ÊAdvertise ÊContact ÊSecurityWatch |
Ê Articles | Editorials | Reviews | News | InfoSec Directory | Releases | Submit PR |
GFI MailArchiver for Exchange - Easily archive Exchange Server mail & comply with Sarbanes Oxley - Free evaluation available. Network Security Software - Sponsored by GFI Network Security. |
Overview of image security techniques with applications in multimedia systems
Added: Friday, 20 May 2005 Publisher: Raymond B. Wolfgang and Edward J. Delp Category: Network Security The growth of networked multimedia systems has created a need for the copyright protection of digital images and video. Copyright protection involves the authentication of image content and/or ownership. This can be used to identify illegal copies of a (possibly forged) image. One approach is to mark an image by adding an invisible structure known as a digital watermark to the image. Techniques of incorporating such a watermark into digital images include spatial-domain techniques, transform-domain algorithms and sub-band filtering approaches. The recent growth of networked multimedia systems has increased the need for the protection of digital media. This is particularly important for the protection and enforcement of intellectual property rights. Digital media includes text, digital audio, images, video and software. Many approaches are available for protecting digital data; these include encryption, authentication and time stamping. In this paper we present algorithms for image authentication and forgery prevention known as watermarks. Download | InfoSec Directory |
Monday, May 23, 2005 Network Security
Wireless Security
InfoSec Diretory
Press Releases |
ÊCopyright © 2000 - 2005 eBCVG IT Security | Affiliates :: RSS feeds :: PrivacyÊ |
Ê