skip to content
Informed Watermarking Preview this item
ClosePreview this item
Checking...

Informed Watermarking

Author: Joachim Eggers; Bernd Girod
Publisher: Boston, MA : Springer US, 2002.
Series: International series in engineering and computer science, 685.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Database:WorldCat
Summary:
With a preface by Ton Kalker. Informed Watermarking is an essential tool for both academic and professional researchers working in the areas of multimedia security, information embedding, and communication. Theory and practice are linked, particularly in the area of multi-user communication. From the Preface: Watermarking has become a more mature discipline with proper foundation in both signal processing and  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Joachim Eggers; Bernd Girod
ISBN: 9781461509516 1461509513
OCLC Number: 852788421
Description: 1 online resource (xxii, 182 pages).
Contents: 1. Introduction --
2. General Concepts and State-of-the-Art --
2.1 A General Model of Digital Watermarking --
2.2 Restrictions and Simplifications --
2.3 Stochastic Modeling of Digital Watermarking --
2.4 Performance Evaluation of Digital Watermarking --
2.5 Spread-Spectrum Watermarking --
2.6 Exploiting Side Information at the Encoder --
2.7 A Game-Theoretic Approach to Digital Watermarking --
3. Information Embedding into IID Signals Facing an AWGN Attack --
3.1 Scalar Costa Scheme --
3.2 Theoretical Performance Analysis --
3.3 High-Rate SCS Communication --
3.4 Low-Rate SCS Communication --
3.5 Inverse SCS --
3.6 Detection of Information Embedded with SCS --
3.7 Chapter Summary --
4. Digital Watermarking: A Game between Embedder and Attacker --
4.1 Watermarking of IID Signals --
4.2 Watermarking of Non-IID Signals --
4.3 Step Size and Offset Estimation for SCS --
4.4 Chapter Summary --
5. Applications --
5.1 Watermarking of Chemical Structure Sets --
5.2 Watermarking of digital images --
5.3 Chapter Summary --
6. Summary, Conclusions, and Outlook --
6.1 Communication Exploiting Side Information --
6.2 The Game Between Watermark Embedder and Attacker --
6.3 Applications for Digital Watermarking --
6.4 Future Research Topics --
Appendices --
A Properties of SCS Transmission --
A. 1 Dithered Quantization --
A.2 PDF of extracted SCS information after AWGN attacks --
A.3 Derivation Details for Inverse SCS Mapping --
A.4 SCS Watermarking Facing Scalar Quantization Attacks --
B Solution of the Watermarking Game for Sawn Attacks --
C Optimization of Attack Strategy for Fixed Embedding Strategy --
C. 1 Optimization in Case of ICS Watermarking --
C.2 Optimization in Case of SS Watermarking --
C.3 Optimization in Case of ST-SCS Watermarking --
D Optimization of the Embedding Strategy --
D. 1 Optimized Embedding and Attack for ICS Watermarking --
D.2 Optimized Embedding and Attack for SS Watermarking --
D.3 Optimized Embedding and Attack for ST-SCS Watermarking --
E Test Images and Additional Results --
E. 1 Original Images --
E.2 Additional Image Statistics --
E.3 ST-SCS Watermark Capacities for Image Data --
References.
Series Title: International series in engineering and computer science, 685.
Responsibility: by Joachim Eggers, Bernd Girod.

Abstract:

