Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Techniques for audiovisual data conf...
~
Wu, Chung-Ping.
Linked to FindBook
Google Book
Amazon
博客來
Techniques for audiovisual data confidentiality, integrity and copyright protection.
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Techniques for audiovisual data confidentiality, integrity and copyright protection./
Author:
Wu, Chung-Ping.
Description:
165 p.
Notes:
Adviser: C.-C. Jay Kuo.
Contained By:
Dissertation Abstracts International63-10B.
Subject:
Computer Science. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3065864
ISBN:
0493853928
Techniques for audiovisual data confidentiality, integrity and copyright protection.
Wu, Chung-Ping.
Techniques for audiovisual data confidentiality, integrity and copyright protection.
- 165 p.
Adviser: C.-C. Jay Kuo.
Thesis (Ph.D.)--University of Southern California, 2001.
The fast growth of multimedia processing and delivery technologies makes many new multimedia applications possible. To prevent multimedia content from being stolen or illegally used, audiovisual content protection techniques become increasingly important so that the full potential of these applications can be reached. In this research, we investigate novel techniques for audiovisual data confidentiality, integrity and copyright protection, which are the most fundamental content security issues in the community.
ISBN: 0493853928Subjects--Topical Terms:
626642
Computer Science.
Techniques for audiovisual data confidentiality, integrity and copyright protection.
LDR
:03319nam 2200313 a 45
001
927386
005
20110425
008
110425s2001 eng d
020
$a
0493853928
035
$a
(UnM)AAI3065864
035
$a
AAI3065864
040
$a
UnM
$c
UnM
100
1
$a
Wu, Chung-Ping.
$3
1250946
245
1 0
$a
Techniques for audiovisual data confidentiality, integrity and copyright protection.
300
$a
165 p.
500
$a
Adviser: C.-C. Jay Kuo.
500
$a
Source: Dissertation Abstracts International, Volume: 63-10, Section: B, page: 4834.
502
$a
Thesis (Ph.D.)--University of Southern California, 2001.
520
$a
The fast growth of multimedia processing and delivery technologies makes many new multimedia applications possible. To prevent multimedia content from being stolen or illegally used, audiovisual content protection techniques become increasingly important so that the full potential of these applications can be reached. In this research, we investigate novel techniques for audiovisual data confidentiality, integrity and copyright protection, which are the most fundamental content security issues in the community.
520
$a
We first propose two methodologies for fast encryption, i.e. selective encryption and integrated encryption and entropy coding based on multiple statistical models. The low computational cost is essential to multimedia confidentiality since the size of a multimedia data file is large and its real-time processing is often required. A selective encryption scheme for G.723.1 speech coding is presented, and two rules to determine whether a multimedia compression system is suitable for selective encryption are given. Furthermore, we propose a novel encryption framework by modifying entropy coders so that multiple statistical models are alternatively adopted in a secret order. Two encryption schemes are constructed by applying this methodology to Huffman coder and QM coder.
520
$a
For speech content integrity, we investigate two fragile watermarking methods and a feature extraction scheme integrated with CELP speech coders. Both fragile watermarking schemes eliminate the participation of agents in the channel since no auxiliary data are required. However, the exponential-scale odd/even modulation is not compatible with CELP speech coders, and the linear additive watermarking scheme could fail to detect certain localized content alterations. The proposed feature extraction scheme is tolerant to many kinds of content preserving operations, including CELP coding.
520
$a
Finally, a digital audio watermarking scheme of low complexity is proposed as an effective way to deter users from misusing or illegally distributing audio data. The proposed scheme is based on audio content analysis by using the wavelet filterbank while the watermark is embedded in the DFT domain. Special attention is paid to the synchronization attack caused by casual audio editing or malicious random cropping, which is a low-cost yet effective attack to previous watermarking methods.
590
$a
School code: 0208.
650
4
$a
Computer Science.
$3
626642
650
4
$a
Engineering, Electronics and Electrical.
$3
626636
690
$a
0544
690
$a
0984
710
2 0
$a
University of Southern California.
$3
700129
773
0
$t
Dissertation Abstracts International
$g
63-10B.
790
$a
0208
790
1 0
$a
Kuo, C.-C. Jay,
$e
advisor
791
$a
Ph.D.
792
$a
2001
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3065864
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9099234
電子資源
11.線上閱覽_V
電子書
EB W9099234
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login