語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Techniques for audiovisual data conf...
~
Wu, Chung-Ping.
FindBook
Google Book
Amazon
博客來
Techniques for audiovisual data confidentiality, integrity and copyright protection.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Techniques for audiovisual data confidentiality, integrity and copyright protection./
作者:
Wu, Chung-Ping.
面頁冊數:
165 p.
附註:
Adviser: C.-C. Jay Kuo.
Contained By:
Dissertation Abstracts International63-10B.
標題:
Computer Science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3065864
ISBN:
0493853928
Techniques for audiovisual data confidentiality, integrity and copyright protection.
Wu, Chung-Ping.
Techniques for audiovisual data confidentiality, integrity and copyright protection.
- 165 p.
Adviser: C.-C. Jay Kuo.
Thesis (Ph.D.)--University of Southern California, 2001.
The fast growth of multimedia processing and delivery technologies makes many new multimedia applications possible. To prevent multimedia content from being stolen or illegally used, audiovisual content protection techniques become increasingly important so that the full potential of these applications can be reached. In this research, we investigate novel techniques for audiovisual data confidentiality, integrity and copyright protection, which are the most fundamental content security issues in the community.
ISBN: 0493853928Subjects--Topical Terms:
626642
Computer Science.
Techniques for audiovisual data confidentiality, integrity and copyright protection.
LDR
:03319nam 2200313 a 45
001
927386
005
20110425
008
110425s2001 eng d
020
$a
0493853928
035
$a
(UnM)AAI3065864
035
$a
AAI3065864
040
$a
UnM
$c
UnM
100
1
$a
Wu, Chung-Ping.
$3
1250946
245
1 0
$a
Techniques for audiovisual data confidentiality, integrity and copyright protection.
300
$a
165 p.
500
$a
Adviser: C.-C. Jay Kuo.
500
$a
Source: Dissertation Abstracts International, Volume: 63-10, Section: B, page: 4834.
502
$a
Thesis (Ph.D.)--University of Southern California, 2001.
520
$a
The fast growth of multimedia processing and delivery technologies makes many new multimedia applications possible. To prevent multimedia content from being stolen or illegally used, audiovisual content protection techniques become increasingly important so that the full potential of these applications can be reached. In this research, we investigate novel techniques for audiovisual data confidentiality, integrity and copyright protection, which are the most fundamental content security issues in the community.
520
$a
We first propose two methodologies for fast encryption, i.e. selective encryption and integrated encryption and entropy coding based on multiple statistical models. The low computational cost is essential to multimedia confidentiality since the size of a multimedia data file is large and its real-time processing is often required. A selective encryption scheme for G.723.1 speech coding is presented, and two rules to determine whether a multimedia compression system is suitable for selective encryption are given. Furthermore, we propose a novel encryption framework by modifying entropy coders so that multiple statistical models are alternatively adopted in a secret order. Two encryption schemes are constructed by applying this methodology to Huffman coder and QM coder.
520
$a
For speech content integrity, we investigate two fragile watermarking methods and a feature extraction scheme integrated with CELP speech coders. Both fragile watermarking schemes eliminate the participation of agents in the channel since no auxiliary data are required. However, the exponential-scale odd/even modulation is not compatible with CELP speech coders, and the linear additive watermarking scheme could fail to detect certain localized content alterations. The proposed feature extraction scheme is tolerant to many kinds of content preserving operations, including CELP coding.
520
$a
Finally, a digital audio watermarking scheme of low complexity is proposed as an effective way to deter users from misusing or illegally distributing audio data. The proposed scheme is based on audio content analysis by using the wavelet filterbank while the watermark is embedded in the DFT domain. Special attention is paid to the synchronization attack caused by casual audio editing or malicious random cropping, which is a low-cost yet effective attack to previous watermarking methods.
590
$a
School code: 0208.
650
4
$a
Computer Science.
$3
626642
650
4
$a
Engineering, Electronics and Electrical.
$3
626636
690
$a
0544
690
$a
0984
710
2 0
$a
University of Southern California.
$3
700129
773
0
$t
Dissertation Abstracts International
$g
63-10B.
790
$a
0208
790
1 0
$a
Kuo, C.-C. Jay,
$e
advisor
791
$a
Ph.D.
792
$a
2001
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3065864
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9099234
電子資源
11.線上閱覽_V
電子書
EB W9099234
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入