Digital Watermarking and Steganography -  Jeffrey Bloom,  Ingemar Cox,  Jessica Fridrich,  Ton Kalker,  Matthew Miller

Digital Watermarking and Steganography (eBook)

eBook Download: PDF
2007 | 2. Auflage
624 Seiten
Elsevier Science (Verlag)
978-0-08-055580-5 (ISBN)
Systemvoraussetzungen
75,46 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession.

*This new edition now contains essential information on steganalysis and steganography
*New concepts and new applications including QIM introduced
*Digital watermark embedding is given a complete update with new processes and applications
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession. - This new edition now contains essential information on steganalysis and steganography- New concepts and new applications including QIM introduced- Digital watermark embedding is given a complete update with new processes and applications

Front Cover 1
Digital Watermarking and Steganography 4
Copyright Page 5
Table of Contents 8
Preface to the First Edition 16
Preface to the Second Edition 20
Example Watermarking Systems 22
Chapter 1. Introduction 30
1.1 Information Hiding, Steganography, and Watermarking 33
1.2 History of Watermarking 35
1.3 History of Steganography 38
1.4 Importance of Digital Watermarking 40
1.5 Importance of Steganography 41
Chapter 2. Applications and Properties 44
2.1 Applications of Watermarking 45
2.2 Applications of Steganography 63
2.3 Properties of Watermarking Systems 65
2.4 Evaluating Watermarking Systems 75
2.5 Properties of Steganographic and Steganalysis Systems 78
2.6 Evaluating and Testing Steganographic Systems 84
2.7 Summary 85
Chapter 3. Models of Watermarking 90
3.1 Notation 91
3.2 Communications 92
3.3 Communication-Based Models of Watermarking 96
3.4 Geometric Models of Watermarking 109
3.5 Modeling Watermark Detection by Correlation 124
3.6 Summary 131
Chapter 4. Basic Message Coding 134
4.1 Mapping Messages into Message Vectors 135
4.2 Error Correction Coding 146
4.3 Detecting Multisymbol Watermarks 153
4.4 Summary 163
Chapter 5. Watermarking with Side Information 166
5.1 Informed Embedding 168
5.2 Watermarking Using Side Information 182
5.3 Dirty-Paper Codes 193
5.4 Summary 210
Chapter 6. Practical Dirty-Paper Codes 212
6.1 Practical Considerations for Dirty-Paper Codes 212
6.2 Broad Approaches to Dirty-Paper Code Design 217
6.3 Implementing DM with A Simple Lattice Code 218
6.4 Typical Tricks in Implementing Lattice Codes 223
6.5 Coding with Better Lattices 226
6.6 Making Lattice Codes Survive Valumetric Scaling 233
6.7 Dirty-Paper Trellis Codes 237
6.8 Summary 241
Chapter 7. Analyzing Errors 242
7.1 Message Errors 243
7.2 False Positive Errors 247
7.3 False Negative Errors 254
7.4 ROC Curves 257
7.5 The Effect of Whitening on Error Rates 261
7.6 Analysis of Normalized Correlation 268
7.7 Summary 281
Chapter 8. Using Perceptual Models 284
8.1 Evaluating Perceptual Impact of Watermarks 284
8.2 General Form of A Perceptual Model 292
8.3 Two Examples of Perceptual Models 298
8.4 Perceptually Adaptive Watermarking 306
8.5 Summary 324
Chapter 9. Robust Watermarking 326
9.1 Approaches 327
9.2 Robustness to Valumetric Distortions 337
9.3 Robustness to Temporal and Geometric Distortions 354
9.4 Summary 361
Chapter 10. Watermark Security 364
10.1 Security Requirements 364
10.2 Watermark Security and Cryptography 377
10.3 Some Significant Known Attacks 387
10.4 Summary 402
Chapter 11. Content Authentication 404
11.1 Exact Authentication 406
11.2 Selective Authentication 424
11.3 Localization 439
11.4 Restoration 448
11.5 Summary 451
Chapter 12. Steganography 454
12.1 Steganographic Communication 456
12.2 Notation and Terminology 462
12.3 Information-Theoretic Foundations of Steganography 462
12.4 Practical Steganographic Methods 468
12.5 Minimizing the Embedding Impact 478
12.6 Summary 496
Chapter 13. Steganalysis 498
13.1 Steganalysis Scenarios 498
13.2 Some Significant Steganalysis Algorithms 506
13.3 Summary 523
Appendix A. Background Concepts 526
A.1 Information Theory 526
A.2 Coding Theory 532
A.3 Cryptography 534
Appendix B. Selected Theoretical Results 540
B.1 Information-Theoretic Analysis of Secure Watermarking (Moulin and O’Sullivan) 540
B.2 Error Probabilities Using Normalized Correlation Detectors (Miller and Bloom) 546
B.3 Effect of Quantization Noise on Watermarks (Eggers and Girod) 551
Appendix C. Notation and Common Variables 558
C.1 Variable Naming Conventions 558
C.2 Operators 559
C.3 Common Variable Names 559
C.4 Common Functions 561
Glossary 562
References 578
Index 604
About the Authors 620

Erscheint lt. Verlag 23.11.2007
Sprache englisch
Themenwelt Kunst / Musik / Theater Fotokunst
Sachbuch/Ratgeber Freizeit / Hobby Fotografieren / Filmen
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Mathematik / Informatik Informatik Web / Internet
ISBN-10 0-08-055580-2 / 0080555802
ISBN-13 978-0-08-055580-5 / 9780080555805
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90