skip to content
Digital watermarking and steganography : fundamentals and techniques Preview this item
ClosePreview this item
Checking...

Digital watermarking and steganography : fundamentals and techniques

Author: Frank Y Shih
Publisher: Boca Raton, Fl : Taylor & Francis, ©2008.
Edition/Format:   Print book : EnglishView all editions and formats
Summary:
In addition to providing students, researchers, and other professionals with mechanical information regarding digital watermarking and steganography, this work also provides them with the framework to develop extensive advanced techniques. It shows how robust high-capacity watermarking techniques can be successfully used to enlarge the hiding capacity while maintaining the robustness of the watermark. Several robust  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Additional Physical Format: Online version:
Shih, Frank Y.
Digital watermarking and steganography.
Boca Raton, Fl : Taylor & Francis, ©2008
(OCoLC)654560582
Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Frank Y Shih
ISBN: 9781420047578 1420047574
OCLC Number: 165479224
Description: 180 pages : illustrations ; 24 cm
Contents: Introduction --
Digital watermarking --
Digital steganography --
Differences between watermarking and steganography --
A brief history --
Books on watermarking and steganography --
Classification in Digital Watermarking --
Classification based on characteristics --
Blind vs. non-blind --
Perceptible vs. imperceptible --
Private vs. public --
Robust vs. fragile --
Spatial domain-based vs. frequency domain-based --
Classification based on Applications --
Copyright protection watermarks --
Data authentication watermarks --
Fingerprint watermarks --
Copy control watermarks --
Device control watermarks --
Mathematical Preliminaries --
Least-significant-bit substitution --
Discrete Fourier transform (DFT) --
Discrete Cosine transform --
Discrete wavelet transform --
Random sequence generation --
The chaotic map --
Error correction code --
Set partitioning in hierarchical tree --
Digital Watermarking Fundamentals --
Spatial-domain watermarking --
Substitution watermarking in the spatial domain --
Additive watermarking in the spatial domain --
Frequency domain watermarking --
Substitution watermarking in the frequency domain --
Multiplicative watermarking in the frequency domain --
Watermarking based on vector quantization --
Rounding error problem --
Fragile watermark --
The block-based fragile watermark --
Weakness of the block-based fragile watermark --
The hierarchical-based fragile watermark --
Robust watermark --
Redundant embedding approach --
Spread spectrum approach. Watermarking Attacks and Tools --
Image processing attacks --
Attack by filtering --
Attack by remodulation --
Attack by JPEG coding distortion --
Attack by JPEG 2000 compression --
Geometric attack --
Attack by image scaling --
Attack by rotation --
Attack by image clipping --
Attack by linear transformation --
Attack by bending --
Attack by warping --
Attack by perspective projection --
Attack by collage --
Attack by template --
Cryptographic attack --
Protocol Attack --
Watermarking tools --
Combinational Digital Watermarking in the Spatial and Frequency Domains --
An overview of combinational watermarking --
Watermarking in the spatial domain --
Watermarking in the frequency domain --
Experimental results --
Further encryption of combinational watermarking --
Genetic Algorithm Based Digital Watermarking --
Introduction to the genetic algorithm --
The chromosome --
Basic operations of genetic algorithm --
Reproductive --
Crossover --
Mutation --
Fitness function --
The conception of genetic algorithm based watermarking --
Genetic algorith-based rounding-error correction watermarking --
Definitions: chromosome, fitness function and genetic algorithm operations --
Chromosome --
Fitness function --
Reproductive --
Crossover --
Mutation --
The genetic algorithm-based rounding error correction algorithm --
An advanced strategy for initializing first population --
An application for medical image watermarking --
An overview of the proposed technique --
The signature image --
Textual data --
The improved scheme based on genetic algorithms --
Experimental results --
Adjusted-Purpose Digital Watermarking --
An overview of adjusted-purpose digital watermarking --
The morphological approach for extracting pixel-based features --
The strategies for adjusting th varying-sized transfor window and quality factor --
Experimental results --
The collecting approach for generating the VSTW. Robust High Capacity Digital Watermarking --
The weakness of current robust watermarking --
The concept of robust watermarking --
Enlargement of significant coefficients --
Breaking the local spatial similarity --
The block-based chaotic map --
Determination of embedding locations --
Intersection-based pixels collection --
The reference register and container --
The RHC watermarking algorithm --
The embedding procedure --
The extracting procedure --
The embedding and extracting strategies --
The embedding strategy --
The extracting strategy --
Experimental results --
Capacity enlargement --
Robust experiments --
Performance comparisons --
Introduction to Digital Steganography --
Types of steganography --
Technical steganography --
Linguistic steganography --
Digital steganography --
Applications of steganography --
Convert communication --
One-time pad communication --
Embedding security and Imperceptibility --
Examples of steganography software --
S-Tools --
StegoDos --
EzStego --
Jsteg-Jpeg --
Steganalysis --
An overview --
The statistical properties of images --
The visual steganalytic system --
IQM-based steganalytic system --
Learning strategies --
Introduction of support vector machine --
Neural networks --
Principle component analysis --
The frequency-domain steganalytic system --
Genetic Algorithm-Based Steganography --
An overview of the GA-based breaking methodology --
The fitness function --
Reproduction --
Crossover --
Mutation --
The GA-based breaking algorithm on SDSS --
Generating the stego-image on the visual steganalytic system --
Generating the stego-image on the image quality measure-based steganalytic system --
The GA-based breaking algorithm on the VSS --
The GA-based breaking algorithm on IQM-SDSS --
The GA-based breaking algorithm on the JFDSS --
Complexity analysis.
Responsibility: Frank Y. Shih.
More information:

