Informed Watermarking
Başlık:
Informed Watermarking
ISBN:
9781461509516
Personal Author:
Edition:
1st ed. 2002.
Yayın Bilgileri:
New York, NY : Springer US : Imprint: Springer, 2002.
Fiziksel Tanımlama:
XXII, 182 p. online resource.
Series:
The Springer International Series in Engineering and Computer Science ; 685
Contents:
1. Introduction -- 2. General Concepts and State-of-the-Art -- 2.1 A General Model of Digital Watermarking -- 2.2 Restrictions and Simplifications -- 2.3 Stochastic Modeling of Digital Watermarking -- 2.4 Performance Evaluation of Digital Watermarking -- 2.5 Spread-Spectrum Watermarking -- 2.6 Exploiting Side Information at the Encoder -- 2.7 A Game-Theoretic Approach to Digital Watermarking -- 3. Information Embedding into IID Signals Facing an AWGN Attack -- 3.1 Scalar Costa Scheme -- 3.2 Theoretical Performance Analysis -- 3.3 High-Rate SCS Communication -- 3.4 Low-Rate SCS Communication -- 3.5 Inverse SCS -- 3.6 Detection of Information Embedded with SCS -- 3.7 Chapter Summary -- 4. Digital Watermarking: A Game between Embedder and Attacker -- 4.1 Watermarking of IID Signals -- 4.2 Watermarking of Non-IID Signals -- 4.3 Step Size and Offset Estimation for SCS -- 4.4 Chapter Summary -- 5. Applications -- 5.1 Watermarking of Chemical Structure Sets -- 5.2 Watermarking of digital images -- 5.3 Chapter Summary -- 6. Summary, Conclusions, and Outlook -- 6.1 Communication Exploiting Side Information -- 6.2 The Game Between Watermark Embedder and Attacker -- 6.3 Applications for Digital Watermarking -- 6.4 Future Research Topics -- Appendices -- A Properties of SCS Transmission -- A. 1 Dithered Quantization -- A.2 PDF of extracted SCS information after AWGN attacks -- A.3 Derivation Details for Inverse SCS Mapping -- A.4 SCS Watermarking Facing Scalar Quantization Attacks -- B Solution of the Watermarking Game for Sawn Attacks -- C Optimization of Attack Strategy for Fixed Embedding Strategy -- C. 1 Optimization in Case of ICS Watermarking -- C.2 Optimization in Case of SS Watermarking -- C.3 Optimization in Case of ST-SCS Watermarking -- D Optimization of the Embedding Strategy -- D. 1 Optimized Embedding and Attack for ICS Watermarking -- D.2 Optimized Embedding and Attack for SS Watermarking -- D.3 Optimized Embedding and Attack for ST-SCS Watermarking -- E Test Images and Additional Results -- E. 1 Original Images -- E.2 Additional Image Statistics -- E.3 ST-SCS Watermark Capacities for Image Data -- References.
Abstract:
This book deals with digital watermarking, which is defined by the authors of this book as the art of hiding auxiliary information in digital data in a secure, robust and imperceptible fashion. Digital watermarking as a topic has a long history, but before 1995 publications in scientific literature were almost absent. From 1995 onwards however the number of publications on watermarking has been steadily increasing. Today a number of workshops and conferences on this topic exist; also a number of scientific journals on watermarking have been published. This renewed scientific interest in digital watermarking has led very quickly to industrial interest, as well. In 1996 the Copy Protection Technical Working Group, a voluntary consortium consisting of the movie industry, the IT industry and the consumer electronics industry, issued a call for watermarking technologies for the purpose of copy protection of DVD-Video. A few years later the Secure Digital Music Initiative issued a similar call, in this case focusing on copy protection of digital music. These two efforts have been only partially successful: copy protection based on digital watermarking is not (yet) implemented on a large scale in any type of consumer device. This current "failure" of watermarking, to live up to its expectations, finds its cause in a large number of reasons, ranging from legal considerations and system aspects to the relative immaturity of watermarking as a technology.
Added Author:
Ek Kurum Yazarı:
Elektronik Erişim:
Full Text Available From Springer Nature Engineering Archive Packages
Dil:
English