Cover image for Intelligent Watermarking Techniques : Series On Innovative Intelligence.
Intelligent Watermarking Techniques : Series On Innovative Intelligence.
Title:
Intelligent Watermarking Techniques : Series On Innovative Intelligence.
Author:
Pan, Jeng-Shyang.
ISBN:
9789812562524
Personal Author:
Physical Description:
1 online resource (852 pages)
Contents:
Intelligent Watermarking Techniques -- CONTENTS -- Preface -- Part I. Fundamentals of Watermarking and Intelligent Techniques -- Chapter 1. An Introduction to Watermarking Techniques Hsiang-Cheh Huang, Hsueh-Ming Hang, and Jeng-Shyang Pan -- 1 Introduction -- 2 Some Terminology -- 3 Applications -- 4 Requirements -- 1. Robustness -- 2. Transparency -- 3. Tamper resistance -- 4. Information capacity -- 5. Complexity -- 5 Classifications -- 5.1 Perceptible and Imperceptible Watermarks -- 5.2 Robust, Fragile, and Semi-Fragile Watermarks -- 5.2.1 Robust watermarks -- 5.2.2 Fragile watermarks -- 5.2.3 Semi-fragile watermarks -- 5.3 Algorithm Design Issues -- 6 Watermark Embedding Schemes -- 6.1 Spatial Domain Watermarking -- 6.2 Transform Domain Watermarking -- 6.3 QIM Watermarking -- 7 Watermark Extraction Categories -- 7.1 Extraction with/without The Original Multimedia Contents -- 7.2 The Public/Secret Keys -- 8 Attacking Schemes -- 8.1 Image Compression -- 8.1.1 VQ compression -- 8.1.2 JPEG compression -- 8.2 Image Cropping -- 8.3 Spatial Filtering -- 8.4 Image Rotation -- 8.5 Image Shifting and Line Deletion -- 9 Watermarking Benchmarks -- 9.1 Stirmark -- 9.2 Checkmark -- 9.3 Opitmark -- 9.4 CERTIMARK -- 10 Activities with Watermarking Research -- 10.1 Internet Resources -- 10.2 Special Issues in International Journals -- 10.3 Books -- 10.4 Related Sessions in International Conferences -- 10.5 Companies and Products Relating to Watermarking -- 11 Organization of This Book -- 12 Summary -- References -- Chapter 2. Neuro-Fuzzy Learning Theory Yan Shi, Masaharu Mizumoto, and Peng Shi -- 1 Introduction -- 2 A Neuro-Fuzzy Learning Algorithm -- 3 Extraction of Typical Data from Training Data Based on FCM -- 4 Numerical Examples -- 5 Conclusions -- References -- Chapter 3. Evolutionary Algorithms Wei-Po Lee and Chao-Hsing Hsu.

1 Evolutionary Computation -- 2 Genetic Algorithms -- 2.1 Selection Methods -- 2.2 Creating Offspring -- 3 Other Evolution Algorithms -- 3.1 Evolution Strategies and Evolutionary Programming -- 3.2 Genetic Programming -- 4 Parallelizing Simulated Evolution -- 4.1 Coarse-Grain Models -- 4.2 Fine-Grain Models -- 5 Summary -- References -- Chapter 4. A Tutorial on Meta-Heuristics for Optimization Shu-Chuan Chu, Chin-Shiuh Shieh, and John F. Roddick -- 1 Introduction -- 2 Genetic Algorithms -- 3 Ant Systems -- 4 Particle Swarm Optimization -- 5 Discussions and Conclusions -- References -- Part II. Watermarking Techniques -- Chapter 5. Watermarking Based on Spatial Domain Hsiang-Cheh Huang, Jeng-Shyang Pan, and Hsueh-Ming Hang -- 1 Introduction -- 2 General Embedding Structures in The Spatial Domain -- 3 General Extraction Structures in The Spatial Domain -- 4 Issues for Practical Implementations -- 4.1 Bit Plane Manipulations of The LSB's -- 4.2 Selecting The Embedding Positions -- 5 Applications -- 5.1 Video Watermarking Applications -- 5.2 Frame Reordering and Dropping -- 5.3 Combining Spatial-Domain Watermarking with Watermarking in Different Domains -- 6 Conclusions -- References -- Chapter 6. Watermarking Based on Transform Domain Hsiang-Cheh Huang, Jeng-Shyang Pan, and Hsueh-Ming Hang -- 1 Introduction -- 2 General Structures for Transform Domain Watermarking -- 3 Categories for Transformations -- 3.1 Discrete Fourier Transform (DFT) -- 3.2 Discrete Cosine Transform (DCT) -- 3.3 Discrete Wavelet Transform (DWT) -- 4 Examples for Practical Implementations -- 4.1 Transform-Domain Image Watermarking -- 4.2 Spread Spectrum Transform-Domain Watermarking -- 4.3 Image Adaptive Transform-Domain Watermarking -- 4.4 Compressed-Domain Video Watermarking -- 5 Summary -- References.

