Informed Watermarking

Author:   Joachim Eggers ,  Bernd Girod
Publisher:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of the original 1st ed. 2002
Volume:   685
ISBN:  

9781461353201


Pages:   182
Publication Date:   31 October 2012
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $290.37 Quantity:  
Add to Cart

Share |

Informed Watermarking


Add your own review!

Overview

"This book deals with digital watermarking, which is defined by the authors of this book as the art of hiding auxiliary information in digital data in a secure, robust and imperceptible fashion. Digital watermarking as a topic has a long history, but before 1995 publications in scientific literature were almost absent. From 1995 onwards however the number of publications on watermarking has been steadily increasing. Today a number of workshops and conferences on this topic exist; also a number of scientific journals on watermarking have been published. This renewed scientific interest in digital watermarking has led very quickly to industrial interest, as well. In 1996 the Copy Protection Technical Working Group, a voluntary consortium consisting of the movie industry, the IT industry and the consumer electronics industry, issued a call for watermarking technologies for the purpose of copy protection of DVD-Video. A few years later the Secure Digital Music Initiative issued a similar call, in this case focusing on copy protection of digital music. These two efforts have been only partially successful: copy protection based on digital watermarking is not (yet) implemented on a large scale in any type of consumer device. This current ""failure"" of watermarking, to live up to its expectations, finds its cause in a large number of reasons, ranging from legal considerations and system aspects to the relative immaturity of watermarking as a technology."

Full Product Details

Author:   Joachim Eggers ,  Bernd Girod
Publisher:   Springer-Verlag New York Inc.
Imprint:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of the original 1st ed. 2002
Volume:   685
Dimensions:   Width: 15.50cm , Height: 1.10cm , Length: 23.50cm
Weight:   0.326kg
ISBN:  

9781461353201


ISBN 10:   1461353203
Pages:   182
Publication Date:   31 October 2012
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

1. Introduction.- 2. General Concepts and State-of-the-Art.- 2.1 A General Model of Digital Watermarking.- 2.2 Restrictions and Simplifications.- 2.3 Stochastic Modeling of Digital Watermarking.- 2.4 Performance Evaluation of Digital Watermarking.- 2.5 Spread-Spectrum Watermarking.- 2.6 Exploiting Side Information at the Encoder.- 2.7 A Game-Theoretic Approach to Digital Watermarking.- 3. Information Embedding into IID Signals Facing an AWGN Attack.- 3.1 Scalar Costa Scheme.- 3.2 Theoretical Performance Analysis.- 3.3 High-Rate SCS Communication.- 3.4 Low-Rate SCS Communication.- 3.5 Inverse SCS.- 3.6 Detection of Information Embedded with SCS.- 3.7 Chapter Summary.- 4. Digital Watermarking: A Game between Embedder and Attacker.- 4.1 Watermarking of IID Signals.- 4.2 Watermarking of Non-IID Signals.- 4.3 Step Size and Offset Estimation for SCS.- 4.4 Chapter Summary.- 5. Applications.- 5.1 Watermarking of Chemical Structure Sets.- 5.2 Watermarking of digital images.- 5.3 Chapter Summary.- 6. Summary, Conclusions, and Outlook.- 6.1 Communication Exploiting Side Information.- 6.2 The Game Between Watermark Embedder and Attacker.- 6.3 Applications for Digital Watermarking.- 6.4 Future Research Topics.- Appendices.- A Properties of SCS Transmission.- A. 1 Dithered Quantization.- A.2 PDF of extracted SCS information after AWGN attacks.- A.3 Derivation Details for Inverse SCS Mapping.- A.4 SCS Watermarking Facing Scalar Quantization Attacks.- B Solution of the Watermarking Game for Sawn Attacks.- C Optimization of Attack Strategy for Fixed Embedding Strategy.- C. 1 Optimization in Case of ICS Watermarking.- C.2 Optimization in Case of SS Watermarking.- C.3 Optimization in Case of ST-SCS Watermarking.- D Optimization of the Embedding Strategy.- D. 1 Optimized Embedding and Attack for ICS Watermarking.- D.2 Optimized Embedding and Attack for SS Watermarking.- D.3 Optimized Embedding and Attack for ST-SCS Watermarking.- E Test Images and Additional Results.- E. 1 Original Images.- E.2 Additional Image Statistics.- E.3 ST-SCS Watermark Capacities for Image Data.- References.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

ls

Shopping Cart
Your cart is empty
Shopping cart
Mailing List