Informed watermarking
This book deals with digital watermarking, which is defined by the authors of this book as the art of hiding auxiliary information in digital data in a secure, robust and imperceptible fashion.
1 online resource
9781402070716, 1402070713
1012458869
1. Introduction.- 2. General Concepts and State-of-the-Art.- 2.1 A General Model of Digital Watermarking.- 2.2 Restrictions and Simplifications.- 2.3 Stochastic Modeling of Digital Watermarking.- 2.4 Performance Evaluation of Digital Watermarking.- 2.5 Spread-Spectrum Watermarking.- 2.6 Exploiting Side Information at the Encoder.- 2.7 A Game-Theoretic Approach to Digital Watermarking.- 3. Information Embedding into IID Signals Facing an AWGN Attack.- 3.1 Scalar Costa Scheme.- 3.2 Theoretical Performance Analysis.- 3.3 High-Rate SCS Communication.- 3.4 Low-Rate SCS Communication.- 3.5 Inverse SCS.- 3.6 Detection of Information Embedded with SCS.- 3.7 Chapter Summary.- 4. Digital Watermarking: A Game between Embedder and Attacker.- 4.1 Watermarking of IID Signals.- 4.2 Watermarking of Non-IID Signals.- 4.3 Step Size and Offset Estimation for SCS.- 4.4 Chapter Summary.- 5. Applications.- 5.1 Watermarking of Chemical Structure Sets.- 5.2 Watermarking of digital images.- 5.3 Chapter Summary.- 6. Summary, Conclusions, and Outlook.- 6.1 Communication Exploiting Side Information.- 6.2 The Game Between Watermark Embedder and Attacker.- 6.3 Applications for Digital Watermarking.- 6.4 Future Research Topics.- Appendices.- A Properties of SCS Transmission.- A. 1 Dithered Quantization.- A.2 PDF of extracted SCS information after AWGN attacks.- A.3 Derivation Details for Inverse SCS Mapping.- A.4 SCS Watermarking Facing Scalar Quantization Attacks.- B Solution of the Watermarking Game for Sawn Attacks.- C Optimization of Attack Strategy for Fixed Embedding Strategy.- C. 1 Optimization in Case of ICS Watermarking.- C.2 Optimization in Case of SS Watermarking.- C.3 Optimization in Case of ST-SCS Watermarking.- D Optimization of the Embedding Strategy.- D. 1 Optimized Embedding and Attack for ICS Watermarking.- D.2 Optimized Embedding and Attack for SS Watermarking.- D.3 Optimized Embedding and Attack for ST-SCS Watermarking.- E Test Images and Additional Results.- E. 1 Original Images.- E.2 Additional Image Statistics.- E.3 ST-SCS Watermark Capacities for Image Data.- References.
archive.org Free eBook from the Internet Archive
openlibrary.org Additional information and access via Open Library