Cover image for Multimedia data hiding
Title:
Multimedia data hiding
Personal Author:
Publication Information:
New York : Springer Verlag, 2003
ISBN:
9780387954264
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010026284 QA76.575 W85 2003 Open Access Book Book
Searching...

On Order

Summary

Summary

The digital information revolution has brought about profound changes in our society and our life. New devices and powerful software have made it possible for consumers worldwide to create, manipulate, share, and enjoy the multimedia information. Internet and wireless networks offer ubiquitous channels to deliver and to exchange multimedia information for such pur­ poses as remote collaboration, distant learning, and entertainment. With all these advances in multimedia coding and communication technologies over the past decade, the major hurdle for allowing much broader access of multimedia assets and deployment of multimedia services no longer lies with bandwidth-related issues, but with how to make sure that content is used for its intended purpose by its intended recipients. The core issue then be­ comes the development of secure management of content usage and delivery across communication networks. Data hiding and digital watermarking are promising new technologies for multimedia information protection and rights management. Secondary data can be embedded imperceptibly in digital multimedia signals for a variety of applications, including ownership protection, authentication, access con­ trol, and annotation. Data hiding can also be used to send side information in multimedia communication for providing additional functionalities or for enhancing performance. The extraction of the embedded data mayor may not need knowledge of the original host media data. In addition to im­ perceptibility, robustness against moderate processing such as compression is also an important consideration.


