Reference Hub1
Digital Watermarking Schemes for Multimedia Authentication

Digital Watermarking Schemes for Multimedia Authentication

Chang-Tsun Li
Copyright: © 2005 |Pages: 22
ISBN13: 9781591405184|ISBN10: 1591405181|EISBN13: 9781591405207
DOI: 10.4018/978-1-59140-518-4.ch002
Cite Chapter Cite Chapter

MLA

Li, Chang-Tsun. "Digital Watermarking Schemes for Multimedia Authentication." Digital Watermarking for Digital Media, edited by Juergen Seitz, IGI Global, 2005, pp. 30-51. https://doi.org/10.4018/978-1-59140-518-4.ch002

APA

Li, C. (2005). Digital Watermarking Schemes for Multimedia Authentication. In J. Seitz (Ed.), Digital Watermarking for Digital Media (pp. 30-51). IGI Global. https://doi.org/10.4018/978-1-59140-518-4.ch002

Chicago

Li, Chang-Tsun. "Digital Watermarking Schemes for Multimedia Authentication." In Digital Watermarking for Digital Media, edited by Juergen Seitz, 30-51. Hershey, PA: IGI Global, 2005. https://doi.org/10.4018/978-1-59140-518-4.ch002

Export Reference

Mendeley
Favorite

Abstract

As the interconnected networks for instant transaction prevail and the power of digital multimedia processing tools for perfect duplication and manipulation increases, forgery and impersonation become major concerns of the information era. This chapter is intended to disseminate the concept of digital watermarking for multimedia authentication. Issues and challenges, such as security, resolution of tamper localization, and embedding distortion, of this technical area are explained first. Three main categories of watermarking approaches, namely fragile, semi-fragile, and reversible schemes, to the issues and challenges are then presented. Merits and limitations of specific schemes of each category are also reviewed and compared.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.