ebook img

Multimedia security handbook PDF

411 Pages·2005·8.895 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Multimedia security handbook

Electrical Engineering/Computer Science shih MultiMedia Security : Watermarking, Steganography, Watermarking, and Forensics Steganography, and Forensics Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrat- ing the need for improved content security as the Internet and digital multimedia appli- cations rapidly evolve, this book presents a wealth of everyday protection application examples in fields including multimedia mining and classification, digital watermark- ing, steganography, and digital forensics. Giving readers an in-depth overview of different aspects of information security mechanisms and methods, this resource also serves as an instructional tool on how to use the fundamental theoretical framework required for the development of extensive advanced techniques. The presentation of several robust algorithms illustrates this framework, helping readers to quickly master and apply fundamental principles. Presented case studies cover: • The execution (and feasibility) of techniques used to discover hidden knowledge by applying multimedia duplicate mining methods to large aW multimedia content na d • Different types of image steganographic schemes based on vector t Fe quantization or rm • Techniques used to detect changes in human motion behavior and to ea n classify different types of small-group motion behavior sr k icin s Useful for students, researchers, and professionals, this book consists of a variety of g Edited By technical tutorials that offer an abundance of graphs and examples to powerfully con- , S vey the principles of multimedia security and steganography. Imparting the extensive t e experience of the contributors, this approach simplifies problems, helping readers g a more easily understand even the most complicated theories. It also enables them to n uncover novel concepts involved in the implementation of algorithms, which can lead o g to the discovery of new problems and new means of solving them. r a p h y K13398 , 6000 Broken Sound Parkway, NW Suite 300, Boca Raton, FL 33487 711 Third Avenue New York, NY 10017 2 Park Square, Milton Park Abingdon, Oxon OX14 4RN, UK www.crcpress.com fiJHRUijJM SI:C:lJI=tiTY '"'A TI:I:ttv1AI:ti<INC;. STI:C;ANC)C;I:tAili-IY. ANil i=C)I:ti:NSIC:S ~CRC Press ~ Taylor&FrancisGroup Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2013 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Version Date: 20120531 International Standard Book Number-13: 978-1-4398-7332-8 (eBook - PDF) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, includ- ing photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com To my loving wife and children, to my parents who encouraged me through the years, and to those who helped in the process of writing this book TThhiiss ppaaggee iinntteennttiioonnaallllyy lleefftt bbllaannkk Contents Preface.......................................................................................................................ix Acknowledgments ..................................................................................................xiii Editor .......................................................................................................................xv Contributors ...........................................................................................................xvii Part I Multimedia Mining and Classification Chapter 1 Multimedia Duplicate Mining toward Knowledge Discovery .............3 Xiaomeng Wu, Sebastien Poullot, and Shin’ichi Satoh Chapter 2 Discriminative Learning-Assisted Video Semantic Concept Classification ......................................................................................31 Qiusha Zhu, Mei-Ling Shyu, and Shu-Ching Chen Chapter 3 Improved Feature Vocabulary-Based Method for Image Categorization ....................................................................................51 Frank Y. Shih and Alexander Sheppard Part II Watermarking Chapter 4 Automatic Detection and Removal of Visible Image Watermarks ....67 Hong-Ren Su, Ya-Yun Cheng, and Shang-Hong Lai Chapter 5 Digital Watermarking Based on Chaotic Map and Reference Register ...........................................................................................85 Yi-Ta Wu and Frank Y. Shih Chapter 6 Pseudo-Random Pixel Rearrangement Algorithm Based on Gaussian Integers for Image Watermarking.......................................99 Aleksey Koval, Frank Y. Shih, and Boris S. Verkhovsky Chapter 7 Reversible Data-Hiding Techniques for Digital Images ..................115 Zhi-Hui Wang, Ming-Ting Sun, and Chin-Chen Chang v vi Contents Chapter 8 Watermarking Based on Local Binary Pattern Operators ...............141 Wenyin Zhang and Frank Y. Shih Chapter 9 Authentication of JPEG Images Based on Genetic Algorithms.......165 Venkata