IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Digital Watermarking Schemes for Multimedia Authentication

Digital Watermarking Schemes for Multimedia Authentication
View Sample PDF
Author(s): C. T. Li (University of Warwick, UK)
Copyright: 2008
Pages: 16
Source title: Multimedia Technologies: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Mahbubur Rahman Syed (Minnesota State University Mankato, USA)
DOI: 10.4018/978-1-59904-953-3.ch054

Purchase

View Digital Watermarking Schemes for Multimedia Authentication on the publisher's website for pricing and purchasing information.

Abstract

As the interconnected networks for instant transaction prevail and the power of digital multimedia processing tools for perfect duplication and manipulation increases, forgery and impersonation become major concerns of the information era. This chapter is intended to disseminate the concept of digital watermarking for multimedia authentication. Issues and challenges, such as security, resolution of tamper localization, and embedding distortion, of this technical area are explained first. Three main categories of watermarking approaches, namely fragile, semi-fragile, and reversible schemes, to the issues and challenges are then presented. Merits and limitations of specific schemes of each category are also reviewed and compared.

Related Content

Nithin Kalorth, Vidya Deshpande. © 2024. 7 pages.
Nitesh Behare, Vinayak Chandrakant Shitole, Shubhada Nitesh Behare, Shrikant Ganpatrao Waghulkar, Tabrej Mulla, Suraj Ashok Sonawane. © 2024. 24 pages.
T.S. Sujith. © 2024. 13 pages.
C. Suganya, M. Vijayakumar. © 2024. 11 pages.
B. Harry, Vijayakumar Muthusamy. © 2024. 19 pages.
Munise Hayrun Sağlam, Ibrahim Kirçova. © 2024. 19 pages.
Elif Karakoç Keskin. © 2024. 19 pages.
Body Bottom