06.03.2014 Views

Multimedia Forensics and Security - IRCCyN

Multimedia Forensics and Security - IRCCyN

Multimedia Forensics and Security - IRCCyN

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Information Science<br />

REFERENCE<br />

The premier reference source for information<br />

science <strong>and</strong> technology research<br />

Forthcoming April 2008<br />

<strong>Multimedia</strong> <strong>Forensics</strong><br />

<strong>and</strong> <strong>Security</strong><br />

Edited by: Chang-Tsun Li, University of Warwick, UK<br />

13-digit ISBN: 978-1-59904-869-7<br />

300+ pages; 2008 Copyright<br />

Price: US $180.00 (hardcover*)<br />

Pre-Pub Price § : US $165.00<br />

Online Access only**: US $132.00<br />

Illustrations: figures, tables (8 1/2” x 11”)<br />

Translation Rights: World<br />

*Paperback is not available. § Pre-pub price is good through one month after publication.<br />

**Online access is for libraries <strong>and</strong> is good for the life of the edition.<br />

As information technology is rapidly progressing, an enormous amount of media can be easily exchanged<br />

through Internet <strong>and</strong> other communication networks. Increasing amounts of digital image,<br />

video, <strong>and</strong> music have created numerous information security issues <strong>and</strong> is now taken as one of the<br />

top research <strong>and</strong> development agendas for researchers, organizations, <strong>and</strong> governments worldwide.<br />

<strong>Multimedia</strong> <strong>Forensics</strong> <strong>and</strong> <strong>Security</strong> provides an in-depth treatment of advancements in the<br />

emerging field of multimedia forensics <strong>and</strong> security by tackling challenging issues such as digital watermarking<br />

for copyright protection, digital fingerprinting for transaction tracking, <strong>and</strong> digital camera<br />

source identification.<br />

Subject:<br />

Internet <strong>and</strong> Web Technologies <strong>and</strong> Services; Information <strong>Security</strong>,<br />

Privacy, <strong>and</strong> Ethics; <strong>Multimedia</strong> Technology; Mobile Computing <strong>and</strong><br />

Communications Technology<br />

Market:<br />

This essential publication is for all academic research libraries, as well<br />

as those involved in information security, digital copyright protection,<br />

e-security, <strong>and</strong> digital fingerprinting. Students, researchers, academics,<br />

<strong>and</strong> personel of law enforcement <strong>and</strong> IT/multimedia practitioners who<br />

are interested or involved in the study, research, use, design, <strong>and</strong> development<br />

of techniques related to multimedia, forensics, <strong>and</strong> security<br />

will find this publication useful.<br />

Excellent addition to your library! Recommend to your acquistions librarian.<br />

www.info-sci-ref.com


<strong>Multimedia</strong> <strong>Forensics</strong> <strong>and</strong> <strong>Security</strong><br />

