> development<br />
of techniques related to multimedia, forensics, <strong>and</strong> security<br />
will find this publication useful.<br />
Excellent addition to your library! Recommend to your acquistions librarian.<br />
www.info-sci-ref.com
<strong>Multimedia</strong> <strong>Forensics</strong> <strong>and</strong> <strong>Security</strong><br />
Edited by: Chang-Tsun Li, University of Warwick, UK<br />
Table of Contents<br />
Chapter I: Authentication Watermarkings for<br />
Binary Images<br />
Hae Yong Kim, Universidade de São Paulo, Brazil<br />
Sergio V. D. Pamboukian, Universidade Presbiteriana<br />
Mackenzie, Brazil<br />
Paulo S. L. M. Barreto, Universidade de São Paulo, Brazil<br />
Chapter II: Secure <strong>Multimedia</strong> Content<br />
Distribution Based on Watermarking Technology<br />
Shiguo Lian, France Telecom Research <strong>and</strong> Development,<br />
R.O.C.<br />
Chapter III: Digital Watermarking in the<br />
Transform Domain with Emphasis on SVD<br />
Maria Calagna, Universita’ di Roma La Sapienza, Italy<br />
Chapter IV: Digital Video Watermarking <strong>and</strong> the<br />
Collusion Attack<br />
Roberto Caldelli, University of Florence, Italy<br />
Aless<strong>and</strong>ro Piva, University of Florence, Italy<br />
Chapter V: A Survey of Current Watermarking<br />
Synchronization Techniques<br />
Natasa Terzija, University of Manchester,UK<br />
Chapter VI: On the Necessity of Finding Content<br />
before Watermark Retrieval – Active Search<br />
Strategies for Localizing Watermarked Media on<br />
the Internet<br />
Martin Steinebach, Fraunhofer Institute for Secure<br />
Information Technology (SIT), Germany<br />
Patrick Wolf, Fraunhofer Institute for Secure Information<br />
Technology (SIT), Germany<br />
Chapter VII: Statistical Watermark Detection in<br />
the Transform Domain for Digital Images<br />
Fouad Khelif, The Institute of Electronics,<br />
Communications <strong>and</strong> Information Technology (ECIT), UK<br />
Fatih Kurugollu, The Institute of Electronics,<br />
Communications <strong>and</strong> Information Technology (ECIT), UK<br />
Ahmed Bouridane, The Institute of Electronics,<br />
Communications <strong>and</strong> Information Technology (ECIT), UK<br />
Chapter VIII: On Noise, Steganography <strong>and</strong><br />
Active Warden<br />
Christopher B. Smith, University of Texas San Antonio,<br />
USA<br />
Sos S. Agaian, University of Texas San Antonio, USA<br />
Chapter IX: Visibility Control <strong>and</strong> Quality<br />
Assessment of Watermarking <strong>and</strong> Data Hiding<br />
Algorithms<br />
Patrick Le Callet, University of Nantes, France<br />
Florent Autrusseau, University of Nantes, France<br />
Patrizio Campisi, Università degli Studi Roma TRE, Italy<br />
Chapter X: Computational Aspects of Digital<br />
Steganography<br />
Maciej Liśkiewicz, Univerity of Lübeck, Germany<br />
Ulrich Wölfel, Federal Office for Information <strong>Security</strong><br />
(BSI), Germany<br />
Chapter XI: On Steganalysis <strong>and</strong> Clean Image<br />
Estimation<br />
Christopher B. Smith, University of Texas San Antonio,<br />
USA<br />
Sos S. Agaian, University of Texas San Antonio, USA<br />
Chapter XII: Steganalysis: Trends <strong>and</strong> Challenges<br />
Hafiz Malik, University of Michigan, USA<br />
R. Ch<strong>and</strong>ramouli, Stevens Institute of Technology, USA<br />
K.P. Subbalakshmi, Stevens Institute of Technology, USA<br />
Chapter XIII: Benchmarking Steganalysis<br />
Andrew Ker, Oxford University Computing Laboratory,<br />
UK<br />
Chapter XIV: Digital Camera Source<br />
Identification<br />
Matthew Sorell, University of Adelaide, Australia<br />
Chapter XV: Traitor Tracing for <strong>Multimedia</strong><br />
<strong>Forensics</strong><br />
Hongxia Jin, IBM Almaden Research Center, USA<br />
Chapter XVI: Efficient Transparent JPEG2000<br />
Encryption<br />
Dominik Engel, University of Salzburg, Germany<br />
Thomas Stütz, University of Salzburg, Germany<br />
Andreas Uhl, University of Salzburg, Germany<br />
About the Editors:<br />
Chang-Tsun Li received the BS degree in electrical engineering from Chung-Cheng Institute of Technology (CCIT),<br />
National Defense University (Taiwan, 1987), the MS degree in computer science from U. S. Naval Postgraduate School<br />
(USA, 1992), <strong>and</strong> the PhD degree in computer science from the University of Warwick (UK, 1998). He was an associate<br />
professor of the Department of Electrical Engineering at CCIT (1999-2002) <strong>and</strong> a visiting professor of the Department of<br />
Computer Science at U.S. Naval Postgraduate School (2001). He is currently an associate professor of the Department of<br />
Computer Science at the University of Warwick (UK), editor-in-chief of the International Journal of Digital Crime<br />
<strong>and</strong> <strong>Forensics</strong> (IJDCF)<strong>and</strong> associate editor of the International Journal of Applied Systemic Studies (IJASS).<br />
He has been involved in the organisation of a number of international conferences <strong>and</strong> workshops <strong>and</strong> also served as<br />
member of the international program committees for several international conferences. His research interests include<br />
multimedia security, bioinformatics, image processing, pattern recognition, computer vision, <strong>and</strong> content-based image<br />
retrieval.<br />
Excellent addition to your library! Recommend to your acquisitions librarian.<br />
www.info-sci-ref.com