With a preface by Ton Kalker. Informed Watermarking is an essential tool for both academic and professional researchers working in the areas of multimedia security, information embedding, and communication. Theory and practice are linked, particularly in the area of multi-user communication. From the Preface: Watermarking has become a more mature discipline with proper foundation in both signal processing and information theory. We can truly say that we are in the era of "second generation" watermarking. This book is first in addressing watermarking problems in terms of second-generation insights. It provides a complete overview of the most important results on capacity and security. The Costa scheme, and in particular a simpler version of it, the Scalar Costa scheme, is studied in great detail. An important result of this book is that it is possible to approach the Shannon limit within a few decibels in a practical system. These results are verified on real-world data, not only the classical category of images, but also on chemical structure sets. Inspired by the work of Moulin and O'Sullivan, this book also addresses security aspects by studying AGWN attacks in terms of game theory. "The authors of Informed Watermarking give a well-written exposé of how watermarking came of age, where we are now, and what to expect in the future. It is my expectation that this book will be a standard reference on second-generation watermarking for the years to come." Ton Kalker, Technische Universiteit Eindhoven.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/852788421> # Informed Watermarking
    a schema:MediaObject, schema:Book, schema:CreativeWork ;
    library:oclcnum "852788421" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mau> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1043344#Place/boston_ma> ; # Boston, MA
    schema:about <http://id.worldcat.org/fast/872687> ; # Computer vision
    schema:about <http://dewey.info/class/006.6/e23/> ;
    schema:about <http://id.worldcat.org/fast/872451> ; # Computer science
    schema:about <http://id.worldcat.org/fast/872078> ; # Computer engineering
    schema:about <http://id.worldcat.org/fast/1028920> ; # Multimedia systems
    schema:about <http://dewey.info/class/006.37/e23/> ;
    schema:bookFormat schema:EBook ;
    schema:contributor <http://experiment.worldcat.org/entity/work/data/1043344#Person/girod_bernd> ; # Bernd Girod
    schema:creator <http://experiment.worldcat.org/entity/work/data/1043344#Person/eggers_joachim> ; # Joachim Eggers
    schema:datePublished "2002" ;
    schema:description "With a preface by Ton Kalker. Informed Watermarking is an essential tool for both academic and professional researchers working in the areas of multimedia security, information embedding, and communication. Theory and practice are linked, particularly in the area of multi-user communication. From the Preface: Watermarking has become a more mature discipline with proper foundation in both signal processing and information theory. We can truly say that we are in the era of "second generation" watermarking. This book is first in addressing watermarking problems in terms of second-generation insights. It provides a complete overview of the most important results on capacity and security. The Costa scheme, and in particular a simpler version of it, the Scalar Costa scheme, is studied in great detail. An important result of this book is that it is possible to approach the Shannon limit within a few decibels in a practical system. These results are verified on real-world data, not only the classical category of images, but also on chemical structure sets. Inspired by the work of Moulin and O'Sullivan, this book also addresses security aspects by studying AGWN attacks in terms of game theory. "The authors of Informed Watermarking give a well-written exposé of how watermarking came of age, where we are now, and what to expect in the future. It is my expectation that this book will be a standard reference on second-generation watermarking for the years to come." Ton Kalker, Technische Universiteit Eindhoven."@en ;
    schema:description "1. Introduction -- 2. General Concepts and State-of-the-Art -- 2.1 A General Model of Digital Watermarking -- 2.2 Restrictions and Simplifications -- 2.3 Stochastic Modeling of Digital Watermarking -- 2.4 Performance Evaluation of Digital Watermarking -- 2.5 Spread-Spectrum Watermarking -- 2.6 Exploiting Side Information at the Encoder -- 2.7 A Game-Theoretic Approach to Digital Watermarking -- 3. Information Embedding into IID Signals Facing an AWGN Attack -- 3.1 Scalar Costa Scheme -- 3.2 Theoretical Performance Analysis -- 3.3 High-Rate SCS Communication -- 3.4 Low-Rate SCS Communication -- 3.5 Inverse SCS -- 3.6 Detection of Information Embedded with SCS -- 3.7 Chapter Summary -- 4. Digital Watermarking: A Game between Embedder and Attacker -- 4.1 Watermarking of IID Signals -- 4.2 Watermarking of Non-IID Signals -- 4.3 Step Size and Offset Estimation for SCS -- 4.4 Chapter Summary -- 5. Applications -- 5.1 Watermarking of Chemical Structure Sets -- 5.2 Watermarking of digital images -- 5.3 Chapter Summary -- 6. Summary, Conclusions, and Outlook -- 6.1 Communication Exploiting Side Information -- 6.2 The Game Between Watermark Embedder and Attacker -- 6.3 Applications for Digital Watermarking -- 6.4 Future Research Topics -- Appendices -- A Properties of SCS Transmission -- A. 1 Dithered Quantization -- A.2 PDF of extracted SCS information after AWGN attacks -- A.3 Derivation Details for Inverse SCS Mapping -- A.4 SCS Watermarking Facing Scalar Quantization Attacks -- B Solution of the Watermarking Game for Sawn Attacks -- C Optimization of Attack Strategy for Fixed Embedding Strategy -- C. 1 Optimization in Case of ICS Watermarking -- C.2 Optimization in Case of SS Watermarking -- C.3 Optimization in Case of ST-SCS Watermarking -- D Optimization of the Embedding Strategy -- D. 1 Optimized Embedding and Attack for ICS Watermarking -- D.2 Optimized Embedding and Attack for SS Watermarking -- D.3 Optimized Embedding and Attack for ST-SCS Watermarking -- E Test Images and Additional Results -- E. 1 Original Images -- E.2 Additional Image Statistics -- E.3 ST-SCS Watermark Capacities for Image Data -- References."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1043344> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1043344#Series/international_series_in_engineering_and_computer_science> ; # International series in engineering and computer science ;
    schema:isPartOf <http://worldcat.org/issn/0893-3405> ; # The Springer International Series in Engineering and Computer Science,
    schema:isSimilarTo <http://worldcat.org/entity/work/data/1043344#CreativeWork/> ;
    schema:name "Informed Watermarking"@en ;
    schema:productID "852788421" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/852788421#PublicationEvent/boston_ma_springer_us_2002> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/1043344#Agent/springer_us> ; # Springer US
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=3079737> ;
    schema:url <http://dx.doi.org/10.1007/978-1-4615-0951-6> ;
    schema:workExample <http://worldcat.org/isbn/9781461509516> ;
    schema:workExample <http://dx.doi.org/10.1007/978-1-4615-0951-6> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/852788421> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1043344#Agent/springer_us> # Springer US
    a bgn:Agent ;
    schema:name "Springer US" ;
    .

