Skip to:Content
|
Bottom
Cover image for Multimedia watermarking techniques and applications
Title:
Multimedia watermarking techniques and applications
Publication Information:
Boca Raton, FL : Auerbach Publications, 2006
ISBN:
9780849372131

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010121061 QA76.575 M8444 2006 Open Access Book Book
Searching...
Searching...
30000010196924 QA76.575 M8444 2006 Open Access Book Book
Searching...

On Order

Summary

Summary

Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies.

Multimedia Watermarking Techniques and Applications covers all current and future trends in the design of modern systems that use watermarking to protect multimedia content. Containing the works of contributing authors who are worldwide experts in the field, this volume is intended for researchers and practitioners, as well as for those who want a broad understanding of multimedia security. In the wake of the explosive growth of digital entertainment and Internet applications, this book is the definitive resource on the subject for scientists, researchers, programmers, engineers, business managers, entrepreneurs, and investors.


Author Notes

"Borko Furht is a professor and chairman of the Department of Computer Science and Engineering at Florida Atlantic University (FAU) in Boca Raton, Florida. Before joining FAU, he was a vice president of research and a senior director of development at Modcomp (Ft. Lauderdale), a computer company of Daimler Benz, Germany, and a professor at the University of Miami in Coral Gables, Florida. Professor Furht received Ph.D. degrees in electrical and computer engineering from the University of Belgrade. His current research is in multimedia systems, video coding and compression, video databases, wireless multimedia, and Internet computing. He is currently Principal Investigator and Co-PI of two multiyear, multimillion dollar projects - on Coastline Security Technologies, funded by the Department of Navy, and One Pass to Production, funded by Motorola. He is the author of numerous books and articles in the areas of multimedia, computer architecture, real-time computing, and operating systems. He is a founder and editor-in-chief of The Journal of Multimedia Tools and Applications (Kluwer Academic Publishers). He has received several technical and publishing awards, and has consulted for many high-tech companies, including IBM, Hewlett-Packard, Xerox, General Electric, JPL, NASA, Honeywell and RCA. He has also served as a consultant to various colleges and universities. He has given many invited talks, keynote lectures, seminars, and tutorials., Darko Kirovski received his Ph.D. degree in computer science from the University of California, Los Angeles, in 2001. Since April 2000, he has been a researcher at Microsoft Research. His research interests include certificates of authenticity, system security, multimedia processing, biometric identity authentication, and embedded system design and debugging. He received the 1999 Microsoft Graduate Research Fellowship, the 2000 ACM/IEEE Design Automation Conference Graduate Scholarship, the 2001 ACM Outstanding Ph.D. Dissertation Awa


Table of Contents

Ahmet M. Eskicioglu and Edward J. DelpMohamed F. Mansour and Ahmed H. TewfikEdin Muharemagic and Borko FurhtTon Kalker and Jaap HaitsmaSoo-Chang Pei and Yu-Feng Hsu and Ya-Wen LuBo HuHyungshin KimEbroul IzquierdoZheng LiuDimitrios Simitopoulos and Alexia Briassouli and Michael G. StrintzisXiangui Kang and Jiwu Huang and Yun Q. ShiAdnan M. AlattarPetros Daras and Dimitrios Zarpalas and Dimitrios Tzovaras and Dimitrios Simitopoulos and Michael G. StrintzisKen Levy and Tony Rodriguez
1 Protection of Multimedia Content in Distribution Networksp. 1
2 Vulnerabilities of Multimedia Protection Schemesp. 61
3 Survey of Watermarking Techniques and Applicationsp. 91
4 Robust Identification of Audio Using Watermarking and Fingerprintingp. 131
5 High-Capacity, Real-Time Audio Watermarking with Perfect Correlation Sequence and Repeated Insertionp. 153
6 Multidimensional Watermark for Still Image: Parallel Embedding and Detectionp. 181
7 Image Watermarking Method Resistant to Geometric Distortionsp. 201
8 Fragile Watermarking for Image Authenticationp. 229
9 New Trends and Challenges in Digital Watermarking Technology: Applications for Printed Materialsp. 257
10 Robust Watermark Detection from Quantized MPEG Video Datap. 307
11 Image Watermarking Robust to Both Geometric Distortion and JPEG Compressionp. 337
12 Reversible Watermarks Using a Difference Expansionp. 363
13 Combined Indexing and Watermarking of 3-D Models Using the Generalized 3-D Radon Transformsp. 399
14 Digital Watermarking Framework: Applications, Parameters, and Requirementsp. 425
Indexp. 441
Go to:Top of Page