E-Book, Englisch, 200 Seiten
Shih Digital Watermarking and Steganography
Erscheinungsjahr 2012
ISBN: 978-1-4200-4758-5
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Fundamentals and Techniques
E-Book, Englisch, 200 Seiten
ISBN: 978-1-4200-4758-5
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Every day millions of people capture, store, transmit, and manipulate digital data. Unfortunately free access digital multimedia communication also provides virtually unprecedented opportunities to pirate copyrighted material. Providing the theoretical background needed to develop and implement advanced techniques and algorithms, Digital Watermarking and Steganography:
- Demonstrates how to develop and implement methods to guarantee the authenticity of digital media
- Explains the categorization of digital watermarking techniques based on characteristics as well as applications
- Presents cutting-edge techniques such as the GA-based breaking algorithm on the frequency-domain steganalytic system
The popularity of digital media continues to soar. The theoretical foundation presented within this valuable reference will facilitate the creation on new techniques and algorithms to combat present and potential threats against information security.
Zielgruppe
Students, researchers, and professionals in signal processing, image processing, information security, document processing, and multimedia systems
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Introduction
Digital Watermarking
Digital Steganography
Differences between Watermarking and Steganography
A Brief History
Appendix: Selected List of Books on Watermarking and Steganography
Classification in Digital Watermarking
Classification Based on Characteristics
Classification Based on Applications
Mathematical Preliminaries
Least-Significant-Bit Substitution
Discrete Fourier Transform (DFT)
Discrete Cosine Transform
Discrete Wavelet Transform
Random Sequence Generation
The Chaotic Map
Error Correction Code
Set Partitioning in Hierarchical Tree
Digital Watermarking Fundamentals
Spatial-Domain Watermarking
Frequency-Domain Watermarking
The Fragile Watermark
The Robust Watermark
Watermarking Attacks and Tools
Image Processing Attacks
Geometric Transformation
Cryptographic Attack
Protocol Attacks
Watermarking Tools
Combinational Digital Watermarking in the Spatial
and Frequency Domains
An Overview of Combinational Watermarking
Watermarking in the Spatial Domain
Watermarking in the Frequency Domain
Experimental Results
Further Encryption of Combinational Watermarking
Genetic Algorithm-Based Digital Watermarking
Introduction to the Genetic Algorithm
The Concept of Genetic Algorithm-Based Watermarking
Genetic Algorithm-Based Rounding-Error Correction Watermarking
An Application for Medical Image Watermarking
Adjusted-Purpose Digital Watermarking
An Overview of Adjusted-Purpose Digital Watermarking
The Morphological Approach for Extracting Pixel-Based Features
The Strategies for Adjusting the Varying-Sized Transform
Window and Quality Factor
Experimental Results
The Collecting Approach for Generating the VSTW
Robust High-Capacity Digital Watermarking
The Weakness of Current Robust Watermarking
The Concept of Robust Watermarking
Enlargement of Significant Coefficients
The Determination of Embedding Locations
The RHC Watermarking Algorithm
Experimental Results
Introduction to Digital Steganography
Types of Steganography
Applications of Steganography
Embedding Security and Imperceptibility
Examples of Steganographic Software
Steganalysis
An Overview
The Statistical Properties of Images
The Visual Steganalytic System
IQM-Based Steganalytic System
Learning Strategies
The Frequency-Domain Steganalytic System
Genetic Algorithm-Based Steganography
An Overview of the GA-Based Breaking Methodology
The GA-Based Breaking Algorithm on the FDSS
Experimental Results
Complexity Analysis
Index