Loading ...
Sorry, an error occurred while loading the content.

REVIEW: "Multimedia Security", Chun-Shien Lu

Expand Messages
  • Rob, grandpa of Ryan, Trevor, Devon & Han
    BKMLTMSC.RVW 20080418 Multimedia Security , Chun-Shien Lu, 2005, 1-59140-275-1 %E Chun-Shien Lu lcs@iis.sinica.edu.tw www.iis.sinica.edu.tw/~lcs %C
    Message 1 of 1 , Jun 26, 2008
    • 0 Attachment
      BKMLTMSC.RVW 20080418

      "Multimedia Security", Chun-Shien Lu, 2005, 1-59140-275-1
      %E Chun-Shien Lu lcs@... www.iis.sinica.edu.tw/~lcs
      %C Suite 200 701 E. Chocolate Ave., Hershey, PA 17033-1117
      %D 2005
      %G 1-59140-275-1
      %I IRM Press/Idea Group/IGI Global
      %O 800-345-432 717-533-8845 fax: 717-533-8661 cust@...
      %O http://www.amazon.com/exec/obidos/ASIN/1591402751/robsladesinterne
      http://www.amazon.co.uk/exec/obidos/ASIN/1591402751/robsladesinte-21
      %O http://www.amazon.ca/exec/obidos/ASIN/1591402751/robsladesin03-20
      %O Audience a- Tech 2 Writing 1 (see revfaq.htm for explanation)
      %P 255 p.
      %T "Multimedia Security"

      The title could cover a lot of ground. The introduction doesn't make
      it clear what the authors intend.

      Chapter one looks at digital watermarking algorithms and theories. A
      mathematical examination of data hiding below the threshold of human
      vision is in chapter two. The material is disorganized, disjointed,
      and poorly written, with many errors such as failures to define
      acronyms before use. Auditory watermarking is explored in chapter
      three, in terms of concepts and measurement. This is a good overview,
      with more restrained use of mathematics. Chapter four extends this
      material into digital representations of audio content.

      Chapter five notes desirable factors in regard to digital watermarking
      for video, particularly in relation to promotional copies of movies.
      Image integrity, authentication, and partial recovery from
      manipulation is examined in chapter six. Chapter seven looks at a
      similar application, but from the perspective of digital signatures.
      Document images, and the embedding of data therein, is the topic of
      chapter eight.

      It is interesting to note the factors that are being considered in
      this field. However, in this book the explanations are generally
      poor, and shift to math for any actual technologies. There is soem
      academic interest in the text, but little direct or practical
      application of the material to real systems.

      copyright Robert M. Slade, 2008 BKMLTMSC.RVW 20080418


      ====================== (quote inserted randomly by Pegasus Mailer)
      rslade@... slade@... rslade@...
      Is reading in the bathroom considered multi-tasking?
      http://victoria.tc.ca/techrev/rms.htm
    Your message has been successfully submitted and would be delivered to recipients shortly.