Multimedia and security

he applications accessing multimedia systems and content over the Web have grown immensely in the past five years. Furthermore, many end users can easily use tools to synthesize and edit multimedia information. Thus, security has become one of the most significant problems for distributing new information technology. It is necessary to prevent illegal copying, misappropriation, and misrepresentation of digital audio, images, and video because they can be so easily copied and multiplied without information loss. It’s also important to determine where and how much a multimedia file differs from its original. Thus, a need exists for developing technology that will help protect the integrity of digital content and secure the intellectual-property rights of owners. Watermarking is becoming the key method for protecting digital elements such as image, video, and sound. Digital watermarking embeds a signal into the original element, and the signal uniquely identifies the owner. This requires security solutions for such fields as distributed production processes and e-commerce because the producers seek to provide access control mechanisms to prevent their material’s misuse and theft.

[1]  Jiri Fridrich,et al.  Robust bit extraction from images , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[2]  Gabriela Csurka,et al.  Template based recovery of Fourier-based watermarks using log-polar and log-log maps , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[3]  James L. Massey,et al.  Linear Complexity of Periodic Sequences: A General Theory , 1996, CRYPTO.

[4]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[5]  Deepa Kundur,et al.  Towards a telltale watermarking technique for tamper-proofing , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[6]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999 .

[7]  Michael J. Wiener,et al.  DES is not a Group , 1992, CRYPTO.

[8]  Min Wu,et al.  Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[9]  G. Tsudik,et al.  Authentication of mobile users , 1994, IEEE Network.

[10]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[11]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[12]  Mauro Barni,et al.  Mask building for perceptually hiding frequency embedded watermarks , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[13]  Ahmed H. Tewfik,et al.  Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).

[14]  S. Mallat A wavelet tour of signal processing , 1998 .

[15]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[16]  Mauro Barni,et al.  Copyright protection of digital images by means of frequency domain watermarking , 1998, Optics & Photonics.

[17]  Minerva M. Yeung,et al.  Effective and ineffective digital watermarks , 1997, Proceedings of International Conference on Image Processing.

[18]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[19]  Jessica J. Fridrich,et al.  Comparing robustness of watermarking techniques , 1999, Electronic Imaging.

[20]  Andrew B. Watson,et al.  DCT quantization matrices visually optimized for individual images , 1993, Electronic Imaging.

[21]  Mauro Barni,et al.  Optimum Decoding of Non-additive Full Frame DFT Watermarks , 1999, Information Hiding.

[22]  Colin Boyd,et al.  Cryptography and Coding , 1995, Lecture Notes in Computer Science.

[23]  Minerva M. Yeung,et al.  Invisible watermarking for image verification , 1998, J. Electronic Imaging.

[24]  Mauro Barni,et al.  A DCT-domain system for robust image watermarking , 1998, Signal Process..

[25]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[26]  Jiri Fridrich,et al.  Images with self-correcting capabilities , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[27]  John D. Villasenor,et al.  Visibility of wavelet quantization noise , 1997, IEEE Transactions on Image Processing.

[28]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[29]  Gonzalo R. Arce,et al.  Joint wavelet compression and authentication watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[30]  Andrew B. Watson,et al.  Image quality and entropy masking , 1997, Electronic Imaging.

[31]  N. Asokan,et al.  Anonymity in a Mobile Computing Environment , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.

[32]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[33]  M. Schroeder Number Theory in Science and Communication , 1984 .

[34]  Jack K. Wolf,et al.  On the Synthesis of Two-Dimensional Arrays with Desirable Correlation Properties , 1967, Inf. Control..

[35]  Charles Cresson Wood,et al.  Security for computer networks : D.W. Davies and W.L. Price New York: John Wiley and Sons, 1984. 386 + xix pages, $19.50 , 1985, Computers & security.

[36]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[37]  A. Tirkel,et al.  Electronic water mark , 1993 .

[38]  N. Asokan,et al.  Untraceability in mobile networks , 1995, MobiCom '95.

[39]  Ping Wah Wong,et al.  A Watermark for Image Integrity and Ownership Verification , 1998, PICS.

[40]  Ross J. Anderson,et al.  Evaluation of copyright marking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[41]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[42]  Andrew Z. Tirkel,et al.  Image and watermark registration , 1998, Signal Process..

[43]  Edward J. Delp,et al.  Fragile watermarking using the VW2D watermark , 1999, Electronic Imaging.