Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010082473 | QA76.9.A25 B37 2004 | Open Access Book | Book | Searching... |
Searching... | 30000010134848 | QA76.9.A25 B37 2004 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
The rapid growth of the Internet has fueled the demand for enhanced watermarking and data hiding technologies and has stimulated research into new ways to implement watermarking systems in the real world. This book presents the fundamental principles of watermarking system design and discusses state-of-the-art technologies in information concealment and recovery. It highlights the requirements and challenges of applications in security, image/video indexing, hidden communications, image captioning, and transmission error recovery and concealment. It explains the foundations of digital watermarking technologies, and offers an understanding of new approaches and applications, and lays the groundwork for future developments in the field.
Author Notes
Franco Bartolini is Assistant Professor, Faculty of Engineering, University of Florence, Italy.
Table of Contents
Series introduction | p. iii |
Preface | p. v |
1 Introduction | p. 1 |
1.1 Elements of a watermarking system | p. 1 |
1.1.1 Information coding | p. 3 |
1.1.2 Embedding | p. 3 |
1.1.3 Concealment | p. 5 |
1.1.4 Watermark impairments | p. 6 |
1.1.5 Recovery of the hidden information | p. 6 |
1.2 Protocol considerations | p. 7 |
1.2.1 Capacity of watermarking techniques | p. 10 |
1.2.2 Multiple embedding | p. 11 |
1.2.3 Robustness | p. 12 |
1.2.4 Blind vs. non-blind recovery | p. 14 |
1.2.5 Private vs. public watermarking | p. 15 |
1.2.6 Readable vs. detectable watermarks | p. 15 |
1.2.7 Invertibility and quasi-invertibility | p. 16 |
1.2.8 Reversibility | p. 18 |
1.2.9 Asymmetric watermarking | p. 18 |
1.3 Audio vs image vs video assets | p. 19 |
1.4 Further reading | p. 20 |
2 Applications | p. 23 |
2.1 IPR protection | p. 24 |
2.1.1 Demonstration of rightful ownership | p. 24 |
2.1.2 Fingerprinting | p. 25 |
2.1.3 Copy control | p. 29 |
2.2 Authentication | p. 31 |
2.2.1 Cryptography vs watermarking | p. 31 |
2.2.2 A general authentication framework | p. 33 |
2.2.3 Requirements of data-hiding-based authentication | p. 36 |
2.3 Data hiding for multimedia transmission | p. 37 |
2.3.1 Data compression | p. 37 |
2.3.2 Error recovery | p. 38 |
2.4 Annotation watermarks | p. 40 |
2.4.1 Labelling for data retrieval | p. 41 |
2.4.2 Bridging the gap between analog and digital objects | p. 41 |
2.5 Covert communications | p. 42 |
2.6 Further reading | p. 43 |
3 Information coding | p. 45 |
3.1 Information coding in detectable watermarking | p. 47 |
3.1.1 Spread spectrum watermarking | p. 47 |
3.1.2 Orthogonal waveforms watermarking | p. 56 |
3.1.3 Orthogonal vs PN watermarking | p. 58 |
3.1.4 Self-synchronizing PN sequences | p. 62 |
3.1.5 Power spectrum shaping | p. 63 |
3.1.6 Chaotic sequences | p. 65 |
3.1.7 Direct embedding | p. 68 |
3.2 Waveform-based readable watermarking | p. 69 |
3.2.1 Information coding through M-ary signaling | p. 69 |
3.2.2 Position encoding | p. 71 |
3.2.3 Binary signaling | p. 72 |
3.3 Direct embedding readable watermarking | p. 75 |
3.3.1 Direct embedding binary signalling with bit repetition | p. 75 |
3.4 Channel coding | p. 76 |
3.4.1 Block codes | p. 77 |
3.4.2 Convolutional codes | p. 79 |
3.4.3 Coding vs bit repetition | p. 81 |
3.4.4 Channel coding vs orthogonal signaling | p. 83 |
3.4.5 Informed coding | p. 83 |
3.5 Further reading | p. 87 |
4 Data embedding | p. 91 |
4.1 Feature selection | p. 91 |
4.1.1 Watermarking in the asset domain | p. 92 |
4.1.2 Watermarking in a transformed domain | p. 96 |
4.1.3 Hybrid techniques | p. 102 |
4.1.4 Watermarking in the compressed domain | p. 110 |
4.1.5 Miscellaneous non-conventional choices of the feature set | p. 112 |
4.2 Blind embedding | p. 119 |
4.2.1 Additive watermarking | p. 119 |
4.2.2 Multiplicative watermarking | p. 126 |
4.3 Informed embedding | p. 129 |
4.3.1 Detectable watermarking | p. 135 |
