Katzenbeisser, Stefan ; Liu, Huajian ; Steinebach, Martin
Hrsg.: Li, Chang-Tsun (2010)
Computational Forensics, Digital Crime, and Investigation: Methods and Solutions.
Buchkapitel, Bibliographie
Kurzbeschreibung (Abstract)
Multimedia document authentication allows judging the authenticity and integrity of digital documents. Today a variety of such tools exist, which are constructed using different approaches, namely forensic methods, perceptual hashes and digital watermarks. Digital document forensics identifies the source of a document as well as its integrity by means of passive estimation. Perceptual hashing allows computing of short digests of documents; the hashes are insensitive against some signal processing operations and may serve as proof of integrity. Finally, authentication watermarking even allows gaining precise and reliable knowledge on the nature of modifications that a digital document underwent. In this chapter, we give an overview of the three complementary technologies, survey state-of-the-art methods and provide an analysis of their strength and weaknesses.
Typ des Eintrags: | Buchkapitel |
---|---|
Erschienen: | 2010 |
Herausgeber: | Li, Chang-Tsun |
Autor(en): | Katzenbeisser, Stefan ; Liu, Huajian ; Steinebach, Martin |
Art des Eintrags: | Bibliographie |
Titel: | Computational Forensics, Digital Crime, and Investigation: Methods and Solutions |
Sprache: | Deutsch |
Publikationsjahr: | September 2010 |
Verlag: | Idea Group Reference |
Reihe: | Handbook of Research |
Kurzbeschreibung (Abstract): | Multimedia document authentication allows judging the authenticity and integrity of digital documents. Today a variety of such tools exist, which are constructed using different approaches, namely forensic methods, perceptual hashes and digital watermarks. Digital document forensics identifies the source of a document as well as its integrity by means of passive estimation. Perceptual hashing allows computing of short digests of documents; the hashes are insensitive against some signal processing operations and may serve as proof of integrity. Finally, authentication watermarking even allows gaining precise and reliable knowledge on the nature of modifications that a digital document underwent. In this chapter, we give an overview of the three complementary technologies, survey state-of-the-art methods and provide an analysis of their strength and weaknesses. |
Freie Schlagworte: | Secure Data |
ID-Nummer: | TUD-CS-2010-2385 |
Fachbereich(e)/-gebiet(e): | LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt LOEWE > LOEWE-Zentren LOEWE |
Hinterlegungsdatum: | 30 Dez 2016 20:23 |
Letzte Änderung: | 17 Mai 2018 13:02 |
PPN: | |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
Frage zum Eintrag |
Optionen (nur für Redakteure)
Redaktionelle Details anzeigen |