Cover image for Digital Watermarking and Steganography.
Digital Watermarking and Steganography.
Title:
Digital Watermarking and Steganography.
Author:
Cox, Ingemar.
ISBN:
9780080555805
Personal Author:
Edition:
2nd ed.
Physical Description:
1 online resource (623 pages)
Series:
The Morgan Kaufmann Series in Multimedia Information and Systems
Contents:
Front Cover -- Digital Watermarking and Steganography -- Copyright Page -- Table of Contents -- Preface to the First Edition -- Preface to the Second Edition -- Example Watermarking Systems -- Chapter 1. Introduction -- 1.1 Information Hiding, Steganography, and Watermarking -- 1.2 History of Watermarking -- 1.3 History of Steganography -- 1.4 Importance of Digital Watermarking -- 1.5 Importance of Steganography -- Chapter 2. Applications and Properties -- 2.1 Applications of Watermarking -- 2.2 Applications of Steganography -- 2.3 Properties of Watermarking Systems -- 2.4 Evaluating Watermarking Systems -- 2.5 Properties of Steganographic and Steganalysis Systems -- 2.6 Evaluating and Testing Steganographic Systems -- 2.7 Summary -- Chapter 3. Models of Watermarking -- 3.1 Notation -- 3.2 Communications -- 3.3 Communication-Based Models of Watermarking -- 3.4 Geometric Models of Watermarking -- 3.5 Modeling Watermark Detection by Correlation -- 3.6 Summary -- Chapter 4. Basic Message Coding -- 4.1 Mapping Messages into Message Vectors -- 4.2 Error Correction Coding -- 4.3 Detecting Multisymbol Watermarks -- 4.4 Summary -- Chapter 5. Watermarking with Side Information -- 5.1 Informed Embedding -- 5.2 Watermarking Using Side Information -- 5.3 Dirty-Paper Codes -- 5.4 Summary -- Chapter 6. Practical Dirty-Paper Codes -- 6.1 Practical Considerations for Dirty-Paper Codes -- 6.2 Broad Approaches to Dirty-Paper Code Design -- 6.3 Implementing DM with A Simple Lattice Code -- 6.4 Typical Tricks in Implementing Lattice Codes -- 6.5 Coding with Better Lattices -- 6.6 Making Lattice Codes Survive Valumetric Scaling -- 6.7 Dirty-Paper Trellis Codes -- 6.8 Summary -- Chapter 7. Analyzing Errors -- 7.1 Message Errors -- 7.2 False Positive Errors -- 7.3 False Negative Errors -- 7.4 ROC Curves -- 7.5 The Effect of Whitening on Error Rates.

7.6 Analysis of Normalized Correlation -- 7.7 Summary -- Chapter 8. Using Perceptual Models -- 8.1 Evaluating Perceptual Impact of Watermarks -- 8.2 General Form of A Perceptual Model -- 8.3 Two Examples of Perceptual Models -- 8.4 Perceptually Adaptive Watermarking -- 8.5 Summary -- Chapter 9. Robust Watermarking -- 9.1 Approaches -- 9.2 Robustness to Valumetric Distortions -- 9.3 Robustness to Temporal and Geometric Distortions -- 9.4 Summary -- Chapter 10. Watermark Security -- 10.1 Security Requirements -- 10.2 Watermark Security and Cryptography -- 10.3 Some Significant Known Attacks -- 10.4 Summary -- Chapter 11. Content Authentication -- 11.1 Exact Authentication -- 11.2 Selective Authentication -- 11.3 Localization -- 11.4 Restoration -- 11.5 Summary -- Chapter 12. Steganography -- 12.1 Steganographic Communication -- 12.2 Notation and Terminology -- 12.3 Information-Theoretic Foundations of Steganography -- 12.4 Practical Steganographic Methods -- 12.5 Minimizing the Embedding Impact -- 12.6 Summary -- Chapter 13. Steganalysis -- 13.1 Steganalysis Scenarios -- 13.2 Some Significant Steganalysis Algorithms -- 13.3 Summary -- Appendix A. Background Concepts -- A.1 Information Theory -- A.2 Coding Theory -- A.3 Cryptography -- Appendix B. Selected Theoretical Results -- B.1 Information-Theoretic Analysis of Secure Watermarking (Moulin and O'Sullivan) -- B.2 Error Probabilities Using Normalized Correlation Detectors (Miller and Bloom) -- B.3 Effect of Quantization Noise on Watermarks (Eggers and Girod) -- Appendix C. Notation and Common Variables -- C.1 Variable Naming Conventions -- C.2 Operators -- C.3 Common Variable Names -- C.4 Common Functions -- Glossary -- References -- Index -- About the Authors.
Abstract:
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession. *This new edition now contains essential information on steganalysis and steganography *New concepts and new applications including QIM introduced *Digital watermark embedding is given a complete update with new processes and applications.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: