skip to main content
10.1145/2482513.2484424acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
invited-talk

On the intertwining of information hiding and multimedia security: a personal perspective

Published: 17 June 2013 Publication History

Abstract

Over the past decade or so, the tremendous growth and proliferation of multimedia content has led to the important need to protect and verify the content integrity, particularly if the data are to be used for law enforcement, media, legal and financial applications. This has resulted in the research and applications of information hiding, and multimedia security and forensics becoming more and more integrated and intertwined and as clearly demonstrated, amongst other common activities, with the merging of the two prestigious and popular conferences of IH and ACM MMSec into ACM IHMMSEC'2013.
In this keynote presentation, I will present a personal perspective on some of the various changes, challenges, threats and opportunities in the areas of watermarking, steganography/steganalysis, and multimedia security and forensics that I have faced and experienced since I first stumbled upon digital watermarking and steganography some 16 years ago which I am still very much actively involved today. The talk with provide a chronological overview of some key milestones related to watermarking, information hiding and digital forensics, as well as including some personal events from setting up and managing a University spinout, to technology transfer and product commercialization.

Index Terms

  1. On the intertwining of information hiding and multimedia security: a personal perspective

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IH&MMSec '13: Proceedings of the first ACM workshop on Information hiding and multimedia security
    June 2013
    242 pages
    ISBN:9781450320818
    DOI:10.1145/2482513
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 June 2013

    Check for updates

    Author Tags

    1. authentication
    2. forensics
    3. steganography
    4. watermarking

    Qualifiers

    • Invited-talk

    Conference

    IH&MMSec '13
    Sponsor:

    Acceptance Rates

    IH&MMSec '13 Paper Acceptance Rate 27 of 74 submissions, 36%;
    Overall Acceptance Rate 128 of 318 submissions, 40%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 232
      Total Downloads
    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 08 Mar 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media