BKMLTMSC.RVW 20080418 "Multimedia Security", Chun-Shien Lu, 2005, 1-59140-275-1 %E Chun-Shien Lu lcs@iis.sinica.edu.tw www.iis.sinica.edu.tw/~lcs %C Suite 200 701 E. Chocolate Ave., Hershey, PA 17033-1117 %D 2005 %G 1-59140-275-1 %I IRM Press/Idea Group/IGI Global %O 800-345-432 717-533-8845 fax: 717-533-8661 cust@idea-group.com %O http://www.amazon.com/exec/obidos/ASIN/1591402751/robsladesinterne http://www.amazon.co.uk/exec/obidos/ASIN/1591402751/robsladesinte-21 %O http://www.amazon.ca/exec/obidos/ASIN/1591402751/robsladesin03-20 %O Audience a- Tech 2 Writing 1 (see revfaq.htm for explanation) %P 255 p. %T "Multimedia Security" The title could cover a lot of ground. The introduction doesn't make it clear what the authors intend. Chapter one looks at digital watermarking algorithms and theories. A mathematical examination of data hiding below the threshold of human vision is in chapter two. The material is disorganized, disjointed, and poorly written, with many errors such as failures to define acronyms before use. Auditory watermarking is explored in chapter three, in terms of concepts and measurement. This is a good overview, with more restrained use of mathematics. Chapter four extends this material into digital representations of audio content. Chapter five notes desirable factors in regard to digital watermarking for video, particularly in relation to promotional copies of movies. Image integrity, authentication, and partial recovery from manipulation is examined in chapter six. Chapter seven looks at a similar application, but from the perspective of digital signatures. Document images, and the embedding of data therein, is the topic of chapter eight. It is interesting to note the factors that are being considered in this field. However, in this book the explanations are generally poor, and shift to math for any actual technologies. There is soem academic interest in the text, but little direct or practical application of the material to real systems. copyright Robert M. Slade, 2008 BKMLTMSC.RVW 20080418