Edited by: Chang-Tsun Li, University of Warwick, UK<br />

Table of Contents<br />

Chapter I: Authentication Watermarkings for<br />

Binary Images<br />

Hae Yong Kim, Universidade de São Paulo, Brazil<br />

Sergio V. D. Pamboukian, Universidade Presbiteriana<br />

Mackenzie, Brazil<br />

Paulo S. L. M. Barreto, Universidade de São Paulo, Brazil<br />

Chapter II: Secure <strong>Multimedia</strong> Content<br />

Distribution Based on Watermarking Technology<br />

Shiguo Lian, France Telecom Research <strong>and</strong> Development,<br />

R.O.C.<br />

Chapter III: Digital Watermarking in the<br />

Transform Domain with Emphasis on SVD<br />

Maria Calagna, Universita’ di Roma La Sapienza, Italy<br />

Chapter IV: Digital Video Watermarking <strong>and</strong> the<br />

Collusion Attack<br />

Roberto Caldelli, University of Florence, Italy<br />

Aless<strong>and</strong>ro Piva, University of Florence, Italy<br />

Chapter V: A Survey of Current Watermarking<br />

Synchronization Techniques<br />

Natasa Terzija, University of Manchester,UK<br />

Chapter VI: On the Necessity of Finding Content<br />

before Watermark Retrieval – Active Search<br />

Strategies for Localizing Watermarked Media on<br />

the Internet<br />

Martin Steinebach, Fraunhofer Institute for Secure<br />

Information Technology (SIT), Germany<br />

Patrick Wolf, Fraunhofer Institute for Secure Information<br />

Technology (SIT), Germany<br />

Chapter VII: Statistical Watermark Detection in<br />

the Transform Domain for Digital Images<br />

Fouad Khelif, The Institute of Electronics,<br />

Communications <strong>and</strong> Information Technology (ECIT), UK<br />

Fatih Kurugollu, The Institute of Electronics,<br />

Communications <strong>and</strong> Information Technology (ECIT), UK<br />

Ahmed Bouridane, The Institute of Electronics,<br />

Communications <strong>and</strong> Information Technology (ECIT), UK<br />

Chapter VIII: On Noise, Steganography <strong>and</strong><br />

Active Warden<br />

Christopher B. Smith, University of Texas San Antonio,<br />

USA<br />

Sos S. Agaian, University of Texas San Antonio, USA<br />

Chapter IX: Visibility Control <strong>and</strong> Quality<br />

Assessment of Watermarking <strong>and</strong> Data Hiding<br />

Algorithms<br />

Patrick Le Callet, University of Nantes, France<br />

Florent Autrusseau, University of Nantes, France<br />

Patrizio Campisi, Università degli Studi Roma TRE, Italy<br />

Chapter X: Computational Aspects of Digital<br />

Steganography<br />

Maciej Liśkiewicz, Univerity of Lübeck, Germany<br />

Ulrich Wölfel, Federal Office for Information <strong>Security</strong><br />

(BSI), Germany<br />

Chapter XI: On Steganalysis <strong>and</strong> Clean Image<br />

Estimation<br />

Christopher B. Smith, University of Texas San Antonio,<br />

USA<br />

Sos S. Agaian, University of Texas San Antonio, USA<br />

Chapter XII: Steganalysis: Trends <strong>and</strong> Challenges<br />

Hafiz Malik, University of Michigan, USA<br />

R. Ch<strong>and</strong>ramouli, Stevens Institute of Technology, USA<br />

K.P. Subbalakshmi, Stevens Institute of Technology, USA<br />

Chapter XIII: Benchmarking Steganalysis<br />

Andrew Ker, Oxford University Computing Laboratory,<br />

UK<br />

Chapter XIV: Digital Camera Source<br />

Identification<br />

Matthew Sorell, University of Adelaide, Australia<br />

Chapter XV: Traitor Tracing for <strong>Multimedia</strong><br />

<strong>Forensics</strong><br />

Hongxia Jin, IBM Almaden Research Center, USA<br />

Chapter XVI: Efficient Transparent JPEG2000<br />

Encryption<br />

Dominik Engel, University of Salzburg, Germany<br />

Thomas Stütz, University of Salzburg, Germany<br />

Andreas Uhl, University of Salzburg, Germany<br />

About the Editors:<br />

Chang-Tsun Li received the BS degree in electrical engineering from Chung-Cheng Institute of Technology (CCIT),<br />

National Defense University (Taiwan, 1987), the MS degree in computer science from U. S. Naval Postgraduate School<br />

(USA, 1992), <strong>and</strong> the PhD degree in computer science from the University of Warwick (UK, 1998). He was an associate<br />

professor of the Department of Electrical Engineering at CCIT (1999-2002) <strong>and</strong> a visiting professor of the Department of<br />

Computer Science at U.S. Naval Postgraduate School (2001). He is currently an associate professor of the Department of<br />

Computer Science at the University of Warwick (UK), editor-in-chief of the International Journal of Digital Crime<br />

<strong>and</strong> <strong>Forensics</strong> (IJDCF)<strong>and</strong> associate editor of the International Journal of Applied Systemic Studies (IJASS).<br />

He has been involved in the organisation of a number of international conferences <strong>and</strong> workshops <strong>and</strong> also served as<br />

member of the international program committees for several international conferences. His research interests include<br />

multimedia security, bioinformatics, image processing, pattern recognition, computer vision, <strong>and</strong> content-based image<br />

retrieval.<br />

Excellent addition to your library! Recommend to your acquisitions librarian.<br />

www.info-sci-ref.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!