<http://experiment.worldcat.org/entity/work/data/1043344#Person/eggers_joachim> # Joachim Eggers
    a schema:Person ;
    schema:familyName "Eggers" ;
    schema:givenName "Joachim" ;
    schema:name "Joachim Eggers" ;
    .

<http://experiment.worldcat.org/entity/work/data/1043344#Person/girod_bernd> # Bernd Girod
    a schema:Person ;
    schema:familyName "Girod" ;
    schema:givenName "Bernd" ;
    schema:name "Bernd Girod" ;
    .

<http://experiment.worldcat.org/entity/work/data/1043344#Series/international_series_in_engineering_and_computer_science> # International series in engineering and computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/852788421> ; # Informed Watermarking
    schema:name "International series in engineering and computer science ;" ;
    .

<http://id.worldcat.org/fast/1028920> # Multimedia systems
    a schema:Intangible ;
    schema:name "Multimedia systems"@en ;
    .

<http://id.worldcat.org/fast/872078> # Computer engineering
    a schema:Intangible ;
    schema:name "Computer engineering"@en ;
    .

<http://id.worldcat.org/fast/872451> # Computer science
    a schema:Intangible ;
    schema:name "Computer science"@en ;
    .

<http://id.worldcat.org/fast/872687> # Computer vision
    a schema:Intangible ;
    schema:name "Computer vision"@en ;
    .

<http://worldcat.org/isbn/9781461509516>
    a schema:ProductModel ;
    schema:isbn "1461509513" ;
    schema:isbn "9781461509516" ;
    .

<http://worldcat.org/issn/0893-3405> # The Springer International Series in Engineering and Computer Science,
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/852788421> ; # Informed Watermarking
    schema:issn "0893-3405" ;
    schema:name "The Springer International Series in Engineering and Computer Science," ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.