Gopal Edupuganti and Frank Y. Shih Chapter 10 An Efficient Block-Based Fragile Watermarking System for Tamper Localization and Recovery ............................................181 Venkata Gopal Edupuganti, Frank Y. Shih, and I-Cheng Chang Part III Steganography Chapter 11 Survey of Image Steganography and Steganalysis ...........................201 Mayra Bachrach and Frank Y. Shih Chapter 12 Digital Steganographic Schemes Based on Image Vector Quantization ....................................................................................215 Shinfeng D. Lin and Shih-Chieh Shie Chapter 13 Differential Evolution-Based Algorithm for Breaking the Visual Steganalytic System ........................................................245 Frank Y. Shih and Venkata Gopal Edupuganti Chapter 14 Genetic Algorithm-Based Methodology for Breaking the Steganalytic Systems ........................................................................257 Yi-Ta Wu and Frank Y. Shih Part IV Forensics Chapter 15 Image Inpainting Using an Enhanced Exemplar-Based Algorithm .........................................................................................275 I-Cheng Chang and Chia-We Hsu Chapter 16 A Comparison Study on Copy–Cover Image Forgery Detection ....297 Frank Y. Shih and Yuan Yuan Contents vii Chapter 17 Chaos-Based Hash Function with Both Modification Detection and Localization Capabilities ..........................................313 Di Xiao, Frank Y. Shih, and Xiaofeng Liao Chapter 18 Video Forensics ................................................................................327 Hsiao-Rong Tyan and Hong-Yuan Mark Liao Chapter 19 Using the Self-Synchronizing Method to Improve Security of the Multi-Chaotic Systems-Based Image Encryption ..................343 Di Xiao and Frank Y. Shih Chapter 20 Behavior Modeling of Human Objects in Multimedia Content .......357 Yafeng Yin and Hong Man Index .....................................................................................................................385 TThhiiss ppaaggee iinntteennttiioonnaallllyy lleefftt bbllaannkk Preface Digital watermarking, steganography, and forensics are important topics because digital multimedia are widely used and the Internet is rapidly growing. This book intends to provide a comprehensive overview of the different aspects of mechanisms and techniques for information security. It has been written for students, researchers, and professionals who take related courses, want to improve their knowledge, and want to gain experience pertaining to the role of digital watermarking, steganogra- phy, and forensics. Digital watermarking technology can be used to guarantee authenticity and can be applied as proof that the content has not been altered since insertion. Steganographic messages are often first encrypted by some traditional means, and then a covert text is modified in some way to contain the encrypted message. Digital forensics utilizes computational techniques to process multimedia content and then applies the results to help crime investigations. The need for information security exists everywhere every day. This book aims to provide students, researchers, and professionals with techni- cal information regarding digital watermarking, steganography, and forensics, as well as instruct them on the fundamental theoretical framework in developing the extensive advanced techniques. By comprehensively considering the essential prin- ciples of digital watermarking, steganography, and forensics systems, one can not only obtain novel ideas in implementing the advanced algorithms, but can also dis- cover the new problems. The principles of digital watermarking, steganography, and forensics in this book are illustrated with plentiful graphs and examples in order to simplify the problems, so readers can easily understand even complicated theories. Several robust algorithms that are presented in this book to illustrate the framework provide assistance and tools in understanding and implementing the fundamental principles. Overview Of the BOOk The book is divided into four parts: Multimedia Mining and Classification (Chapters 1 through 3), Watermarking (Chapters 4 through 10), Steganography (Chapters 11 through 14), and Forensics (Chapters 15 through 20). In Chapter 1, the feasibility, techniques, and demonstrations of discovering hidden knowledge by applying multi- media duplicate mining methods to the massive multimedia content are introduced. Three promising knowledge-discovery applications are demonstrated to show the benefits of duplicate mining. In Chapter 2, a new framework is proposed for video concept classification with the help of discriminative learning and multiple correspondence analysis. In Chapter 3, an improved bag of feature and feature vocabulary-based technique of replacing the Harris-affine detection method by a ix

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.