Chapter 7. Watermarking Based on Vector Quantization Chin-Shiuh Shieh, Hsiang- Cheh Huang, Zhe-Ming Lu, and Jeng-Shyang Pan -- 1 Introduction -- 2 Watermarking Scheme Based on VQ Indices -- 3 Watermarking Scheme Based on Secret Keys -- 4 Discussions and Conclusions -- References -- Chapter 8. Audio Watermarking Techniques Hyoung Joong Kim, Yong Hee Choi, Jongwon Seok, and Jinwoo Hong -- 1 Introduction -- 2 Spread-Spectrum Method -- 2.1 Basic Idea -- 2.2 Pseudo-Random Sequence -- 2.3 Watermark Shaping -- 2.4 Sinusoidal Modulation -- 3 Two-Set Method -- 3.1 Patchwork Scheme -- 3.2 Amplitude Modification -- 4 Replica Method -- 4.1 Echo Hiding -- 4.2 Replica Modulation -- 5 Self-Marking Method -- 5.1 Time-Scale Modification -- 5.2 Salient Features -- 6 Synchronization -- 6.1 Coarse Alignment -- 6.2 Synchronization Code -- 6.3 Salient Point Extraction -- 6.4 Redundant-Chip Coding -- 6.5 Beat-Scaling Transform -- 7 Conclusions -- Acknowledgments -- References -- Chapter 9. Video Watermarking: Requirements, Problems and Solutions Christoph Busch and Xiamu Niu -- 1 Introduction -- 1.1 Generic Models of Video Watermarking -- 1.1.1 Raw Video Sequences Watermarking -- 1.1.2 MPEG Compression with Watermarking -- 1.1.3 Watermarking MPEG Compression Stream -- 1.2 Requirements for Video Watermarking -- 1.2.1 Broadcasting Environments for Video Watermarking -- 1.2.2 Application Scenario -- 1.2.3 Requirements and Problems -- 2 The TALISMAN Project -- 2.1 Overview -- 2.2 Algorithm Description -- 2.3 Transparent Quality -- 2.3.1 Edge Detection -- 2.3.2 Smooth Blocks -- 2.3.3 Block Assessment and Processing -- 2.3.4 Resistance against Geometric Distortions -- 2.3.5 Robustness against Compression and Practical Evalua- tion -- 3 The Spatial-temporal Synchronization Issues in Video Watermarking -- 3.1 Motivations -- 3.2 The Time-Axis Template.