Table of Contents

Prefacep. v
1 Introductionp. 1
1.1 Overview of Multimedia Data Hidingp. 2
1.2 Book Organizationp. 6
1.2.1 Fundamental Issues and Solutionsp. 6
1.2.2 Algorithm and System Designsp. 7
1.2.3 Attacks and Countermeasuresp. 10
I Fundamental Issuesp. 13
2 Preliminariesp. 15
2.1 Data Hiding Frameworkp. 15
2.2 Key Elements and A Layered Viewp. 16
3 Basic Embedding Mechanismsp. 19
3.1 Two Basic Embedding Mechanismsp. 21
3.1.1 Probability of Detection Errorsp. 24
3.2 Embedding Capacityp. 27
3.2.1 Capacity for Type-I Embeddingp. 28
3.2.2 Capacity of Type-II Embeddingp. 28
3.2.3 Capacity Comparison for Type-I & Type-IIp. 30
3.2.4 Extensions and Discussionsp. 32
3.3 Techniques for Embedding Multiple Bitsp. 34
3.3.1 Modulation and Multiplexing Techniquesp. 34
3.3.2 Comparisonp. 36
3.4 Chapter Summaryp. 39
3.5 Appendix - Derivations of Type-II Embedding Capacityp. 40
4 Handling Uneven Embedding Capacityp. 43
4.1 Quantitative Model for Uneven Embedding Capacityp. 45
4.2 Constant Embedding Rate (CER)p. 45
4.2.1 Backup Embeddingp. 47
4.2.2 Equalizing Embedding Capacity Via Shufflingp. 48
4.2.3 Practical Considerationsp. 52
4.2.4 Discussionsp. 53
4.3 Variable Embedding Rate (VER)p. 53
4.3.1 Conveying Additional Side Informationp. 54
4.4 Outline of Examplesp. 55
4.5 Chapter Summaryp. 55
4.6 Appendix - Generating Shuffling Table From A Keyp. 56
4.7 Appendix - Analysis of Shufflingp. 57
4.7.1 Joint Probability of Histogramp. 57
4.7.2 Mean and Variance of Each Binp. 58
4.7.3 More About E\left [ \frac{{m_r}}{{N}}\right]p. 60
4.7.4 Approximations for Hypergeometric Distributionp. 61
4.7.5 More About Var\left [ \frac{{m_r}}{{N}} \right]p. 64
II Algorithm and System Designsp. 65
5 Data Hiding in Binary Imagep. 67
5.1 Proposed Schemep. 69
5.1.1 Flippable Pixelsp. 69
5.1.2 Embedding Mechanismp. 71
5.1.3 Uneven Embedding Capacity and Shufflingp. 72
5.2 Applications and Experimental Resultsp. 76
5.2.1 ""Signature in Signature""p. 76
5.2.2 Invisible Annotation for Line Drawingsp. 76
5.2.3 Tamper Detection for Binary Documentp. 77
5.3 Robustness and Security Considerationsp. 78
5.3.1 Analysis and Enhancement of Robustnessp. 79
5.3.2 Security Considerationsp. 82
5.4 Chapter Summaryp. 85
5.5 Appendix - Details of Determining Flippability Scoresp. 86
5.6 Appendix - Recovering Images After Printing & Scanningp. 90
6 Multilevel Data Hiding for Image and Videop. 95
6.1 Multi-level Embeddingp. 96
6.2 Multi-level Image Data Hidingp. 98
6.2.1 Spectrum Partitionp. 99
6.2.2 System Designp. 102
6.2.3 Refined Human Visual Modelp. 105
6.2.4 Experimental Resultsp. 111
6.3 Multi-level Video Data Hidingp. 111
6.3.1 Embedding Domainp. 111
6.3.2 Variable vs. Constant Embedding Ratep. 114
6.3.3 User Data vs. Control Datap. 116
6.3.4 System Design and Experimental Resultsp. 117
6.4 Chapter Summaryp. 119
7 Data Hiding for Image Authenticationp. 123
7.1 Review of Prior Artp. 125
7.2 Framework for Authentication Watermarkp. 126
7.3 Transform-domain Table Lookup Embeddingp. 127
7.3.1 Considerations for Imperceptibility & Securityp. 129
7.3.2 Estimating Embedded Data and Changesp. 132
7.4 Design of Embedded Datap. 133
7.4.1 Visually Meaningful Patternp. 133
7.4.2 Content-based Featuresp. 133
7.5 Experimental Resultsp. 135
7.6 Extensionsp. 138
7.7 Chapter Summaryp. 140
8 Data Hiding for Video Communicationsp. 141
8.1 Transcoding by Downsizing Using Data Hidingp. 142
8.1.1 Overview of Proposed Approachp. 142
8.1.2 Embedding Subblock Motion Informationp. 143
8.1.3 Advantages of Data Hidingp. 144
8.1.4 Experimental Resultsp. 145
8.2 Error Concealment and Data Hidingp. 147
8.2.1 Related Worksp. 147
8.2.2 Proposed Techniquesp. 149
8.3 Chapter Summaryp. 150
III Attacks and Countermeasuresp. 151
9 Attacks on Known Data Hiding Algorithmsp. 153
9.1 Block Replacement Attack on Robust Watermarkp. 154
9.1.1 Existing Attacks on Robust Watermarksp. 155
9.1.2 Attack via Block Replacementp. 155
9.1.3 Analysis and Countermeasuresp. 157
9.2 Countermeasures Against Geometric Attacksp. 159
9.2.1 Basic Idea of RST Resilient Watermarkingp. 161
9.2.2 Embedding and Detection Algorithmsp. 162
9.2.3 Implementation Issuesp. 164
9.2.4 Experimental Resultsp. 168
9.2.5 Summaryp. 172
9.3 Double Capturing Attack on Authentication Watermarkp. 175
9.3.1 Proposed Attackp. 175
9.3.2 Countermeasures Against Proposed Attackp. 176
10 Attacks on Unknown Data Hiding Algorithmsp. 179
10.1 Introductionp. 179
10.1.1 SDMI Attack Setupp. 180
10.1.2 Comments on Attack Setupp. 181
10.2 Attacks and Analysis on SDMI Robust Watermarksp. 183
10.2.1 General Approaches to Attacksp. 183
10.2.2 Attacks on Watermark-Cp. 184
10.2.3 Attacks on Watermark A, B & Fp. 188
10.2.4 Remarksp. 191
10.3 Attacks and Analysis on SDMI Fragile Watermarksp. 192
11 Conclusions and Perspectivesp. 195
Referencesp. 197
Indexp. 215