Multimedia Data Hiding

  • Min Wu
  • Bede Liu

Table of contents

  1. Front Matter
    Pages i-xix
  2. Introduction

    1. Min Wu, Bede Liu
      Pages 1-11
  3. Fundamental Issues

    1. Front Matter
      Pages 13-13
    2. Min Wu, Bede Liu
      Pages 15-17
    3. Min Wu, Bede Liu
      Pages 19-40
    4. Min Wu, Bede Liu
      Pages 41-62
  4. Algorithm and System Designs

    1. Front Matter
      Pages 63-63
    2. Min Wu, Bede Liu
      Pages 65-91
    3. Min Wu, Bede Liu
      Pages 93-118
    4. Min Wu, Bede Liu
      Pages 119-136
    5. Min Wu, Bede Liu
      Pages 137-146
  5. Attacks and Countermeasures

    1. Front Matter
      Pages 147-147
    2. Min Wu, Bede Liu
      Pages 175-190
    3. Min Wu, Bede Liu
      Pages 191-192
  6. Back Matter
    Pages 193-219

About this book


The digital information revolution has brought about profound changes in our society and our life. New devices and powerful software have made it possible for consumers worldwide to create, manipulate, share, and enjoy the multimedia information. Internet and wireless networks offer ubiquitous channels to deliver and to exchange multimedia information for such pur­ poses as remote collaboration, distant learning, and entertainment. With all these advances in multimedia coding and communication technologies over the past decade, the major hurdle for allowing much broader access of multimedia assets and deployment of multimedia services no longer lies with bandwidth-related issues, but with how to make sure that content is used for its intended purpose by its intended recipients. The core issue then be­ comes the development of secure management of content usage and delivery across communication networks. Data hiding and digital watermarking are promising new technologies for multimedia information protection and rights management. Secondary data can be embedded imperceptibly in digital multimedia signals for a variety of applications, including ownership protection, authentication, access con­ trol, and annotation. Data hiding can also be used to send side information in multimedia communication for providing additional functionalities or for enhancing performance. The extraction of the embedded data mayor may not need knowledge of the original host media data. In addition to im­ perceptibility, robustness against moderate processing such as compression is also an important consideration.


Information Multimedia Performance Signatur Variable algorithms communication

Authors and affiliations

  • Min Wu
    • 1
  • Bede Liu
    • 2
  1. 1.Department of Electrical EngineeringUniversity of MarylandCollege ParkUSA
  2. 2.Department of Electrical EngineeringPrinceton UniversityPrincetonUSA

Bibliographic information

Industry Sectors
Finance, Business & Banking
IT & Software