Transactions on Data Hiding and Multimedia Security II
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval,
- PDF / 11,561,691 Bytes
- 124 Pages / 430.15 x 660.926 pts Page_size
- 16 Downloads / 212 Views
Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany
4499
Yun Q. Shi (Ed.)
Transactions on Data Hiding and Multimedia Security II
13
Volume Editor Yun Q. Shi New Jersey Institute of Technology Department of Electrical and Computer Engineering 323, M.L. King Blvd., Newark, NJ 07102, USA E-mail: [email protected]
Library of Congress Control Number: 2007928444 CR Subject Classification (1998): K.4.1, K.6.5, H.5.1, D.4.6, E.3, E.4, F.2.2, H.3, I.4 LNCS Sublibrary: SL 4 – Security and Cryptology ISSN ISSN ISBN-10 ISBN-13
0302-9743 (Lecture Notes in Computer Science) 1864-3043 (Transactions on Data Hiding and Multimedia Security) 3-540-73091-5 Springer Berlin Heidelberg New York 978-3-540-73091-0 Springer Berlin Heidelberg New York
This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springer.com © Springer-Verlag Berlin Heidelberg 2007 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: 12077731 06/3180 543210
Preface
In this volume we present the second issue of the LNCS Transactions on Data Hiding and Multimedia Security. In the first paper, Adelsbach et al. introduce fingercasting, a combination of broadcast encryption and fingerprinting for secure content distribution. They also provide for the first time a security proof for a lookup table-based encryption scheme. In the second paper, He and Kirovski propose an estimation attack on content-based video fingerprinting schemes. Although the authors tailor the attack towards a specific video fingerprint, the generic form of the attack is expected to be applicable to a wide range of video watermarking schemes. In the third
Data Loading...