Digital Watermarking and SteganographyDigital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession.
|
Contents
1 | |
15 | |
Chapter 3 Models of Watermarking | 61 |
Chapter 4 Basic Message Coding | 105 |
Chapter 5 Watermarking with Side Information | 137 |
Chapter 6 Practical DirtyPaper Codes | 183 |
Chapter 7 Analyzing Errors | 213 |
Chapter 8 Using Perceptual Models | 255 |
Chapter 12 Steganography | 425 |
Chapter 13 Steganalysis | 469 |
Appendix A Background Concepts | 497 |
Appendix B Selected Theoretical Results | 511 |
Appendix C Notation and Common Variables | 529 |
Glossary | 533 |
549 | |
575 | |
Chapter 9 Robust Watermarking | 297 |
Chapter 10 Watermark Security | 335 |
Chapter 11 Content Authentication | 375 |
About the Authors | 591 |
Other editions - View all
Common terms and phrases
adversary algorithm Alice and Bob applications attack audio authentication AWGN blind channel Chapter code words communications computed copy copy control coset cover cryptography D_LC DCT coefficients decoder decryption described detection region detection threshold detection values digital watermarking dirty-paper code discussed distortion distribution domain E8 lattice embed embedding algorithm embedding changes encoding encryption Equation error estimate example extracted false negative false positive probability fidelity Figure frequency function Gaussian histogram Information Hiding JPEG lattice linear correlation lossy compression low-pass filtering LSB embedding marking space matrix media space message length message mark method modified modulation noise normalized correlation obtain original payload perceptual distance perceptual model pixels problem quantization random reference marks reference pattern robustness scaling Section semi-fragile sender sequence signal signature spread spectrum statistical steganalysis steganographic steganographic schemes symbols trellis unauthorized unwatermarked vector warden watermark detector watermark embedding watermarking system