4.3.2 Readable watermarking | p. 142 |
4.4 Further reading | p. 153 |
5 Data concealment | p. 155 |
5.1 The Human Visual System | p. 157 |
5.1.1 The Weber law and the contrast | p. 160 |
5.1.2 The contrast sensitivity function | p. 161 |
5.1.3 The masking effect | p. 167 |
5.1.4 Mapping luminance to images | p. 170 |
5.1.5 Perception of color stimuli | p. 173 |
5.1.6 Perception of time-varying stimuli | p. 184 |
5.2 The Human Auditory System (HAS) | p. 187 |
5.2.1 The masking effect | p. 188 |
5.3 Concealment through feature selection | p. 190 |
5.4 Concealment through signal adaptation | p. 192 |
5.4.1 Concealment through perceptual masks | p. 192 |
5.4.2 Concealment relying on visibility thresholds | p. 198 |
5.4.3 Heuristic approaches for still images | p. 201 |
5.4.4 A theoretically funded perceptual threshold for still images | p. 205 |
5.4.5 MPEG-based concealment for audio | p. 209 |
5.5 Application oriented concealment | p. 211 |
5.5.1 Video surveillance systems | p. 212 |
5.5.2 Remote sensing images | p. 214 |
5.6 Further reading | p. 215 |
6 Data recovery | p. 219 |
6.1 Watermark detection | p. 220 |
6.1.1 A hypothesis testing problem | p. 221 |
6.1.2 AWGN channel | p. 225 |
6.1.3 Additive / Generalized Gaussian channel | p. 238 |
6.1.4 Signal dependent noise with host rejection at the embedder | p. 242 |
6.1.5 Taking perceptual masking into account | p. 248 |
6.1.6 Multiplicative Gaussian channel | p. 248 |
6.1.7 Multiplicative Weibull channel | p. 259 |
6.1.8 Multichannel detection | p. 271 |
6.2 Decoding | p. 272 |
6.2.1 General problem for binary signalling | p. 273 |
6.2.2 Binary signaling through AWGN channel | p. 275 |
6.2.3 Generalized Gaussian channel | p. 279 |
6.2.4 Multiplicative watermarking with Gaussian noise | p. 280 |
6.2.5 Multiplicative watermarking of Weibull-distributed features | p. 285 |
6.2.6 Quantization Index Modulation | p. 288 |
6.2.7 Decoding in the presence of channel coding | p. 296 |
6.2.8 Assessment of watermark presence | p. 299 |
6.3 Further reading | p. 304 |
7 Watermark impairments and benchmarking | p. 307 |
7.1 Classification of attacks | p. 308 |
7.2 Measuring obtrusiveness and attack strength | p. 310 |
7.3 Gaussian noise addition | p. 312 |
7.3.1 Additive vs multiplicative watermarking | p. 312 |
7.3.2 Spread Spectrum vs QIM watermarking | p. 317 |
7.4 Conventional signal processing | p. 325 |
7.4.1 The gain attack | p. 326 |
7.4.2 Histogram equalization | p. 329 |
7.4.3 Filtering | p. 331 |
7.5 Lossy coding | p. 334 |
7.5.1 Quantization of the watermarked features | p. 337 |
7.6 Geometric manipulations | p. 344 |
7.6.1 Asset translation | p. 345 |
7.6.2 Asset zooming | p. 348 |
7.6.3 Image rotation | p. 350 |
7.6.4 More complex geometric transformations | p. 353 |
7.6.5 Countermeasures against geometric manipulations | p. 354 |
7.7 Editing | p. 362 |
7.8 Digital to analog and analog to digital conversion | p. 364 |
7.9 Malicious attacks | p. 365 |
7.10 Attack estimation | p. 371 |
7.11 Benchmarking | p. 371 |
7.11.1 Early benchmarking systems | p. 372 |
7.11.2 StirMark | p. 374 |
7.11.3 Improving conventional systems | p. 378 |
7.11.4 A new benchmarking structure | p. 381 |
7.12 Further reading | p. 382 |
8 Security issues | p. 385 |
8.1 Security by obscurity | p. 388 |
8.2 The symmetric case | p. 389 |
8.3 The asymmetric case | p. 394 |
8.4 Playing open cards | p. 401 |
8.5 Security based on protocol design | p. 404 |
8.6 Further reading | p. 406 |
9 An information theoretic perspective | p. 409 |
9.1 Some historical notes | p. 411 |
9.2 The watermarking game | p. 412 |
9.2.1 The rules of the game | p. 413 |
9.2.2 Some selected results | p. 416 |
9.2.3 Capacity under average distortion constraints | p. 420 |
9.3 The additive attack watermarking game | p. 421 |
9.3.1 Game definition and main results | p. 421 |
9.3.2 Costa's writing on dirty paper | p. 424 |
9.4 Lattice-based capacity-achieving watermarking | p. 427 |
9.5 Equi-energetic structured code-books | p. 432 |
9.6 Further reading | p. 433 |
Bibliography | p. 435 |
Index | p. 457 |