Digital Watermarking Schemes for Multimedia Authentication

Digital Watermarking Schemes for Multimedia Authentication

C. T. Li
ISBN13: 9781599049533|ISBN10: 1599049538|EISBN13: 9781599049540
DOI: 10.4018/978-1-59904-953-3.ch054
Cite Chapter Cite Chapter

MLA

Li, C. T. "Digital Watermarking Schemes for Multimedia Authentication." Multimedia Technologies: Concepts, Methodologies, Tools, and Applications, edited by Mahbubur Rahman Syed, IGI Global, 2008, pp. 793-808. https://doi.org/10.4018/978-1-59904-953-3.ch054

APA

Li, C. T. (2008). Digital Watermarking Schemes for Multimedia Authentication. In M. Syed (Ed.), Multimedia Technologies: Concepts, Methodologies, Tools, and Applications (pp. 793-808). IGI Global. https://doi.org/10.4018/978-1-59904-953-3.ch054

Chicago

Li, C. T. "Digital Watermarking Schemes for Multimedia Authentication." In Multimedia Technologies: Concepts, Methodologies, Tools, and Applications, edited by Mahbubur Rahman Syed, 793-808. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-953-3.ch054

Export Reference

Mendeley
Favorite

Abstract

As the interconnected networks for instant transaction prevail and the power of digital multimedia processing tools for perfect duplication and manipulation increases, forgery and impersonation become major concerns of the information era. This chapter is intended to disseminate the concept of digital watermarking for multimedia authentication. Issues and challenges, such as security, resolution of tamper localization, and embedding distortion, of this technical area are explained first. Three main categories of watermarking approaches, namely fragile, semi-fragile, and reversible schemes, to the issues and challenges are then presented. Merits and limitations of specific schemes of each category are also reviewed and compared.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.