Transactions on Data Hiding and Multimedia Security V
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval,
- PDF / 6,283,293 Bytes
- 139 Pages / 430 x 660 pts Page_size
- 116 Downloads / 186 Views
Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany
6010
Yun Q. Shi (Ed.)
Transactions on Data Hiding and Multimedia Security V
13
Volume Editor Yun Q. Shi New Jersey Institute of Technology University Heights, Newark, NJ, 07102-1982, USA E-mail: [email protected]
Library of Congress Control Number: Applied for CR Subject Classification (1998): K.6.5, E.3, C.2, D.4.6, I.4, I.5 LNCS Sublibrary: SL 1 – Theoretical Computer Science and General Issues ISSN ISSN ISBN-10 ISBN-13
0302-9743 (Lecture Notes in Computer Science) 1864-3043 (Transactions on Data Hiding and Multimedia Security) 3-642-14297-4 Springer Berlin Heidelberg New York 978-3-642-14297-0 Springer Berlin Heidelberg New York
This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. springer.com © Springer-Verlag Berlin Heidelberg 2010 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper 06/3180
Preface
This issue contains a special section on “Forensic Image Analysis for Crime Prevention,” edited by Yan, Bouridane and Kankanhalli, containing two papers. In addition, the issue also contains four regular papers. The first paper by Cha and Kuo reviews recent development of multi-carrier code division multi-access (MC-CDMA)-based fingerprinting systems, presents new results on capacity, throughput, and distortion of a colluded media file, and points out important open research problems. To prevent illegal matching, Ito and Kiya propose in the second paper a phase correlation-based image matching in scrambled domain. The last two papers by Weir and Yan deal with visual cryptography. In the former, a comprehensive survey on visual cryptography is presented, which summarizes the lat
Data Loading...