"Multimedia Security", Chun-Shien Lu, 2005, 1-59140-275-1
%E Chun-Shien Lu lcs@...
%C Suite 200 701 E. Chocolate Ave., Hershey, PA 17033-1117
%I IRM Press/Idea Group/IGI Global
%O 800-345-432 717-533-8845 fax: 717-533-8661 cust@...
%O Audience a- Tech 2 Writing 1 (see revfaq.htm for explanation)
%P 255 p.
%T "Multimedia Security"
The title could cover a lot of ground. The introduction doesn't make
it clear what the authors intend.
Chapter one looks at digital watermarking algorithms and theories. A
mathematical examination of data hiding below the threshold of human
vision is in chapter two. The material is disorganized, disjointed,
and poorly written, with many errors such as failures to define
acronyms before use. Auditory watermarking is explored in chapter
three, in terms of concepts and measurement. This is a good overview,
with more restrained use of mathematics. Chapter four extends this
material into digital representations of audio content.
Chapter five notes desirable factors in regard to digital watermarking
for video, particularly in relation to promotional copies of movies.
Image integrity, authentication, and partial recovery from
manipulation is examined in chapter six. Chapter seven looks at a
similar application, but from the perspective of digital signatures.
Document images, and the embedding of data therein, is the topic of
It is interesting to note the factors that are being considered in
this field. However, in this book the explanations are generally
poor, and shift to math for any actual technologies. There is soem
academic interest in the text, but little direct or practical
application of the material to real systems.
copyright Robert M. Slade, 2008 BKMLTMSC.RVW 20080418
====================== (quote inserted randomly by Pegasus Mailer)
rslade@... slade@... rslade@...
Is reading in the bathroom considered multi-tasking?