contact contact contact
ÊAdvertise
ÊContact
ÊSecurityWatch
Ê Articles | Editorials | Reviews | News | InfoSec Directory | Releases | Submit PR

GFI MailArchiver for Exchange - Easily archive Exchange Server mail & comply with Sarbanes Oxley - Free evaluation available.

Network Security Software - Sponsored by GFI Network Security.

Free VoIP Assessment for your business
Overview of image security techniques with applications in multimedia systems
Added: Friday, 20 May 2005
Publisher: Raymond B. Wolfgang and Edward J. Delp
Category: Network Security

The growth of networked multimedia systems has created a need for the copyright protection of digital images and video. Copyright protection involves the authentication of image content and/or ownership. This can be used to identify illegal copies of a (possibly forged) image. One approach is to mark an image by adding an invisible structure known as a digital watermark to the image. Techniques of incorporating such a watermark into digital images include spatial-domain techniques, transform-domain algorithms and sub-band filtering approaches.

The recent growth of networked multimedia systems has increased the need for the protection of digital media. This is particularly important for the protection and enforcement of intellectual property rights. Digital media includes text, digital audio, images, video and software. Many approaches are available for protecting digital data; these include encryption, authentication and time stamping. In this paper we present algorithms for image authentication and forgery prevention known as watermarks.

Download | InfoSec Directory

Monday, May 23, 2005

Network Security

Hackers get tricky with pharming
Hiring a hacker? Think again, experts warn
Why security vulnerabilities expand beyond operating system, enterprise
How Dangerous Was The Cisco Code Theft?


Free VoIP Assessment for your business


Wireless Security

picoChip, Hifn unveil WiMAX basestation reference
Why wireless devices must be connected to critical applications
Securing 'strange' Wi-Fi devices
IT giants fight wireless patent

InfoSec Diretory

Phishing attacks and countermeasures
Overview of image security techniques with applications in multimedia systems
Inoculating SSH Against Address-Harvesting Worms
What is the point of encryption if you don’t know who for?


Free VoIP Assessment for your business


Press Releases

nCipher helps combat phishing attacks with Chip and PIN
LANDesk Named to 2005 Red Herring Top 100
HP Simplifies Business Protection for Small and Mid-size Businesses with New Smart Office Program
Clifford Chance appoints Redbus Interhouse to Provide Pan-European Services
ÊCopyright © 2000 - 2005 eBCVG IT Security Affiliates :: RSS feeds :: PrivacyÊ
Site Meter

Ê