Informed Watermarking

Author:   Joachim Eggers ,  Bernd Girod
Publisher:   Springer-Verlag New York Inc.
Edition:   2002 ed.
Volume:   685
ISBN:  

9781402070716


Pages:   182
Publication Date:   31 May 2002
Format:   Hardback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $311.52 Quantity:  
Add to Cart

Share |

Informed Watermarking


Add your own review!

Overview

Watermarking has become a mature discipline with a foundation in both signal processing and information theory. This book addresses watermarking problems in terms of second-generation insights. It provides a complete overview of the most important results on capacity and security. The Costa scheme, and in particular a simpler version of it, the Scalar Costa scheme, is studied in great detail. An important result of this book is that it is possible to approach the Shannon limit within a few decibels in a practical system. These results are verified on real-world data, not only the classical category of images, but also on chemical structure sets. The text aims to act as a tool for both academic and professional researchers working in the areas of multimedia security, information embedding, and communication. Theory and practice are linked, particularly in the area of multi-user communication. Inspired by the work of Moulin and O'Sullivan, it also addresses security aspects by studying AGWN attacks in terms of game theory.

Full Product Details

Author:   Joachim Eggers ,  Bernd Girod
Publisher:   Springer-Verlag New York Inc.
Imprint:   Springer-Verlag New York Inc.
Edition:   2002 ed.
Volume:   685
Dimensions:   Width: 15.50cm , Height: 1.20cm , Length: 23.50cm
Weight:   0.471kg
ISBN:  

9781402070716


ISBN 10:   1402070713
Pages:   182
Publication Date:   31 May 2002
Audience:   Professional and scholarly ,  General/trade ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

1. Introduction.- 2. General Concepts and State-of-the-Art.- 2.1 A General Model of Digital Watermarking.- 2.2 Restrictions and Simplifications.- 2.3 Stochastic Modeling of Digital Watermarking.- 2.4 Performance Evaluation of Digital Watermarking.- 2.5 Spread-Spectrum Watermarking.- 2.6 Exploiting Side Information at the Encoder.- 2.7 A Game-Theoretic Approach to Digital Watermarking.- 3. Information Embedding into IID Signals Facing an AWGN Attack.- 3.1 Scalar Costa Scheme.- 3.2 Theoretical Performance Analysis.- 3.3 High-Rate SCS Communication.- 3.4 Low-Rate SCS Communication.- 3.5 Inverse SCS.- 3.6 Detection of Information Embedded with SCS.- 3.7 Chapter Summary.- 4. Digital Watermarking: A Game between Embedder and Attacker.- 4.1 Watermarking of IID Signals.- 4.2 Watermarking of Non-IID Signals.- 4.3 Step Size and Offset Estimation for SCS.- 4.4 Chapter Summary.- 5. Applications.- 5.1 Watermarking of Chemical Structure Sets.- 5.2 Watermarking of digital images.- 5.3 Chapter Summary.- 6. Summary, Conclusions, and Outlook.- 6.1 Communication Exploiting Side Information.- 6.2 The Game Between Watermark Embedder and Attacker.- 6.3 Applications for Digital Watermarking.- 6.4 Future Research Topics.- Appendices.- A Properties of SCS Transmission.- A. 1 Dithered Quantization.- A.2 PDF of extracted SCS information after AWGN attacks.- A.3 Derivation Details for Inverse SCS Mapping.- A.4 SCS Watermarking Facing Scalar Quantization Attacks.- B Solution of the Watermarking Game for Sawn Attacks.- C Optimization of Attack Strategy for Fixed Embedding Strategy.- C. 1 Optimization in Case of ICS Watermarking.- C.2 Optimization in Case of SS Watermarking.- C.3 Optimization in Case of ST-SCS Watermarking.- D Optimization of the Embedding Strategy.- D. 1 Optimized Embedding and Attack for ICS Watermarking.- D.2 Optimized Embedding and Attack for SS Watermarking.- D.3 Optimized Embedding and Attack for ST-SCS Watermarking.- E Test Images and Additional Results.- E. 1 Original Images.- E.2 Additional Image Statistics.- E.3 ST-SCS Watermark Capacities for Image Data.- References.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List