Fundamentals of Media Security by WeiQi Yan, Jonathan Weir & Ventus Publishing ApS

fundamentals-media-securityWith the development of computing technologies, digital media security becomes an ever increasing issue of daily life. As computer software and hardware evolves and as more of it becomes accessible as an Internet application or service, information security has gone from initially protecting digital images, into the area of multimedia. This area of multimedia includes computer graphics, images, digital video and digital audio. As the Internet expands, so does the significance of multimedia security. This chapter will cover some of the basic knowledge required and what should be considered when discussing media security. Analysis of the theoretical background of these issues is given, which is used to guide the practical applications. Computer security with regard to system security and network security has been broadly studied. With the development of multimedia processing and applications, multiple types of media security have been broadly taken into consideration. The type of media includes audio, video, image, text, web pages and graphics. From a hardware perspective, in order to protect the copyright of Intelligent Property (IP), special fonts were written into the ROM on microchips so that fraudulent chips could be identified. If these marks are removed, the fragile microchip will no long function. This technique has been employed even today, the microchip protections are still regarded as one of the best ways to protect information pertaining to that chip. Another typical software protection is a “serial number”, which attempts to block illicit copying, along with online Internet registration of that software. Visually, logos have been adopted as a type of visible watermark, used frequently within the television industry. These marks are used to denote content ownership. Nowadays, secure protection approaches have been embedded into the commercial products such as computer games, digital music, digital video, engineers drawings and many other forms of digital media and documents. Due to the rapid expansion of the amount of digital content available, illegal usage of these products can have many detrimental effects. It cannot be denied that media security will play a vital role in the impact multimedia products will have over a long period of time.

Although the research in the area of media security has made great progress in the past ten years, there are still many problems with existing products and additionally, during that time, many more problems, previously not considered have presented themselves. The robustness and capabilities of the existing security models have not been sufficiently investigated or updated to handle these new problems. In this book, the research in the area of media security will be presented from a mathematical point of view, starting from the basic principles of cryptography, and how they can be used for a much wider application in terms of media security. In this book the readers will read Research Areas of Media Security, Criteria for media evaluation, Subjective Criteria, Objective criteria, Distance measure on various color spaces, Comparison among variant measurement approaches, Mathematical models for information hiding, Mathematical models based on color space, Mathematical models based on PSNR, Channel model of information hiding, Theoretical security model for information hiding, Stego algorithms, Detecting information hiding, Bit operation based information hiding, Mutual multimedia information hiding, Images hidden in Sound, Digital watermarking, Watermarking history, Visible and invisible watermarking, Robust and Fragile watermarking, Spatial and frequency domain watermarking, Watermarking approaches, Video watermarking, Video logo erasing, Logo removal using video in painting, Matching based logo removal, Video inpainting based logo removal, Digital scrambling, Digital image scrambling, Chessboard coding based scrambling, Caesar coding based scrambling, DES based scrambling, Digital image scrambling based on magic squares, Digital image scrambling based on gray code transformation, Digital image scrambling based on Conway’s Game, Audio scrambling, Audio scrambling in the temporal domain, Scrambling in the frequency domain, Joint scrambling, Progressive MP3 Audio Scrambling, Digital Surveillance, Adaptive video monitoring, Video surveillance using multiple cameras, Multimedia simplification for video monitoring, Digital multimedia authentication and forensics, Video authentication, Printed document authentication, Document authentication with RSE, Passive image authentication: Passive-blind image forensics (PBIF), Multimedia Forensics, Media Forensics using biometrics and much more.


To download this book, please click the link below:
Click here to download Fundamentals of Media Security

Leave A Reply

Your email address will not be published.