Watermarking Security

Author(s):  
Teddy Furon ◽  
François Cayre ◽  
Caroline Fontaine

Digital watermarking studies have always been driven by the improvement of robustness. Most of articles of this field deal with this criterion, presenting more and more impressive experimental assessments. Some key events in this quest are the use of spread spectrum, the invention of resynchronization schemes, the discovery of side information channel, and the formulation of the embedding and attacking strategies as a game. On the contrary, security received little attention in the watermarking community. This chapter presents a comprehensive overview of this recent concept. We list the typical applications which require a secure watermarking technique. For each context, a threat analysis is purposed. This presentation allows us to illustrate all the certainties the community has on the subject, browsing all key papers. The end of the paper is devoted to what remains not clear, intuitions and future trends.

2011 ◽  
pp. 274-295
Author(s):  
Christine Simard ◽  
Josianne Basque

This chapter discusses how cultural variables can be taken into account when designing computer-based learning environments (CLEs). Its purpose is to identify concrete recommendations to guide instructional engineering of computer-based learning for diverse cultures through a review of the literature on the subject. First, this chapter describes the background in which such recommendations have emerged, and identifies some of the issues underlying instructional design for diverse cultures. Then it introduces models and guidelines on how cultural variables can be taken into account when designing CLEs. Specific recommendations are organized using a method of instructional engineering for CLEs called MISA (Paquette, 2003) as a frame of reference. This is followed by a discussion on future trends and future research directions.


Author(s):  
Samantha Schmehl Hines

What do library workers want from professional conferences? This question was the subject of a nationwide online survey administered to a randomly selected audience of library workers. Survey results showed that most library workers attend conferences, and their preferences were for face-to-face, topical events. The primary consideration for event attendance according those responding to the survey was the content presented. Issues of cost were also highly important to respondents, although funding for professional development was reported to be generally stable or even increasing. Of lesser interest to potential conference attendees were issues of location, vendor interaction, or the opportunity to perform committee work. Some future trends predicted include a growing acceptance of virtual events, a declining importance on location-based events like state library association conferences, and a need to review the roles of vendors and exhibitors in conferences.


Author(s):  
Dan Yu ◽  
Farook Sattar

This chapter focuses on the issue of transaction tracking in multimedia distribution applications through digital watermarking terminology. The existing watermarking schemes are summarized and their assumptions as well as the limitations for tracking are analyzed. In particular, an Independent Component Analysis (ICA)-based watermarking scheme is proposed, which can overcome the problems of the existing watermarking schemes. Multiple watermarking technique is exploited—one watermark to identify the rightful owner of the work and the other one to identify the legal user of a copy of the work. In the absence of original data, watermark, embedding locations and strengths, the ICA-based watermarking scheme is introduced for efficient watermark extraction with some side information. The robustness of the proposed scheme against some common signal-processing attacks as well as the related future work are also presented. Finally, some challenging issues in multimedia transaction tracking through digital watermarking are discussed.


Author(s):  
Demosthenes Vouyioukas ◽  
Ilias Maglogiannis

This book chapter provides a systematic analysis of the communication technologies used in healthcare and homecare, their applications and the utilization of the mobile technologies in the healthcare sector by using in addition case studies to highlight the successes and concerns of homecare projects. There are several software applications, appliances, and communication technologies emerging in the homecare arena, which can be combined in order to create a pervasive mobile health system. This study highlights the key areas of concern and describes various types of applications in terms of communications’ performance. A comprehensive overview of some of these homecare, healthcare applications and research are presented. The technologies regarding the provision of these systems are described and categorised in two main groups: synchronous and asynchronous communications’ systems and technologies. The recent advances in homecare using wireless body sensors and on/off-body networks technologies are discussed along with the provision of future trends for pervasive healthcare delivery. Finally, this book chapter ends with a brief discussion and concluding remarks in succession to the future trends.


Author(s):  
Alessandro Piva ◽  
Roberto Caldelli ◽  
Alessia De Rosa ◽  
Mauro Barni ◽  
Vito Cappellini

The need to safeguard the property rights of multimedia content from unauthorized copying and the possibility to determine the true owners of the asset can be faced by resorting to efficient digital watermarking systems. This chapter presents a mathematical formulation to define a digital watermarking system and describes the general requirements to be satisfied, with more emphasis given to the aspects of security, robustness, and imperceptibility. After this general discussion, the two main classes of digital watermarking schemes, namely the spread-spectrum watermarking and the side-informed watermarking are explained by highlighting their main advantages and drawbacks. This analysis is completed by the description of a practical implementation of a digital image watermarking scheme. Finally, the use of watermarking systems in the framework of a DRM is deeply analyzed.


Author(s):  
O. K.B. Barima

Recent trends indicate drives by various governments to adopt electronic means to handle their affairs and also provide value to their citizens irrespective of time and space via so-called electronic governments (see, e.g., Mathews, 2001; Tillett, 2000). Although the construction industry is part of the clientele which e-government seeks to serve, traditionally many governments are often the major clients for the supplied services of the industry. This scenario appears to re-shape the traditional customer-supplier relations into that of evolving roles, as for example in the digital environment both parties may find themselves in the roles of supplier or customers at varied times. This article seeks to explore the nature of the exchange interactions which may evolve between e-governments and the construction industry in the digital environment in value delivery. First, perspectives on the key concepts in this article are offered, then relevant literature on the subject is examined, before conceptual models to explain potential evolving roles of the two entities in the delivery of value in the digital/virtual realms is given. An outlook on future trends on the topic is then proposed before the conclusions.


Author(s):  
Josef Pieprzyk

Internet and its widespread usage for multimedia document distribution put the copyright issue in a complete new setting. Multimedia documents, specifically those installed on a web page, are no longer passive as they typically include active applets. Copyright protection safeguards the intellectual property (IP) of multimedia documents, which are either sold or distributed free of charge. In this Chapter, the basic tools for copyright protection are discussed. First, general concepts and the vocabulary used in copyright protection of multimedia documents are discussed. Later, taxonomy of watermarking and fingerprinting techniques are studied. This part is concluded by a review of the literature dealing with IP security. The main part of the chapter discusses the generic watermarking scheme and illustrates it on three specific examples: collusion-free watermarking, spread spectrum watermarking, and software fingerprinting. Future trends and conclusions close the chapter.


Sign in / Sign up

Export Citation Format

Share Document