Abstract:

Offers students and researchers with mechanical information regarding digital watermarking and steganography. This work provides them with the framework needed to develop advanced algorithms. It  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(7)

User lists with this item (4)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/165479224> # Digital watermarking and steganography : fundamentals and techniques
    a schema:CreativeWork, schema:Book ;
   library:oclcnum "165479224" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/flu> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/314978794#Place/boca_raton_fl> ; # Boca Raton, Fl
   schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
   schema:about <http://id.worldcat.org/fast/887935> ; # Data encryption (Computer science)
   schema:about <http://experiment.worldcat.org/entity/work/data/314978794#Topic/multimedia_systems_security_measures> ; # Multimedia systems--Security measures
   schema:about <http://experiment.worldcat.org/entity/work/data/314978794#Topic/datasakerhet> ; # Datasäkerhet
   schema:about <http://dewey.info/class/005.8/e22/> ;
   schema:about <http://id.worldcat.org/fast/893746> ; # Digital watermarking
   schema:about <http://id.worldcat.org/fast/975774> ; # Intellectual property
   schema:about <http://experiment.worldcat.org/entity/work/data/314978794#Topic/steganografi> ; # Steganografi
   schema:bookFormat bgn:PrintBook ;
   schema:copyrightYear "2008" ;
   schema:creator <http://viaf.org/viaf/162729597> ; # Frank Y. Shih
   schema:datePublished "2008" ;
   schema:description "Robust High Capacity Digital Watermarking -- The weakness of current robust watermarking -- The concept of robust watermarking -- Enlargement of significant coefficients -- Breaking the local spatial similarity -- The block-based chaotic map -- Determination of embedding locations -- Intersection-based pixels collection -- The reference register and container -- The RHC watermarking algorithm -- The embedding procedure -- The extracting procedure -- The embedding and extracting strategies -- The embedding strategy -- The extracting strategy -- Experimental results -- Capacity enlargement -- Robust experiments -- Performance comparisons -- Introduction to Digital Steganography -- Types of steganography -- Technical steganography -- Linguistic steganography -- Digital steganography -- Applications of steganography -- Convert communication -- One-time pad communication -- Embedding security and Imperceptibility -- Examples of steganography software -- S-Tools -- StegoDos -- EzStego -- Jsteg-Jpeg -- Steganalysis -- An overview -- The statistical properties of images -- The visual steganalytic system -- IQM-based steganalytic system -- Learning strategies -- Introduction of support vector machine -- Neural networks -- Principle component analysis -- The frequency-domain steganalytic system -- Genetic Algorithm-Based Steganography -- An overview of the GA-based breaking methodology -- The fitness function -- Reproduction -- Crossover -- Mutation -- The GA-based breaking algorithm on SDSS -- Generating the stego-image on the visual steganalytic system -- Generating the stego-image on the image quality measure-based steganalytic system -- The GA-based breaking algorithm on the VSS -- The GA-based breaking algorithm on IQM-SDSS -- The GA-based breaking algorithm on the JFDSS -- Complexity analysis."@en ;
   schema:description "Watermarking Attacks and Tools -- Image processing attacks -- Attack by filtering -- Attack by remodulation -- Attack by JPEG coding distortion -- Attack by JPEG 2000 compression -- Geometric attack -- Attack by image scaling -- Attack by rotation -- Attack by image clipping -- Attack by linear transformation -- Attack by bending -- Attack by warping -- Attack by perspective projection -- Attack by collage -- Attack by template -- Cryptographic attack -- Protocol Attack -- Watermarking tools -- Combinational Digital Watermarking in the Spatial and Frequency Domains -- An overview of combinational watermarking -- Watermarking in the spatial domain -- Watermarking in the frequency domain -- Experimental results -- Further encryption of combinational watermarking -- Genetic Algorithm Based Digital Watermarking -- Introduction to the genetic algorithm -- The chromosome -- Basic operations of genetic algorithm -- Reproductive -- Crossover -- Mutation -- Fitness function -- The conception of genetic algorithm based watermarking -- Genetic algorith-based rounding-error correction watermarking -- Definitions: chromosome, fitness function and genetic algorithm operations -- Chromosome -- Fitness function -- Reproductive -- Crossover -- Mutation -- The genetic algorithm-based rounding error correction algorithm -- An advanced strategy for initializing first population -- An application for medical image watermarking -- An overview of the proposed technique -- The signature image -- Textual data -- The improved scheme based on genetic algorithms -- Experimental results -- Adjusted-Purpose Digital Watermarking -- An overview of adjusted-purpose digital watermarking -- The morphological approach for extracting pixel-based features -- The strategies for adjusting th varying-sized transfor window and quality factor -- Experimental results -- The collecting approach for generating the VSTW."@en ;
   schema:description "Introduction -- Digital watermarking -- Digital steganography -- Differences between watermarking and steganography -- A brief history -- Books on watermarking and steganography -- Classification in Digital Watermarking -- Classification based on characteristics -- Blind vs. non-blind -- Perceptible vs. imperceptible -- Private vs. public -- Robust vs. fragile -- Spatial domain-based vs. frequency domain-based -- Classification based on Applications -- Copyright protection watermarks -- Data authentication watermarks -- Fingerprint watermarks -- Copy control watermarks -- Device control watermarks -- Mathematical Preliminaries -- Least-significant-bit substitution -- Discrete Fourier transform (DFT) -- Discrete Cosine transform -- Discrete wavelet transform -- Random sequence generation -- The chaotic map -- Error correction code -- Set partitioning in hierarchical tree -- Digital Watermarking Fundamentals -- Spatial-domain watermarking -- Substitution watermarking in the spatial domain -- Additive watermarking in the spatial domain -- Frequency domain watermarking -- Substitution watermarking in the frequency domain -- Multiplicative watermarking in the frequency domain -- Watermarking based on vector quantization -- Rounding error problem -- Fragile watermark -- The block-based fragile watermark -- Weakness of the block-based fragile watermark -- The hierarchical-based fragile watermark -- Robust watermark -- Redundant embedding approach -- Spread spectrum approach."@en ;
   schema:description "In addition to providing students, researchers, and other professionals with mechanical information regarding digital watermarking and steganography, this work also provides them with the framework to develop extensive advanced techniques. It shows how robust high-capacity watermarking techniques can be successfully used to enlarge the hiding capacity while maintaining the robustness of the watermark. Several robust algorithms are presented to illustrate the framework and provide assistance in understanding and implementing fundamental principles. Alternatives to traditional strategies are presented. The principles taught are illustrated with plentiful graphs and examples in order to simplify the problems and make highly complicated theories readily understandable."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/314978794> ;
   schema:inLanguage "en" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/654560582> ;
   schema:name "Digital watermarking and steganography : fundamentals and techniques"@en ;
   schema:productID "165479224" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/165479224#PublicationEvent/boca_raton_fl_taylor_&_francis_2008> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/314978794#Agent/taylor_&_francis> ; # Taylor & Francis
   schema:url <http://catdir.loc.gov/catdir/toc/ecip0725/2007034224.html> ;
   schema:workExample <http://worldcat.org/isbn/9781420047578> ;
   umbel:isLike <http://bnb.data.bl.uk/id/resource/GBA773197> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/165479224> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/314978794#Agent/taylor_&_francis> # Taylor & Francis
    a bgn:Agent ;
   schema:name "Taylor & Francis" ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
   schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/887935> # Data encryption (Computer science)
    a schema:Intangible ;
   schema:name "Data encryption (Computer science)"@en ;
    .

<http://id.worldcat.org/fast/893746> # Digital watermarking
    a schema:Intangible ;
   schema:name "Digital watermarking"@en ;
    .

<http://id.worldcat.org/fast/975774> # Intellectual property
    a schema:Intangible ;
   schema:name "Intellectual property"@en ;
    .

<http://viaf.org/viaf/162729597> # Frank Y. Shih
    a schema:Person ;
   schema:familyName "Shih" ;
   schema:givenName "Frank Y." ;
   schema:name "Frank Y. Shih" ;
    .

<http://worldcat.org/isbn/9781420047578>
    a schema:ProductModel ;
   schema:isbn "1420047574" ;
   schema:isbn "9781420047578" ;
    .

<http://www.worldcat.org/oclc/654560582>
    a schema:CreativeWork ;
   rdfs:label "Digital watermarking and steganography." ;
   schema:description "Online version:" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/165479224> ; # Digital watermarking and steganography : fundamentals and techniques
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.