3.2.1 The Affine Transformation -- 3.2.2 The Assumption -- 3.2.3 The Time-axis Template -- 3.2.4 Video Watermarking based on Time-Axis Templates -- 3.3 Watermarking along the Time-Axis -- 3.3.1 Watermark Generation -- 3.3.2 Invisibility of Watermarks -- 3.3.3 Watermark Embedding and Detection -- 3.3.3.1 Adaptive Embedding Process -- 3.3.3.2 Adaptive Detection Process -- 3.3.4 Security of Watermark -- 3.4 The Temporal Synchronization -- 4 Conclusions -- References -- Chapter 10. Digital Video Watermarking: Techniques, Technology and Trends Deepa Kundur, Karen Su, and Dimitrios Hatzinakos -- 1 Introduction -- 1.1 Video vs. Still Image Watermarking -- 1.2 Applications -- 2 Models and Measures -- 2.1 Figures of Merit -- 2.2 Paradigms -- 3 Video Watermarking Algorithms -- 3.1 Classification of Video Watermarking Techniques -- 3.2 Pixel Domain Methods -- 3.2.1 1D spread spectrum modulation -- 3.2.2 Just another watermarking system (2D spread spectrum) -- 3.2.3 Spatially localized image dependent watermarking -- 3.2.4 CDMA modulation -- 3.3 Transform Domain Methods -- 3.3.1 MPEG-2-based techniques -- 3.3.1.1 VLC swapping -- 3.3.1.2 Region-based energy manipulation -- 3.3.1.3 Spread spectrum modulation (Compressed domain) -- 3.3.2 Frame-based techniques -- 3.3.2.1 DCT-based spread spectrum -- 3.3.2.2 Perceptual DCT-based -- 3.3.3 Group-of-frame-based techniques -- 3.3.3.1 3D DFT -- 3.3.3.2 Perceptual scene-based -- 4 Hardware Implementation Issues of Digital Video Watermarking Techniques -- 4.1 Why Hardware? -- 4.2 Hardware Complexity Constraints -- 4.2.1 Application constraints -- 4.2.1.1 Embeddor complexity -- 4.2.1.2 Detector complexity -- 5 Predicted Trends in Video Watermarking Research -- References -- Chapter 11.Benchmarking of Watermarking Algorithms Nikolaos Nikolaidis and Ioannis Pitas -- 1 Introduction -- 2 Characteristics of A Watermarking System.

3 Benchmarking Principles -- 3.1 Algorithmic Complexity -- 3.2 Visual Quality -- 3.3 Watermark Detection Performance -- 3.3.1 Hard Decision Detectors -- 3.3.2 Soft Decision Detectors -- 3.4 Message Decoding Performance -- 3.5 Payload -- 4 Result Summarization -- 5 Method Comparison and Conformance to A Set of Specifications -- 6 Existing Benchmarking Platforms -- 6.1 Stirmark -- 6.2 Checkmark -- 6.3 Optimark -- 6.4 Certimark -- 6.5 Comparison of The Benchmarking Platforms -- 7 Conclusions -- References -- Part III. Advanced Watermarking Techniques -- Chapter 12. Genetic Watermarking on Transform Domain Hsiang-Cheh Huang, Jeng-Shyang Pan, and Feng-Hsing Wang -- 1 Introduction -- 2 The Algorithm -- 2.1 Embedding The Watermark -- 2.2 Extracting The Watermark -- 3 Simulation Results -- 3.1 The Conventional Scheme -- 3.2 The Progressive Transmission Scheme -- 4 Summary -- References -- Chapter 13. Genetic Watermarking on Spatial Domain Feng-Hsing Wang, Lakhmi C. Jain, and Jeng-Shyang Pan -- 1 Introduction -- 2 Watermarking Scheme without GA -- 2.1 Embedding Procedure -- 2.2 Extraction Procedure -- 2.3 Performance -- 3 Watermarking Scheme with GA -- 3.1 GA Training Procedure -- 3.1.1 General Steps -- 3.1.2 Preprocessing -- 3.1.3 Details about the GA Training Steps -- 3.2 Performance -- 3.3 Discussion about More Attacking Functions -- 4 Discussion and Conclusions -- References -- Chapter 14. Robust Image Watermarking Systems Using Neural Networks Chin-Cheng Chang and Iuon-Chang Lin -- 1 Introduction -- 2 Neural Networks -- 3 Related Works -- 3.1 Image Watermarking System Based on Discrete Cosine Transform Using Neural Networks -- 3.2 A Watermarking System Using Neural Networks in Spatial Domain for Color Images -- 4 Image Watermarking System Based on Wavelet Transform Using Neural Networks -- 4.1 Embedding Phase -- 4.2 Extracting Phase -- 5 Experiments.

6 Discussion.
Abstract:
Watermarking techniques involve the concealment of information withina text or images and the transmission of this information to thereceiver with minimum distortion. This is a very new area ofresearch. The techniques will have a significant effect on defence,business, copyright protection and other fields where informationneeds to be protected at all costs from attackers.This book presents the recent advances in the theory andimplementation of watermarking techniques. It brings together, for thefirst time, the successful applications of intelligent paradigms(including comparisons with conventional methods) in many areas. Theaccompanying CD-Rom provides readers with source codes and executablesto put into practice general topics in watermarking.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: