Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multimedia Fingerprinting Forensics for Traitor Tracing (EURASIP Book Series on Signal Processing and Communications)

Buy
The popularity of multimedia content has led to the widespread distribution and consumption of digital multimedia data. As a result of the relative ease with which individuals may now alter and repackage digital content, ensuring that media content is employed by authorized users for its intended purpose is becoming an issue of eminent importance to both governmental security and commercial applications. Digital fingerprinting is a class of multimedia forensic technologies to track and identify entities involved in the illegal manipulation and unauthorized usage of multimedia content, thereby protecting the sensitive nature of multimedia data as well as its commercial value after the content has been delivered to a recipient.

"Multimedia Fingerprinting Forensics for Traitor Tracing" covers the essential aspects of research in this emerging technology, and explains the latest development in this field. It describes the framework of multimedia fingerprinting, discusses the challenges that may be faced when enforcing usage polices, and investigates the design of fingerprints that cope with new families of multiuser attacks that may be mounted against media fingerprints. The discussion provided in the book highlights challenging problems as well as future trends in this research field, providing readers with a broader view of the evolution of the young field of multimedia forensics.

About the Author

K. J. Ray Liu is an associate professor in the Electrical Engineering Department and Institute for Systems Research at the University of Maryland in College Park. Dr. Liu's research interests span all aspects of signal processing with application to image/video, wireless communications, networking, and medical biomedical technology. He has published more than one hundred papers, many of which are in archival journals, books, and book chapters. He has won many awards, including the IEEE Signal Processing Society's Senior Award for Best Paper in VLSI in 1993 and the National Science Foundation Young Investigator Award in 1994. Wade Trappe received his B.A. degree in Mathematics from The University of Texas at Austin in 1994, and the Ph.D. in Applied Mathematics and Scientific Computing from the University of Maryland in 2002. He is currently an assistant professor at the Wireless Information Network Laboratory (WINLAB) and the Electrical and Computer Engineering Department at Rutgers University. His research interests include multimedia security, cryptography, wireless network security, and computer networking.

Dr. Trappe is a co-author of the textbook "Introduction to Cryptography with Coding Theory", Prentice Hall, 2001. He is a member of the IEEE Signal Processing, Communication, and Computer societies.

Z. Jane Wang is an Assistant Professor in the Electrical and Computer Engineering Department, University of British Columbia, Canada. She received the B.Sc. degree from Tsinghua University, China, in 1996 (with the highest honor), and the M.Sc. and Ph.D. degrees from the University of Connecticut in 2000 and 2002 (with the Outstanding Engineering Doctoral Student Award), respectively, all in electrical engineering. Since Aug. 2004, she has been an Assistant Professor in the Department of Electrical and Computer Engineering at University of British Columbia. Dr. Wang's research interests are in the broad areas of statistical signal processing, information sec

(HTML tags aren't allowed.)

Eye Tracking Methodology: Theory and Practice
Eye Tracking Methodology: Theory and Practice
Despite the availability of cheap, fast, accurate and usable eye trackers, there is still little information available on how to develop, implement and use these systems. This second edition of Andrew Duchowski’s successful guide to these systems contains significant additional material on the topic and fills this gap in the market with this...
Fuzzy Sets and Fuzzy Logic: Theory and Applications
Fuzzy Sets and Fuzzy Logic: Theory and Applications
Reflecting the tremendous advances that have taken place in the study of fuzzy set theory and fuzzy logic from 1988 to the present, this book not only details the theoretical advances in these areas, but considers a broad variety of applications of fuzzy sets and fuzzy logic as well. Theoretical aspects of fuzzy set theory and fuzzy...
Landscapes of Mars: A Visual Tour
Landscapes of Mars: A Visual Tour

Practically next door to us in our Solar System, Mars is the most Earth-like of all the worlds held in perpetual motion by the Sun’s gravity. It is a planet that has fascinated and intrigued humans since prehistoric times. The Greeks named it Ares, after their god of war. The connection was easy to make because of the planet’s...


Apache Derby -- Off to the Races: Includes Details of IBM Cloudscape
Apache Derby -- Off to the Races: Includes Details of IBM Cloudscape

Master Apache Derby: the only open source, pure Java™, fully transactional, small-footprint RDBMS

Apache Derby is the world's only enterprise class open source, pure Java, fully transactional relational database. It's small enough to be embedded directly into your Java applications, providing a local data store...

Cholera: The Biography (Biographies of Diseases)
Cholera: The Biography (Biographies of Diseases)

Cholera is a frightening disease. Victims are wracked by stomach cramps and suffer intense diarrhoea. Death can come within hours.

Though now seeming a distant memory in Europe, which suffered several epidemics in the 19th century before John Snow identified the link with water, cholera is still a serious threat in many parts
...

Kali Linux Social Engineering
Kali Linux Social Engineering

Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux

Overview

  • Learn about various attacks and tips and tricks to avoid them
  • Get a grip on efficient ways to perform penetration testing.
  • Use advanced techniques to bypass...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy