Shih | Digital Watermarking and Steganography | E-Book | sack.de
E-Book

E-Book, Englisch, 292 Seiten

Shih Digital Watermarking and Steganography

Fundamentals and Techniques, Second Edition
2. Auflage 2017
ISBN: 978-1-4987-3877-4
Verlag: CRC Press
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

Fundamentals and Techniques, Second Edition

E-Book, Englisch, 292 Seiten

ISBN: 978-1-4987-3877-4
Verlag: CRC Press
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



This book intends to provide a comprehensive overview on different aspects of mechanisms and techniques for information security. It is written for students, researchers, and professionals studying in the field of multimedia security and steganography. Multimedia security and steganography is especially relevant due to the global scale of digital multimedia and the rapid growth of the Internet. Digital watermarking technology can be used to guarantee authenticity and can be applied as proof that the content has not been altered since insertion. Updated techniques and advances in watermarking are explored in this new edition. The combinational spatial and frequency domains watermarking technique provides a new concept of enlarging the embedding capacity of watermarks. The genetic algorithm (GA) based watermarking technique solves the rounding error problem and provide an efficient embedding approach. Each chapter provides the reader with a fundamental, theoretical framework, while developing the extensive advanced techniques and considering the essential principles of the digital watermarking and steganographic systems. Several robust algorithms that are presented throughout illustrate the framework and provide assistance and tools in understanding and implementing the fundamental principles.

Shih Digital Watermarking and Steganography jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


Chapter One: Introduction

1.1 Digital Watermarking

1.2 Digital Steganography

1.3 Differences between Watermarking and Steganography

1.4 A Brief History

References

Appendix: Selected List of Books on Watermarking and Steganography

Chapter Two: Classification in Digital Watermarking

2.1 Classification based on Characteristics

2.2 Classification based on Applications

References

Chapter Three: Mathematical Preliminaries

3.1 Least Significant Bit (LSB) Substitution

3.2 Discrete Fourier Transform (DFT)

3.3 Discrete Cosine Transform (DCT)

3.4 Discrete Wavelet Transform (DWT)

3.5 Random Sequence Generation

3.6 Chaotic Map

3.7 Error Correction Code

3.8 Set Partitioning in Hierarchical Tree (SPIHT)

References

Chapter Four: Digital Watermarking Fundamentals

4.1 Spatial Domain Watermarking

4.2 Frequency Domain Watermarking

4.3 Fragile Watermark

4.4 Robust Watermark

References

Chapter Five: Watermarking Attacks and Tools

5.1 Image Processing Attacks

5.2 Geometric Attack

5.3 Cryptographic Attack

5.4 Protocol Attack

5.5 Watermarking Tools

5.6 An Efficient Block-based Fragile Watermarking System for Tamper Localization and Recovery

References

Chapter Six: Combinational Domain Digital Watermarking

6.1 Overview of Combinational Watermarking

6.2 Watermarking in the Spatial Domain

6.3 The Watermarking in the Frequency Domain

6.4 Experimental Results

6.5 Further Encryption of Combinational Watermarking

References

Chapter Seven: Watermarking Based on Genetic Algorithm

7.1 Introduction to the Genetic Algorithm

7.2 Concept of GA-Based Watermarking

7.3 GA-based Rounding Error Correction Watermarking

7.4 An Application to Medical Image Watermarking

7.5 Authentication of JPEG Images based on Genetic Algorithms

References

Chapter Eight: Adjusted-Purpose Digital Watermarking

8.1 An Adjusted-Purpose Digital Watermarking Technique

8.2 An Adjusted-Purpose Watermarking Technique by Particle Swarm Optimization

References

Chapter Nine: High Capacity Watermarking

9.1 Robust High Capacity Digital Watermarking

9.2 High-Capacity Multiple Regions of Interest Watermarking for Medical Images

References

Chapter Ten: Reversible Watermarking

10.1 A Reversible Image Authentication Scheme based on Chaotic Fragile Watermark

10.2 Reversible Data Hiding Techniques Using Multiple Scanning Difference Value Histogram Modification

References

Chapter Eleven: Steganography and Steganalysis

11.1 Steganography

11.2 Steganalysis

References

Chapter Twelve: Steganography Based on Genetic Algorithm and Differential Evolution

12.1 Steganography Based on GA

12.2 Steganography Based on DE

References


Frank Y. Shih received the B.S. degree from National Cheng-Kung University, Taiwan, in 1980, the M.S. degree from the State University of New York at Stony Brook, in 1984, and the Ph.D. degree from Purdue University, West Lafayette, Indiana, in 1987, all in Electrical and Computer Engineering. He served as departmental acting chair, associate chair, director, principal investigator, journal editor, and conference chair. Currently, he is a professor jointly appointed in the Department of Computer Science, the Department of Electrical and Computer Engineering, and the Department of Biomedical Engineering at New Jersey Institute of Technology, Newark, NJ. Dr. Shih also serves as the Director of Computer Vision Laboratory. He held a visiting professor position at Princeton University, Columbia University, National Taiwan University, National Institute of Informatics, Tokyo, and Conservatoire National Des Arts Et Metiers, Paris.

Dr. Shih is a well-known scholar internationally, and he serves as the Editor-in-Chief for the Inter. Journal of Multimedia Intelligence and Security. In addition, he is on the Editorial Board of the International Journal of Pattern Recognition, the International Journal of Pattern Recognition Letters, the International Journal of Pattern Recognition and Artificial Intelligence, the International Journal of Recent Patents on Engineering, the International Journal of Recent Patents on Computer Science, the International Journal of Internet Protocol Technology, and the Journal of Internet Technology. He served as a steering member, committee member, and session chair for numerous professional conferences and workshops. Dr. Shih has received numerous grants from the National Science Foundation, Navy and Air Force, and Industry. He was the recipient of Research Initiation Award of NSF and Board of Overseers Excellence in Research Award of NJIT.

Furthermore, Dr. Shih has authored three books: "Digital Watermarking and Steganography", "Image Processing and Mathematical Morphology", and "Image Processing and Pattern Recognition." He also edited one book: "Multimedia Security: Watermarking, Steganography, and Forensics." He has published 122 journal papers, 96 conference papers, and 22 book chapters. His current research interests include image processing, computer vision, watermarking and steganography, digital forensics, sensor networks, pattern recognition, bioinformatics, information security, robotics, fuzzy logic, and neural networks.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.